Application Security News and Articles


Future-Proofing Your Software Supply Chain with SCA Best Practices

Open source software (OSS) is the backbone of modern software development, empowering industries from finance and healthcare to government and technology to innovate faster and reduce costs. However, this widespread adoption brings a growing and ...

BSidesSF 2025: Using AI To Discover Silently Patched Vulnerabilities In Open Source

Creator/Author/Presenter: Mackenzie Jackson Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector

As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats. The post Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector appeared ...

Cybersecurity Snapshot: CISA Analyzes Malware Used in SharePoint Attacks, as U.K. Boosts Cyber Assessment Framework

Check out what CISA found after it dissected malware from the latest SharePoint hacks. Plus, the U.K.’s cyber agency is overhauling its cyber framework to keep pace as threats escalate. In addition, Google is warning that cloud attacks are ...

From Vision to Reality: IRONSCALES + Malwarebytes Elevate MSP Security

When we first teamed up with Malwarebytes, the goal was ambitious but straightforward: give Managed Service Providers (MSPs) a single, streamlined way to deliver true defense in depth for their customers. That meant uniting industry-leading ...

Survey: AI Agents Are Now Biggest Threat to Cybersecurity

A survey of 200 North American security leaders found 63% see employees unintentionally giving AI agents access to sensitive data as the top internal threat. The post Survey: AI Agents Are Now Biggest Threat to Cybersecurity appeared first on ...

Why Your Security Program Might Be Failing Before It Even Starts ⎥ Sean Finley ⎥The Elephant in AppSec Podcast

Discover insights from The Elephant in AppSec episode with Sean Finley. The post Why Your Security Program Might Be Failing Before It Even Starts ⎥ Sean Finley ⎥The Elephant in AppSec Podcast appeared first on Security Boulevard.

In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment

Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive. The post In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment appeared ...

Black Hat USA 2025 – Summary of Vendor Announcements (Part 4)

Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas. The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) appeared first on SecurityWeek.

Columbia University Data Breach Impacts 860,000

Columbia University has been targeted in a cyberattack where hackers stole the personal information of students, applicants, and employees. The post Columbia University Data Breach Impacts 860,000 appeared first on SecurityWeek.

Identity Attacks: The Silent Killer of UK SMBs (And How to Thwart Them)

Identity Attacks: The Silent Killer of UK SMBs (And How to Thwart Them) When you think of a cyberattack, you might picture ransomware, phishing emails, or even hackers “breaking in” to your systems. But increasingly, attackers don’t need to ...

Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Dive into insights from BSides Las Vegas 2025: how identity hygiene, human ecosystems, structural resilience, and unpredictability define modern defenses. The post Passwords, Resilience, And Being Human: Working Together For A Brighter Future At ...

The Lesson of Black Hat: It’s About the People, Stupid

At Black Hat and beyond, the real strength of cybersecurity is the people who show up, year after year, to protect, connect, and inspire. The post The Lesson of Black Hat: It’s About the People, Stupid appeared first on Security Boulevard.

Ransomware: Still Dangerous After All These Years

Ransomware isn’t dying — it’s evolving, swapping encryption for aggressive extortion as attacks and data theft hit record highs. The post Ransomware: Still Dangerous After All These Years appeared first on Security Boulevard.

French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers

Bouygues has been targeted in a cyberattack that resulted in the personal information of millions of customers getting compromised. The post French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers appeared first on SecurityWeek.

Stop Geo-Spoofing with Secure API Integration for Mobile Application

Location Spoofing or Geo Spoofing is the act of deliberately falsifying the geographical location of a device. This can be performed using various techniques such as GPS manipulation, tweaking OS settings, or by using specialized software that ...

August 2025 Patch Tuesday forecast: Try, try, again

July turned into a surprisingly busy month. It started slowly with a fairly ‘calm’ Patch Tuesday as I forecasted in my last blog. Although there were 130 new CVEs addressed across all the Microsoft releases, there was only one publicly ...

Silent Guardian of Your Codebase: The Role of SAST

In 2025, the average cost of a data breach reached an alarming Rs 22 Crore; a 13% increase from the previous year. This trend highlights how breaches are not only more frequent and sophisticated but also increasingly costly, putting an ...

NSFOCUS Monthly APT Insights – June 2025

Regional APT Threat Situation In June 2025, the global threat hunting system of Fuying Lab detected a total of 33 APT attack activities. These activities were mainly distributed in regions such as South Asia, East Asia, West Asia, Eastern Europe, ...

Third-party partners or ticking time bombs?

In this Help Net Security video, Ngaire Elizabeth Guzzetti, Technical Director Supply Chain at CyXcel, discusses why a third of U.S. organizations don’t trust third-party vendors to manage critical risks and what that means for supply chain ...