Application Security News and Articles


From theory to training: Lessons in making NICE usable

SMBs may not have big budgets, but they are on the receiving end of many cyberattacks. A new study from Cleveland State University looked at how these companies could train staff without getting lost in the thousands of skills and tasks in the ...

Cyber Fraud: Types, Risks, and How to Prevent It

Learn what cyber fraud is, the most common types, and practical steps to prevent online fraud. Protect yourself and your business today. The post Cyber Fraud: Types, Risks, and How to Prevent It appeared first on Security Boulevard.

Securing agentic AI with intent-based permissions

When seatbelts were first introduced, cars were relatively slow and a seatbelt was enough to keep drivers safe in most accidents. But as vehicles became more powerful, automakers had to add airbags, crumple zones, and (eventually) adaptive driver ...

How to Prepare for a Cloud Security Audit in Multi-Cloud and Hybrid Networks

Here is the easiest explanation! Cloud security audit are formal evaluations of an organization’s cloud environments to verify that security controls meet industry standards and regulatory requirements. As businesses are increasingly adopting ...

Nagios: Open-source monitoring solution

Nagios is an open-source monitoring solution, now included as part of the robust Nagios Core Services Platform (CSP). It delivers end-to-end visibility across the entire IT infrastructure, covering everything from websites and DNS to servers, ...

Your SOC is tired, AI isn’t

Security teams have discussed AI in the SOC for years, but solid evidence of its impact has been limited. A recent benchmark study by Dropzone puts measurable evidence behind the idea, showing that AI agents can help analysts work faster and with ...

New infosec products of the week: October 10, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Object First, OPSWAT, Radiflow, and Semperis. OPSWAT’s MetaDefender Drive delivers portable, network-free threat scanning Purpose-built for critical ...

How to Create a Business Continuity Plan

The post How to Create a Business Continuity Plan appeared first on AI Security Automation. The post How to Create a Business Continuity Plan appeared first on Security Boulevard.

How to Build a Proactive Cybersecurity Monitoring Program for Modern Threats

Key Takeaways Cyber monitoring has become a core function for modern security teams, but collecting data alone isn’t enough. Effective cyber security monitoring requires a clear structure that ties strategy, data, and detection together into a ...

Kasada Wins “e-Commerce Security Solution of the Year” in 2025 CyberSecurity Breakthrough Awards

Prestigious Global Awards Program Recognizes Innovative Security Products The post Kasada Wins “e-Commerce Security Solution of the Year” in 2025 CyberSecurity Breakthrough Awards appeared first on Security Boulevard.

The Rise of AI-Powered Phishing – How to Spot New Attacks

  In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered fraud. Here’s what you need to ...

Smart Strategies for Managing Machine Identities

What Makes Machine Identity Management Vital for Cybersecurity? When considering cybersecurity, have you ever wondered why machine identity management is becoming increasingly vital? Non-human identities (NHIs) and secrets security management are ...

Feel Relieved with Enhanced NHIDR Protocols

What Are Non-Human Identities, and Why Are They Crucial in Cybersecurity? The concept of identity is not solely limited to humans. Increasingly, digital systems utilize Non-Human Identities (NHIs) to ensure secure and efficient operations. But ...

Being Proactive with Cloud Identity Security

How Secure Are Your Non-Human Identities? Have you ever considered the security of machine identities within your organization’s infrastructure? Non-Human Identities (NHIs) serve as vital components of cybersecurity ecosystems, ensuring that ...

USENIX 2025: PEPR ’25 – OneShield Privacy Guard: Deployable Privacy Solutions for LLMs

Creator, Author and Presenter: Shubhi Asthana, IBM Research Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: ...

Response to Oracle Security Alert Advisory: Oracle E-Business Suite Pre-Auth RCE (CVE-2025-61882)

AttackIQ has released a new emulation in response to the Oracle Security Alert Advisory detailing the CVE-2025-61882 vulnerability, which impacts Oracle E-Business Suite versions 12.2.3 through 12.2.14. The post Response to Oracle Security Alert ...

What is Trust in Cybersecurity? Why Zero Trust Matters

In cybersecurity, "trust" is one of the most misunderstood concepts. Organizations have traditionally relied on perimeter-based defenses, trusting that anything inside their network was legitimate. This approach is no longer sufficient. Most ...

Rethinking DDoS Defense: Why Scale Isn’t the Only Metric That Matters

In recent months, headlines have drawn attention to record-breaking DDoS attacks, often measured in terabits per second (Tbps) and accompanied by declarations of network capacity in the hundreds of Tbps. These figures, while impressive, can ...

Legit tools, illicit uses: Velociraptor, Nezha turned against victims

Threat actors are using an increasing variety of commercial and open-source products to carry out their attacks: according to researchers, Velociraptor and Nezha are the latest additions to their attack toolbox. Velociraptor misuse A suspected ...

Anatomy of a Modern Threat: Deconstructing the Figma MCP Vulnerability

Threat researchers recently disclosed a severe vulnerability in a Figma Model Context Protocol (MCP) server, as reported by The Hacker News. While the specific patch is important, the discovery itself serves as a critical wake-up call for every ...