Application Security News and Articles


Week in review: Google fixes exploited Chrome zero-day, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: June 2025 Patch Tuesday forecast: Second time is the charm? Microsoft has been busy releasing more out-of-band (OOB) patches than usual ...

From StackStorm to DeepTempo

And what does it tell us about Cybersecurity? As the founding CEO of StackStorm and now DeepTempo, I’ve seen how the needs of CISOs and SOCs have changed over the last 10+ years. New challenges and a better color scheme! When we started ...

Getting Started with SAST: Detecting Vulnerabilities Early with GitHub Actions

The First Step to Integrating Security into CIContinue reading on Medium »

Scalable Solutions for NHI Management

Is Your Organization Implementing Scalable Solutions for NHI Management? Is your business laying a solid groundwork for efficient Non-Human Identity (NHI) management? If not, you’re likely exposing your organization to unnecessary risks. Data ...

Boost Your Confidence with Strong NHI Management

Why Does NHI Management Matter? Imagine being able to boost your confidence, largely dependent on automated processes. What if there was a way to foster a sense of security about your organization’s data management, transparency, and regulatory ...

Driving Innovation through Secure NHIs

Are You Embracing Innovation Securely? The quest for innovation is always at the forefront. Our desire to push boundaries and create more efficient and dynamic solutions is a driving force for progress. However, amid all the technological ...

Empower Your Team with Robust NHI Protocols

How Crucial Are Robust NHI Protocols in Empowering Teams? These days, it’s a fair assumption that most businesses base a significant portion of their operations. The management of Non-Human Identities (NHIs) has become increasingly important. ...

OffensiveCon25 – No Signal, No Security: Dynamic Baseband Vulnerability Research

Authors/Presenters: Daniel Klischies and David Hirsch Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s ...

MCP (Model Context Protocol) and Its Critical Vulnerabilities

Model Context Protocol connects AI assistants to external tools and data. Think of it as a bridge between Claude, ChatGPT, or Cursor and your Gmail, databases, or file systems. Released... The post MCP (Model Context Protocol) and Its Critical ...

5 SaaS Blind Spots that Undermine HIPAA Security Safeguards

Hidden SaaS risks can quietly undermine HIPAA security safeguards. Discover how SaaS visibility and control help protect ePHI and ensure HIPAA compliance. The post 5 SaaS Blind Spots that Undermine HIPAA Security Safeguards appeared first on ...

Ensuring Certainty in NHIs Lifecycle Management

What Role does Certainty Play in the Management of NHIs Lifecycle? Where data breaches and cyber-threats pose significant risks, any security professional worth their salt knows the importance of having robust and efficient management practices. ...

Are Your Cloud NHIs Truly Protected?

Are You Doing Enough to Secure Your Cloud NHIs? Is your organization’s cloud security robust enough to protect your non-human identities (NHIs)? This is a question that has been increasingly haunting CISOs, cybersecurity professionals, and ...

Unleashing Powerful Cloud-Native Security Techniques

Is Managing Non-Human Identities the Key to Achieving Robust Cloud-Native Security? Where humans and machines square off, intent on breaching each other’s defenses. However, an important facet often goes unnoticed – Non-Human Identities ...

Why Securing NHIs Reduces Your Cyber Risk

Why is NHI Security Critical in Risk Management? Have you ever considered the potential security risk lurking? The reality is that the growing complexity of IT infrastructures, particularly in the cloud, presents new challenges for risk ...

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead The rules of cybersecurity are shifting—again. As 2025 unfolds, companies face a paradox: digital acceleration ...

LLM04: Data & Model Poisoning – FireTail Blog

Jun 06, 2025 - Lina Romero - LLM04: Data & Model Poisoning Excerpt: In this blog series, we’re breaking down the OWASP Top 10 risks for LLMs and explaining how each one manifests and can be mitigated. Today’s risk is #4 on the list: Data ...

Avoid FedRAMP Delays: 7 Common SSP Mistakes to Fix

Seeking a FedRAMP authority to operate is a critical part of any cloud service looking to work with the government in an official capacity. It’s required if you are going to handle controlled unclassified information on behalf of the government ...

8 Challenges Data Center Managers Must Overcome in 2025

Modern data centers stand at the heart of global business and digital innovation. But behind every rack and server, data center managers must juggle rapid advances in technology, mounting regulatory pressure, and relentless demands for efficiency ...

They Deepfaked Through the Bathroom Window: How Cybercriminals Are Targeting Executives & Key Personnel at Home

When the Beatles sang the famous lyric “She came in through the bathroom window,” they were riffing on a real event, a fan who bypassed the front door and broke into Paul McCartney’s home. It was a metaphor for intrusion from the ...

Report on the Malicious Uses of AI

OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity ...