Application Security News and Articles


Infosec products of the month: March 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Alloy, Cloudflare, Cytex, Detectify, GetReal Security, iProov, Keysight Technologies, Outpost24, Palo Alto Networks, Pondurance, Red Canary, ...

Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects

A look into Bitcoin's scripting system and how several projects use Bitcoin's features in their own software The post Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects appeared first on Security Boulevard.

The rise of identity and access management: How IAM evolved to being the new perimeter of cybersecurity

The story of Identity and Access Management (IAM) could be made into a movie with all the drama. The industry and its players have gone from behind-the-scenes underdogs to starring roles. IAM, once just a part of IT, is now arguably the essential ...

The Return of the Baby ASO: Why SOCs Still Suck?

“Flickering screens, a sickly, yellow glow. Humming servers, a constant, low thrum of digital malaise. Alerts screamed into the void, a cacophony of meaningless noise, lost in the echoing expanse of our digital tomb. Playbooks, relics of a ...

How do I manage access controls for NHIs to meet compliance requirements?

How Can Non-Human Identities Improve Access Control Compliance? Is it possible that non-human identities (NHIs) could help elevate your organization’s security outlook? when businesses across various sectors like healthcare, finance, and travel ...

What training is necessary for staff regarding NHI compliance?

Why Should Staff Be Trained on Non-Human Identities Compliance? Imagine a business environment where machine identities seamlessly communicate with each other, ensuring the smooth running of essential processes. Wouldn’t it be wonderful if they ...

What metrics should be tracked to ensure NHI compliance?

How Crucial are Non-Human Identities Compliance Metrics? Could you imagine navigating an unknown city without a map? The same goes for managing cybersecurity in our cloud-driven enterprises today. Without clear metrics, we may lose our way amidst ...

CAPTCHA’s Demise: Multi-Modal AI is Breaking Traditional Bot Management

With recent advancements in AI systems capable of easily solving visual, text, and audio challenges, CAPTCHA can’t offer the level of protection it did when conceived. The post CAPTCHA’s Demise: Multi-Modal AI is Breaking Traditional Bot ...

The 2025 WAF Wave from the Other Side

Forrester just published its 2025 Web application Firewall Wave. As a former industry analyst, and as a contributor on the vendor side for Imperva (cough, a leader in the report, cough), let me share some reactions on the shape of this report. ...

How Contrast ADR Speeds up SOC Incident Response Time| SOC Challenges From Alert Fatigue to Application-Layer Visibility | Contrast Security

Just because you work in a security operations center (SOC) doesn’t mean you have to waste your time chasing  dragons. And by “dragons,” we mean the traditional SOC’s difficulty identifying cyberattacks that originate in the black box of ...

Tonic Textual is now on the Databricks Marketplace: unstructured data, meet easy ingestion

Unlock and structure unstructured data with Tonic Textual on the Databricks Marketplace. Streamline AI workflows now. The post Tonic Textual is now on the Databricks Marketplace: unstructured data, meet easy ingestion appeared first on Security ...

BSidesLV24 – IATC – Security Trek: The Next Generation

Author/Presenter: Ira Victor Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

A Smarter Approach to Google Cybersecurity & Student Safety at Compass Charter Schools

ManagedMethods Helps Compass’s IT Team Save Time While Keeping Data Secure and Students Safe Compass Charter Schools are fully online TK-12 public charter schools in California. Compass serves about 2,400 students and employs 215 faculty and ...

Juniper Routers, Network Devices Targeted with Custom Backdoors

Backdoored Juniper networking devices are at the center of two major cybersecurity stories that highlight the ongoing vulnerability and active targeting of network infrastructure by cyber adversaries. J-Magic and TINYSHELL The first story broke ...

Splunk Patches Dozens of Vulnerabilities

Splunk patches high-severity remote code execution and information disclosure flaws in Splunk Enterprise and Secure Gateway App. The post Splunk Patches Dozens of Vulnerabilities appeared first on SecurityWeek.

Practical Steps for Utilities to Align with CIP 15 Security Goals

When you look at how fast cyber threats are evolving, especially against critical infrastructure, it’s clear we’re in uncharted territory. We’ve seen ransomware attacks knock entire power grids offline and supply chain intrusions derail ...

What’s New in CodeSonar 9.0

CodeSonar 9.0 is an exciting upgrade, with increased analysis performance, improved DISA STIG reporting, and Android 15 support. We recommend customers update to this version of CodeSonar as soon as possible to get access to these benefits. ...

Randall Munroe’s XKCD ‘Square Units’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Square Units’ appeared first on Security Boulevard.

Russian Espionage Group Using Ransomware in Attacks

Russian-speaking espionage group RedCurl has been deploying ransomware on victims’ networks in a recent campaign. The post Russian Espionage Group Using Ransomware in Attacks appeared first on SecurityWeek.

How to manage and protect your biometric data

Biometric data refers to unique physical or behavioral characteristics that are used to verify a person’s identity. Revoking or changing biometric data is more complicated than changing passwords. Unlike passwords, biometric identifiers like ...