Application Security News and Articles


Frictionless Security: What DevOps Teams Really Need from Identity Management

5 min readThe core challenge isn't secrets; it's access. Instead of treating access as a secrets problem, teams should treat it as an identity problem. This simple shift flips the script entirely. With ephemeral credentials tied to workload ...

Why DevOps Still Struggles with Least Privilege (Even in 2025)

5 min readWhile least privilege remains a fundamental security principle, DevOps teams consistently fail to apply it to non-human identities, like CI/CD pipelines and applications. This struggle stems from a reliance on outdated, static ...

DEF CON 33: DEF CON NextGen

Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas Convention Center; and via the organizations ...

Why Attackers Still Hoard Encrypted Data (and Why That Should Worry You)

Ron Zayas, CEO of Ironwall, tackles a sobering question: why do attackers keep harvesting encrypted data—and why are organizations so complacent about it? Zayas notes that it’s not just “foreign” apps scooping up information; domestic ...

In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias

Noteworthy stories that might have slipped under the radar: Eve Security seed funding, Claroty report, patches from WatchGuard and Nokia. The post In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding ...

When Business Moves Fast, Security Gets Left Behind in M&A

Mergers and acquisitions (M&A) often unfold at breakneck speed, driven by business opportunity and shareholder expectations. But as Dave Lewis, global advisory CISO at 1Password, explains, cybersecurity risks are still too often left as an ...

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Learn how to shift the conversation from "who’s to blame" to "who has context" in managing non-human identities across modern enterprise IT infrastructure. The post Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise ...

Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions

Turla malware was deployed in February on select systems that Gamaredon had compromised in January. The post Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions appeared first on SecurityWeek.

ImmuniWeb offers free tool to test quantum resilience of TLS stacks

ImmuniWeb has released a free online tool that checks whether websites are protected by post-quantum cryptography (PQC). The tool analyzes SSL/TLS configurations and verifies their compliance with the latest quantum-resilient encryption standards ...

How Static Code Analysis Enhances Salesforce Code Security and Efficiency

Ensuring secure, efficient, and high-quality code is essential for Salesforce development teams. Given Salesforce’s role in managing…Continue reading on Medium »

CISA Analyzes Malware From Ivanti EPMM Intrusions

Hackers chained two Ivanti EPMM vulnerabilities to collect system information, dump credentials, and execute malware. The post CISA Analyzes Malware From Ivanti EPMM Intrusions appeared first on SecurityWeek.

ChatGPT Tricked Into Solving CAPTCHAs

The AI agent was able to solve different types of CAPTCHAs and adjusted its cursor movements to better mimic human behavior. The post ChatGPT Tricked Into Solving CAPTCHAs appeared first on SecurityWeek.

Surveying the Global Spyware Market

The Atlantic Council has published its second annual report: “Mythical Beasts: Diving into the depths of the global spyware market.” Too much good detail to summarize, but here are two items: First, the authors found that the number of ...

Netskope Raises Over $908 Million in IPO

Netskope has debuted on Nasdaq and its shares soared more than 18%, bringing the company’s value to $8.6 billion.  The post Netskope Raises Over $908 Million in IPO appeared first on SecurityWeek.

OWASP Top Ten 2021 explained with simple Java examples and SAST insights

In this article, we talk about the OWASP Top Ten 2021 categories through the lens of PVS-Studio Java analyzer warnings. So, if you want to…Continue reading on Medium »

Two Scattered Spider Suspects Arrested in UK; One Charged in US

Thalha Jubair and Owen Flowers were charged in the UK and the US with hacking critical infrastructure organizations. The post Two Scattered Spider Suspects Arrested in UK; One Charged in US appeared first on SecurityWeek.

Trojan Horse Virus: Understanding, Detecting, and Defending with Seceon

The Trojan Horse Virus is one of the most deceptive forms of malware. Just like the Greek myth of soldiers hiding in a wooden horse to invade Troy, Trojan malware disguises itself as harmless files or programs to infiltrate systems. Once inside, ...

New Wave of Self-Replicating NPM Malware Exposes Critical Gaps in Software Supply Chain Security

The Shai-Hulud NPM worm highlights rising open-source supply chain threats. Secure builds with SBOMs, MFA, signed packages, and zero-trust defenses. The post New Wave of Self-Replicating NPM Malware Exposes Critical Gaps in Software Supply Chain ...

New Tigera solution protects AI workloads from data ingestion to deployment

Tigera announced a new solution to secure AI workloads running in Kubernetes clusters. Due to the resource-intensive and bursty nature of AI workloads, Kubernetes has become the de facto orchestrator for deploying them. However AI workloads ...

Astra API Security Platform secures undocumented and vulnerable APIs

Astra Security has launched its API Security Platform, designed to identify undocumented, zombie, and shadow APIs that threaten infrastructure and expose sensitive PII. Instead of relying on reactive, siloed detection tools, Astra’s platform ...