Application Security News and Articles


It’s Time for Defense Tech Companies to Get Ahead of CMMC Before They Get Left Behind   

The Cybersecurity Maturity Model Certification (CMMC) process is just around the corner and is expected by most to go into effect early next year. This is why defense tech companies need to act today to start their compliance journey. The post ...

Seal OS fixes vulnerabilities in Linux operating systems

Seal Security launched Seal OS, a solution designed to automatically fix vulnerabilities in both Linux operating systems and application code. Seal OS delivers long-term support for a wide range of Linux distributions, encompassing Red Hat ...

GUEST ESSAY: How AI co-pilots boost the risk of data leakage — making ‘least privilege’ a must

The rise of AI co-pilots is exposing a critical security gap: sensitive data sprawl and excessive access permissions. Related: Weaponizing Microsoft’s co-pilot Until now, lackluster enterprise search capabilities kept many security risks in ...

The compliance illusion: Why your company might be at risk despite passing audits

For many CISOs, compliance can feel like a necessary evil and a false sense of security. While frameworks like ISO 27001, SOC 2, and PCI DSS offer structured guidelines, they don’t automatically equate to strong cybersecurity. The challenge? ...

Job Application Spear Phishing

Starting in Q3 2024, Cofense Intelligence detected an ongoing campaign targeting employees working in social media and marketing positions. In this campaign, marked employees were encouraged to apply to a social media manager position in a ...

Dalfox: Open-source XSS scanner

DalFox is an open-source tool for automating the detection of XSS vulnerabilities. With powerful testing capabilities and a wide range of features, it makes scanning, analyzing parameters, and verifying vulnerabilities faster and easier. ...

How enterprise leaders can secure and govern agentic AI

In this Help Net Security video, Nataraj Nagaratnam, an IBM Fellow and CTO for Cloud Security, discusses enterprises’ steps to lay a secure foundation for agentic AI deployments. Recent research from IBM and Morning Consult shows that 99% ...

Are Your Cloud Secrets Truly Protected?

How Secure Are Your Cloud Secrets? Is your organization truly protecting its cloud secrets, or are there gaps that might be exploited by malicious cyber actors? Non-Human Identities (NHIs) and Secrets Security Management is emerging as an ...

Harnessing Innovation for Better NHIs?

Are We Ready to Embrace NHI Innovation? Cybersecurity within various industry verticals has witnessed remarkable transformations due to rapid advancements in technology. But, amidst all the buzz, have we been successful in fully embracing the NHI ...

Is Your Secrets Management Scalable?

Is Your Organization Achieving Scalable Secrets Management? How well does your organization manage its Non-Human Identities (NHIs) and their secrets? A cybersecurity expert often asked about the best methods for managing NHIs, especially where ...

Deceptive Signatures: Advanced Techniques in BEC Attacks

KEY TAKEAWAYS Sophistication of BEC Attacks: Business Email Compromise (BEC) attacks are becoming increasingly sophisticated, leveraging advanced social engineering, AI-driven personalization, and phishing kits in order to overcome MFA ...

DEF CON 32 – Exploiting Bluetooth: From Your Car To The Bank Account$$

Authors/Presenters: Yso & Martin Strohmeier Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Rust vs. C — Linux’s Uncivil War

Kernel Panic in the Rust Belt. Memory safety: GOOD. Cheese motion: BAD. The post Rust vs. C — Linux’s Uncivil War appeared first on Security Boulevard.

7 CSPM Tools to Secure Your Cloud Infrastructure

Cloud security covers a wide range of tools and frameworks, which makes it hard to implement. Cloud security posture management (CSPM) organizes the process. The post 7 CSPM Tools to Secure Your Cloud Infrastructure appeared first on Security ...

What Are Non-Human Identities? Challenges and Best Practices

Non-human identities (NHIs) power automation, cloud services, and DevOps workflows for many organizations. These digital entities enable seamless system interactions and even outnumber human identities in some cases. The post What Are Non-Human ...

Expanding Seceon’s Reach: A Strategic Partnership with Tech First Gulf

At Seceon’s 2025 Q1 Innovation and Certification Days, Khaled Al Najjar of Seceon engaged in an insightful discussion with Tech First Gulf (TFG) leaders Ram Reddy, Dolly Lakhani, and Pratik Patel about their partnership and the expansion of ...

Daniel Stori’s Turnoff.US: ‘Ubuntu Core’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘Ubuntu Core’ appeared first on Security Boulevard.

Background check, drug testing provider DISA suffers data breach

DISA Global Solutions, a Texas-based company that provides employment screening services (including drug and alcohol testing and background checks) for over 55,000 organizations, has suffered a cyber incident that led to a data breach, which ...

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks. The post Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts appeared first on SecurityWeek.

What Is Cybersecurity Performance Management? | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post What Is Cybersecurity Performance Management? | Kovrr appeared first on Security Boulevard.