Application Security News and Articles


Delinea Extends Scope of Identity Management Platform

Delinea this week updated its platform for managing identities to add a vault for storing managing credentials, analytic tools for tracking user behavior and a framework for automating the management of the lifecycle of an identity from ...

SailPoint IPO Signals Bright Spot for Cybersecurity

In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets. The post SailPoint IPO Signals Bright Spot for Cybersecurity appeared first on SecurityWeek.

Microsoft GCCH vs. Google Public Sector for CMMC

When it comes to overall productivity platforms, collaboration tools, and office suites, the two biggest options dominating the market are the Google G Suite and Microsoft’s Office ecosystem. Whether it’s word processing, team collaboration, ...

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated Russian criminal adversary known as FIN7 based on activities observed between 2022 and 2023. The post Emulating the ...

DEF CON 32 – GUR RIBYHGVBA BS PELCGBTENCUL

Author/Presenter: Jeff Man Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Streamlining Security Operations: How the PDI Cybersecurity Platform is Transforming Cybersecurity Management

Security teams face a growing dilemma: how to effectively protect their organizations while juggling limited resources and mounting complexity. They must manage increasingly complex security infrastructures while confronting sophisticated cyber ...

Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle

A Chinese threat actor who targeted an Asian software company used the same toolset for the ransomware attack that was found in multiple cyberespionage incidents, leaving Symantec analysts to believe the hacker was a Chinese spy who used the ...

PDI AI technology: Your AI-Driven Ally in Proactive Cyber Defense

Imagine you’re part of a cybersecurity team that just received an alert about a potential breach. The clock is ticking, and your team is flooded with data and alerts from multiple sources. Sorting through this overwhelming volume of information ...

From Tools to Intelligence: The Evolution of SOCaaS

In the early days of cybersecurity, security teams faced a fragmented reality—juggling multiple tools that operated in isolation. Managed Detection and Response (MDR) solutions watched for threats, while Endpoint Detection and Response (EDR) ...

Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum

Just meet me at the ADP: Sen. Ron Wyden and Rep. Andy Biggs got no love for the United Kingdom The post Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum appeared first on Security Boulevard.

Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems

The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline. The post Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems ...

Randall Munroe’s XKCD ‘Atom’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Atom’ appeared first on Security Boulevard.

vCISOs are in high demand

Regardless of job title, 92% of executives stated they had some degree of confidence in their organization’s ability to meet compliance requirements and tackle advanced threats with current staff and tools, but confidence levels differed across ...

New GRC and cyber risk strategies emphasize risk adaptability

MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions offer a roadmap for building resilience strategies, addressing emerging risks, and seizing new opportunities. AI comes of ...

DEF CON 32 – Master Splinter’s Initial Physical Access Dojo

Authors/Presenters: Daniel Isler Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

The Challenges of Identity Lifecycle Management for NHIs

Identity lifecycle management is one of the most underestimated security risks in many organizations. You may have structured IAM processes that handle the lifecycle of human identities, but what about your non-human identities (NHIs)? The post ...

Sean Cairncross is Trump Nominee for National Cyber Director

Former RNC official Sean Cairncross has been nominated for the post of National Cyber Director to streamline the US cybersecurity strategy. The post Sean Cairncross is Trump Nominee for National Cyber Director appeared first on SecurityWeek.

Threat actors are using legitimate Microsoft feature to compromise M365 accounts

Suspected Russian threat actors have been taking advantage of Microsoft Device Code Authentication to trick targets into granting them access to their Microsoft 365 (M365) accounts. “While Device Code Authentication attacks are not new, ...

Ransomware Detection: Attack Types & Latest Techniques in 2025

Ransomware continues to be a formidable threat in the cybersecurity landscape, evolving in complexity and sophistication. It is a type of malicious software that encrypts a victim’s files or restricts access to their system, demanding payment ...

Malware Detection: How to detect and remove malware ?

Malware, a contraction of “malicious software,” encompasses any intrusive program developed by cybercriminals to compromise data integrity, damage systems, or gain unauthorized access. This broad category includes viruses, ransomware, ...