Application Security News and Articles


DEF CON 32 – Dysfunctional Unity: The Road To Nowhere

Authors/Presenters: Michael v3ga Aguilar Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Migrating from kOps to EKS: A Technical Guide for When & Why to Switch

As Kubernetes continues to mature, so do the tools we use to manage it. In this blog post, we'll explore the process of upgrading from Kubernetes Operations (kOps) to Amazon Elastic Kubernetes Service (EKS), focusing on the technical aspects and ...

Introducing Morpheus: Autonomous Investigation, Triage, and Response for SOC Teams

Learn how Morpheus ASOC brings AI-driven autonomy to security operations, enabling 100% alert coverage and faster investigations. The post Introducing Morpheus: Autonomous Investigation, Triage, and Response for SOC Teams appeared first on D3 ...

One AI Analyst, Infinite Scale: The New Security Operations Model

The age of throwing more analysts at the problem is over. The future belongs to teams that recognize AI isn’t just a helper—it’s a force multiplier for security operations. The post One AI Analyst, Infinite Scale: The New Security ...

The Ultralytics Supply Chain Attack: How It Happened, How to Prevent

Get details on this recent supply chain attack and how to avoid falling victim to similar attacks.  The post The Ultralytics Supply Chain Attack: How It Happened, How to Prevent appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Archive Request’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Archive Request’ appeared first on Security Boulevard.

From Defense to Offense: Inside-Out Data Security Strategies for CISOs in 2025

Challenging the status quo and advocates for “inside-out” security, placing data at the heart of the strategy from the very beginning, rather than securing it last. The post From Defense to Offense: Inside-Out Data Security Strategies for ...

Your Social Security Number is on the Dark Web: What Do You Do? 

Best ways to keep your social security number off the dark web and actionable steps to take if your social security number is compromised. The post Your Social Security Number is on the Dark Web: What Do You Do?  appeared first on Security ...

News alert: INE Security’s focus on practical security training enhances career stability in tech

Cary, NC, Feb. 19, 2025, CyberNewswire — 2025 marks a time of unprecedented volatility in the technology job market. On one hand, dependence on technology is soaring. The growth of AI and machine learning is propelling a surge in new … ...

iOS 18 settings to lock down your privacy and security

Enhancing your security and privacy on iOS 18 involves configuring various settings to control access to your personal data and device features. Here are 12 essential settings to consider. Enable two-factor authentication (2FA) Using 2FA ...

DEF CON 32 – MoWireless MoProblems: Modular Wireless Survey Sys. & Data Analytics

Authors/Presenters: G. Horvath, W.. Tam Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

CaaS Surges in 2025, Along With RATs, Ransomware

Cybercrime-as-a-Service (CaaS) now accounts for 57% of all cyberthreats, marking a 17% increase from the first half of 2024, according to Darktrace’s Annual Threat Report. The post CaaS Surges in 2025, Along With RATs, Ransomware appeared first ...

Securing multi-environment deployments: Cloud, on-premise, and air-gapped

Modern software delivery makes use of many different deployment environments, from public cloud to private cloud and traditional on-premise data centers to highly secured air-gapped systems. Organizations take advantage of multiple deployment ...

Flaws in Xerox VersaLink MFPs Spotlight Printer Security Concerns

Two security flaws found in Xerox VersaLink MFPs could allow hackers to capture authentication credentials and move laterally through enterprise networks and highlight the often-overlooked cyber risks that printers and other IoT devices present ...

INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech

Cary, North Carolina, 19th February 2025, CyberNewsWire The post INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech appeared first on Security Boulevard.

Fortinet enhances FortiAnalyzer to deliver accelerated threat hunting and incident response

Fortinet announced significant enhancements to FortiAnalyzer, reinforcing its role in driving faster, smarter security operations (SecOps)—all from a single, turnkey hybrid platform tailored for mid-sized enterprises and teams impacted by the ...

How Hackers Manipulate Agentic AI with Prompt Engineering

Organizations adopting the transformative nature of agentic AI are urged to take heed of prompt engineering tactics being practiced by threat actors. The post How Hackers Manipulate Agentic AI with Prompt Engineering appeared first on SecurityWeek.

The MSSP Advantage: Elevating Executive Digital Risk Protection in 2025

For Managed Security Service Providers (MSSPs), cybersecurity isn’t just about protecting networks and endpoints anymore. As businesses become more digitally connected, security threats are shifting beyond the enterprise perimeter – targeting ...

CardinalOps expands Threat Exposure Management platform

CardinalOps announced new enhancements to its Threat Exposure Management platform. The newly launched platform provides security teams with better visibility, smarter prioritization, and consistent workflows to address exposures and proactively ...

Everything You Need to Know About PCI DSS 4.0 (with a 2025 Compliance Checklist)

Get ready for the March 2025 PCI DSS 4.0 deadline with our comprehensive compliance checklist and implementation guide. Learn how to meet new client-side security requirements. The post Everything You Need to Know About PCI DSS 4.0 (with a 2025 ...