Application Security News and Articles


The hidden threat: Tackling malware in your software supply chain

The value of open source is undeniable — 90% of all modern software development depends on it. According to Harvard Business School, in 2024 alone, more than 6 trillion open source software components were downloaded, representing almost $9 ...

DEF CON 32 – War Stories – Why Are You Still Using My Server For Your Internet Access

Author/Presenter: Thomas Boejstrup Johansen Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention ...

AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape

Unauthorized AI usage is a ticking time bomb. A tool that wasn’t considered a risk yesterday may introduce new AI-powered features overnight. The post AI Asset Inventories: The Only Way to Stay on Top of a Lightning-fast Landscape appeared ...

Getting the Most Value Out of the OSCP: The PEN-200 Course

In this second post of a five-part series, I provide advice on how to best utilize the PEN-200 course material for a successful career in ethical hacking. Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the ...

Prioritizing data and identity security in 2025

To say that the cybersecurity landscape has grown more complex over the past several years would be a dramatic understatement. Attackers have more resources at their fingertips than ever, and data breaches have become almost a daily occurrence. ...

Rubrik strengthens protection for cloud, SaaS, and on-premises environments

In its ongoing commitment to deliver comprehensive cyber resiliency, Rubrik announced innovations designed to enhance protection for cloud, SaaS, and on-premises environments. The innovations aim to provide customers with even more ability to ...

Cybersecurity Risks in 2025

Cyber threats in 2025 will constantly evolve, with cybercriminals using both new and old vulnerabilities. Here are the risks expected in 2025. The post Cybersecurity Risks in 2025 appeared first on Security Boulevard.

Red Canary expands Security Data Lake to help organizations optimize their SIEM costs

Red Canary announced new capabilities for Red Canary Security Data Lake, a service that enables IT and security teams to store, search, and access large volumes of infrequently accessed logs—such as firewall, DNS, and SASE data—without ...

Identity Verification — The Front Line to Workforce Security 

Enterprises can protect their workforce and critical systems without creating unnecessary barriers, striking the perfect balance between security and usability.  The post Identity Verification — The Front Line to Workforce Security  appeared ...

Introducing Mend AI Premium

Robust AI governance and threat detection with Mend AI Premium. The post Introducing Mend AI Premium appeared first on Security Boulevard.

Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations

Misconfigurations are the cause of most cloud breaches. Aryon is on a mission to prevent them. The post Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations appeared first on SecurityWeek.

eBook: What does it take to be a full-fledged virtual CISO?

Virtual Chief Information Security Officer (vCISO) services are in high demand. Even though it is clear to all that this trend is growing, most service providers only offer a portion of overall CISO duties. Many ask themselves “Can we offer ...

Creating Elegant Azure Custom Roles: Putting NotActions into Action!

Creating custom Roles in Azure can be a complex process that may yield long and unwieldy Role definitions that are difficult to manage. However, it doesn’t have to be that way. Read on to learn how you can simplify this process using the Azure ...

Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates

NOTE:  This article discusses proposed changes to existing regulations.  These changes are not in effect as of this article’s date […] The post Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates appeared first on ...

Polish Space Agency Hit by Cyberattack

The Polish space agency POLSA says it has disconnected its network from the internet to contain a cyberattack. The post Polish Space Agency Hit by Cyberattack appeared first on SecurityWeek.

Jamf to Acquire Identity Automation for $215 Million

Apple device management firm Jamf has entered into an agreement to acquire IAM platform Identity Automation. The post Jamf to Acquire Identity Automation for $215 Million appeared first on SecurityWeek.

Vulnerabilities Patched in Qualcomm, Mediatek Chipsets

Chip makers Qualcomm and Mediatek have released patches for many vulnerabilities across their products. The post Vulnerabilities Patched in Qualcomm, Mediatek Chipsets appeared first on SecurityWeek.

Broadcom Patches 3 VMware Zero-Days Exploited in the Wild

Broadcom patched VMware zero-days CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226 after Microsoft warned it of exploitation. The post Broadcom Patches 3 VMware Zero-Days Exploited in the Wild appeared first on SecurityWeek.

Veriti Research Uncovers Malware Exploiting Cloud Services 

Veriti Research has identified a growing trend – attackers leveraging cloud infrastructure to facilitate malware distribution and command-and-control (C2) operations. This evolving tactic not only makes detection more challenging but also ...

Google Patches Pair of Exploited Vulnerabilities in Android

Android’s March 2025 security update addresses over 40 vulnerabilities, including two actively exploited in the wild. The post Google Patches Pair of Exploited Vulnerabilities in Android appeared first on SecurityWeek.