Application Security News and Articles


South Korea AI Act

What is the South Korea AI Act? South Korea’s Framework Act on the Development of Artificial Intelligence and Creation of a Trust Foundation, often referred to simply as the AI Framework Act or the AI Basic Act, is the country’s landmark law ...

United States Labor Day 2025

Permalink The post United States Labor Day 2025 appeared first on Security Boulevard.

Statements of Support for Security Best Practices

Explore the significance of statements of support for security best practices in enterprise SSO and CIAM. Learn about MFA, access control, and vendor endorsements. The post Statements of Support for Security Best Practices appeared first on ...

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior

A team of researchers from Frondeur Labs, DistributedApps.ai, and OWASP has developed a new machine learning framework designed to help defenders anticipate attacker behavior across the stages of the Cyber Kill Chain. The work explores how ...

Key Considerations for Implementing Risk-Based Authentication

Explore key considerations for implementing risk-based authentication (RBA) to enhance security. Learn about adaptive authentication, risk assessment, integration strategies, and maintaining user experience. The post Key Considerations for ...

AIDEFEND: Free AI defense framework

AIDEFEND (Artificial Intelligence Defense Framework) is an open knowledge base dedicated to AI security, providing defensive countermeasures and best practices to help security pros safeguard AI and machine learning systems. Practicality is at ...

Boards are being told to rethink their role in cybersecurity

Boards of directors are being told that cybersecurity is now central to business resilience and growth, and that they must engage more directly in the way their organizations manage risk. A new report from Google Cloud’s Office of the CISO lays ...

Cybersecurity signals: Connecting controls and incident outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study offers evidence on which measures are most closely linked to lower breach risk and how organizations should think about ...

Convenience vs. Privacy: Can We Have Both?

In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabling location tracking, and using cloud backups ...

GenAI is fueling smarter fraud, but broken teamwork is the real problem

More than 80 percent of large U.S. companies were targeted by socially engineered fraud in the past year, according to Trustmi’s 2025 Socially Engineered Fraud & Risk Report. Nearly half of those organizations reported a direct financial ...

Russian-Linked ATP29 Makes Another Run at Microsoft Credentials

Amazon researchers disrupted a watering hole campaign by Russian-linked cyberespionage group APT29 designed to use compromised websites to trick users into giving the threat actors access to their Microsoft accounts and data via the tech giant's ...

Ensuring Safety with Comprehensive Secrets Sprawl Control

Why Control Over Secrets Sprawl is Key to Safe Cybersecurity Practices? Data breaches have become a significant concern. The necessity of safe cybersecurity practices, like managing Non-Human Identities (NHIs) and Secrets Sprawl, is indeed ...

Achieving a Secure Cloud with Restructured NHIs

How Important is Restructuring Non-Human Identities in Ensuring a Secure Cloud Environment? Have you ever stopped to consider the sheer volume of non-human identities (NHIs) operating within your cloud-based systems? These NHIs, comprising unique ...

AI-Powered Cybercrime Is Here: Massive Breaches & Dark Web Dumps

Cyber threats are escalating fast—and now AI is making them faster, smarter, and more dangerous than ever. As August 2025 wraps up, here’s what you need to know: ✅ Anthropic reports that cybercriminals are using Claude AI to automate data ...

BSidesSF 2025: Centralizing Egress Access Controls Across A Hybrid Environment At Block

Creator, Author and Presenter: Ramesh Ramani Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

TransUnion Data Breach Exposes 4.5 Million Records Through Third-Party App

TransUnion, one of the nation’s three major credit reporting agencies, has confirmed a cyberattack that exposed sensitive personal information for more than 4.4 million U.S. consumers. The incident, discovered on July 30, traces back to ...

Salt Typhoon: What Security Action Should Governments Take Now?

The FBI just announced that the Salt Typhoon cyber attacks against U.S. telecoms uncovered last year were much worse and more widespread than previously disclosed. What’s next? The post Salt Typhoon: What Security Action Should Governments Take ...

Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158 Over 300,000 internet-facing Plex Media Server instances are ...

Exciting Developments in Cloud-Native Security

Why are Cybersecurity Professionals Excited About Cloud-Native Advancements? Is it possible that the future of cybersecurity lies in the cloud? The answer, increasingly, is a resounding yes. Cloud-native advancements have ignited a spark in the ...

Building Trust with Robust NHIs Management

Why is Holistic NHI Management Indispensable for Robust Systems? Amidst the complex labyrinth of cybersecurity management, have you ever considered the strategic importance of NHIs and their implications on building a robust system? Non-Human ...