Application Security News and Articles


Unlocking Innovation with Protected Machine Identities

Is Your Organization Paying Enough Attention to Non-Human Identities? Organizations extensively utilize cloud services and automated systems. In doing so, they inevitably fragment their digital presence into countless Non-Human Identities (NHIs). ...

How to Stop Layer 7 DDoS Attacks in 2025

Stop stealthy Layer 7 DDoS attacks in 2025 that bypass CDNs. With DataDome’s AI-powered, edge-based protection, you can ensure uninterrupted operations---blocking threats in real time. The post How to Stop Layer 7 DDoS Attacks in 2025 appeared ...

6 Ways IT Can Help You Modernize Case Management Software

Your IT department can be a valuable ally in overcoming inevitable resistance to change Modern and effective corporate security teams operate in a complex digital environment. You access and connect data from social media, court records, weather, ...

Insurance companies can reduce risk with Attack Path Management

TL;DR Insurance companies host large amounts of sensitive data (PII, PHI, etc.) and often have complex environments due to M&A and divestitures Most breaches start with human error Fortune 500 companies rely on Microsoft Active Directory as ...

DEF CON 32 – The Wild And Wonderful World Of Early Microprocessors With A Focus On 6502

Author/Presenter: Michael Brown Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

SOC vs MSSP: Which is Right for Your Business?

One of the most pivotal decisions an organization faces is whether to build an in-house Security Operations Center (SOC) or outsource security operations to a Managed Security Service Provider (MSSP). While the choice may seem straightforward at ...

TrustFour’s OWASP 2025 NHI Top Ten Coverage

T4 redefines ASM by ensuring only authorized workloads can utilize NHIs through robust isolation powered by mTLS and a “ring-fenced” authorization map. With T4, unauthorized workloads are stopped in their tracks, slashing the attack surface ...

Randall Munroe’s XKCD ‘Chemical Formulas’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Chemical Formulas’ appeared first on Security Boulevard.

CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild according to researchers. Update January 23: The Analysis and Identifying affected systems sections have been updated to include ...

Juniper enterprise routers backdoored via “magic packet” malware

A stealthy attack campaign turned Juniper enterprise-grade routers into entry points to corporate networks via the “J-magic” backdoor, which is loaded into the devices’ memory and spawns a reverse shell when instructed to do so. ...

Conduent Confirms Cyberattack After Government Agencies Report Outages

Conduent has confirmed suffering disruptions due to a cyberattack after government agencies reported service outages. The post Conduent Confirms Cyberattack After Government Agencies Report Outages appeared first on SecurityWeek.

An Overview​​ of Cyber Risk Modeling | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post An Overview​​ of Cyber Risk Modeling | Kovrr appeared first on Security Boulevard.

ETW Threat Intelligence and Hardware Breakpoints

Learn to bypass EDR detection using NtContinue for hardware breakpoints without triggering ETW Threat Intelligence. This technical blog explores kernel debugging, debug registers, and EDR evasion with code examples. The post ETW Threat ...

DEF CON 32 – Bluetooth Blues: Unmasking CVE 2023-52709 – The TI BLE5-Stack Attack

Author/Presenter: Kevin Mitchell Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Protecting the Backbone of Modern Development: Scanning Secrets in Container Registries

Secrets buried in container registries pose a silent risk. Learn about their hidden vulnerabilities and what steps you can take to safeguard your infrastructure. The post Protecting the Backbone of Modern Development: Scanning Secrets in ...

The Future of Data Security is Zero Trust: Here’s Why

The modern enterprise is fluid, dynamic and distributed. The old network perimeter is gone. And threat actors bypass corporate defenses with ease—often simply using stolen or cracked credentials. This is the world that Zero Trust was designed ...

9 Internal Data Breach Examples to Learn From

In the past year, 68% of data breaches involved the human element, according to Verizon. From disgruntled employees committing sabotage to innocent mistakes, humans are one of your organization's greatest information security risks. In fact, a ...

SonarQube Server 2025.1 LTA Release Announcement

The new SonarQube Server LTA release is as value-packed as ever. Look forward to high-impact AI capabilities, more secure code at every angle, supercharged developer productivity, and even better enterprise and operational capabilities. As ...

Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024)

Last month, Henry Farrell and I convened the Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024) at Johns Hopkins University’s Bloomberg Center in Washington DC. This is a small, invitational workshop on the future of ...

BSIMM15 highlights compliance and AI security: Why modern tooling is key

An increase in compliance activities such as the creation of software bills of materials (SBOMs), performing software composition analysis (SCA) scans on code repositories, and securing the attack surface created by artificial intelligence (AI) ...