Application Security News and Articles


Ensuring Compliance and feeling reassured in the Cloud

How Can Non-Human Identities (NHIs) Enhance Cloud Security? Is your organization leveraging the power of Non-Human Identities (NHIs) and Secrets Security Management to fortify cloud security? If not, you could be leaving yourself vulnerable to ...

California Tax Refund Mobile Phish

A new round of mobile phish is imitating the State of California's "Franchise Tax Board" in a round of phishing sites that are gaining prominence in the past few days. I visited ftb.ca-gov-sg[.]top/notice from a burner phone to see how the scheme ...

Why Misconceptions About Cloud Managed Services Can Cost You

Scaling Kubernetes isn’t just about launching containers—it’s about choosing support models that truly let developers innovate instead of drowning in operational noise. Recently, I read Kathie Clark’s excellent blog, “What I Got Wrong ...

Privileged Access Management and Microsegmentation Are Better Together 

Most cyberattacks today follow a predictable pattern. Attackers steal or abuse privileged credentials to gain access and then move laterally across systems to reach valuable data. Add to that the new risk from AI and agentic AI systems abusing ...

Salesloft Drift Breach Rolls Up Cloudflare, Palo Alto, Zscaler, and Others

Cloudflare, Palo Alto Networks, and Zscaler are the latest among hundreds of victims of an expanding data-stealing attack by the UNC6395 threat group that is exploiting compromised OAuth tokens associated with Salesloft's Drift app to access ...

BSidesSF 2025: Blank Space: Filling The Gaps In Atomic And Behavioral Cloud-Specific IoCs

Creator, Author and Presenter: Merav Bar, Gili Tikochinski Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack

Flaw allows attackers to reset and hijack TP-Link TL-WA855RE devices; CISA urges users to retire discontinued extenders. The post US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack appeared first on SecurityWeek.

How Kingman USD Secures Google Workspace on a K-12 Budget with Cloud Monitor

Arizona district gains real-time threat visibility and protects student data while within budget by partnering with ManagedMethods Claire Sexton, Cybersecurity Administrator for Kingman Unified School District located in Kingman, Arizona, ...

Survey Surfaces Raft of WordPress Cybersecurity Concerns

A survey of 264 professionals that maintain websites based on the WordPress content management system (CMS) finds 96% have been impacted by at least one security incident/event, with just under two-thirds of those respondents (64%) having ...

Goldilocks: An Open Source Tool for Recommending Resource Requests

One of the questions that I get most frequently from our clients at Fairwinds is “How do we know what to set our resource requests and limits to?” Goldilocks is an open source Kubernetes controller developed by Fairwinds that provides a ...

Soar is your Safest Bet

It’s the middle of the week, you are working on a project that needs to be done, and while you are trying to focus, you get the same phishing alert for the 10th time this week. Your team is drowning in noise, and you’re looking around ...

When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook

What do a pharma firm, a hospital service provider, and your smart doorbell have in common? They were all targets in cyberattacks last month. Here’s the August end-of-month threat rundown from the ColorTokens Threat Advisory Team, a peek into ...

Randall Munroe’s XKCD ‘Archaeology Research’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Archaeology Research’ appeared first on Security Boulevard.

Salesloft Drift Breach: 7 Steps to Protect Your Organization

The Salesloft Drift breach is expanding fast. Learn what’s at risk and the 7 critical steps security teams should take to protect their SaaS ecosystem. The post Salesloft Drift Breach: 7 Steps to Protect Your Organization appeared first on ...

BSidesSF 2025: The Four Tribes Of Security Champions

Creator, Author and Presenter: Marisa Fagan Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

When Google Says “Scan for Secrets”: A Complete Guide to Finding Hidden Credentials in Salesforce

The Salesloft Drift breach affected hundreds of organizations through Salesforce, including Cloudflare, Palo Alto Networks, and Zscaler. Google now explicitly recommends running secrets scanning tools across Salesforce data—here's your complete ...

From Models to Missions: Applying the AI RMF to Federal Software Supply Chains

Federal agencies are quickly adopting artificial intelligence (AI) to make more informed decisions faster. And it's boosting productivity in all kinds of ways, from automating citizen services to accelerating vulnerability response. It's not an ...

Google Patches High-Severity Chrome Vulnerability in Latest Update

Chrome's latest release addresses a high-severity use-after-free vulnerability in the V8 JavaScript engine that could be exploited for remote code execution. The post Google Patches High-Severity Chrome Vulnerability in Latest Update appeared ...

Nucleus Insights turns CVE noise into an explainable threat signal

Nucleus Security introduced Nucleus Insights, AI-powered threat intelligence built to solve one of the most painful problems in vulnerability management: knowing which CVEs matter and why. Unlike traditional threat intelligence feeds made for ...

Everfox HSV-T protects data transfer between classified and unclassified networks

Everfox launched High Speed Verifier-Turnkey (HSV-T). This hardware-enforced secure data transfer solution enhances digital collaboration and interoperability between allied nations, safeguarding mission-critical data transfers from high threat ...