Application Security News and Articles


Ransomware attackers are “vishing” organizations via Microsoft Teams

The “email bombing + posing as tech support via Microsoft Teams” combination is proving fruitful for two threat actors looking to deliver ransomware to organizations, and they seem to be ramping up their efforts. “Sophos MDR has ...

AI Mistakes Are Very Different from Human Mistakes

Humans make mistakes all the time. All of us do, every day, in tasks both new and routine. Some of our mistakes are minor and some are catastrophic. Mistakes can break trust with our friends, lose the confidence of our bosses, and sometimes be ...

The Future of Automotive Cybersecurity: Why Learning Car Hacking is Essential 

As vehicles become smarter, the stakes for securing them grow higher. Learning car hacking is no longer a niche skill — it’s a necessity for anyone interested in the future of cybersecurity. The post The Future of Automotive Cybersecurity: ...

Cyber Hygiene: Strengthening Your Digital Immune System Through Routine Maintenance

Good cyber hygiene isn’t a one-time effort; it’s an ongoing process that requires diligence, awareness and consistency. The post Cyber Hygiene: Strengthening Your Digital Immune System Through Routine Maintenance appeared first on Security ...

API Security’s Role in Responsible AI Deployment

By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the world. What you may not be aware of, however, is the role Application Programming Interfaces (APIs) are playing in ...

Staying Ahead: Key Cloud-Native Security Practices

Can Effective Non-Human Identities and Secrets Management Bolster Your Cloud-Native Security Practices? The revolution in technology has seen a significant shift in business operations, with many organizations adopting cloud-native applications. ...

Getting Better: Advances in Secrets Rotation Tech

Why is Secrets Rotation Technology Crucial in the Data Security Landscape? The safety of sensitive information matters more than ever. With the proliferation of Non-Human Identities (NHIs) and a marked increase in cyber threats, the management of ...

Feel Reassured with Robust Machine Identity Protocols

Why Are Machine Identity Protocols Crucial for Robust Security Measures? Imagine opening your virtual “front door,” only to find unknown software entities exploring your data terrain. Chilling, isn’t it? Well, that’s where Machine ...

SDLC Gap Analysis: Requirement For Organization

Gap Analysis within the Software Development Life Cycle (SDLC) involves identifying insufficient security measures, and compliance shortcomings throughout the software development process, from start to finish. It is to ensure that proper ...

Scam Yourself attacks: How social engineering is evolving

We’ve entered a new era where verification must come before trust, and for good reason. Cyber threats are evolving rapidly, and one of the trends getting a fresh reboot in 2025 is the “scam yourself” attacks. These aren’t your ...

Addressing the intersection of cyber and physical security threats

In this Help Net Security, Nicholas Jackson, Director of Cyber Operations at Bitdefender, discusses how technologies like AI, quantum computing, and IoT are reshaping cybersecurity. He shares his perspective on the new threats these advancements ...

Fleet: Open-source platform for IT and security teams

Fleet is an open-source platform for IT and security teams managing thousands of computers. It’s designed to work seamlessly with APIs, GitOps, webhooks, and YAML configurations. Fleet provides a single platform to secure and maintain all ...

Cybersecurity jobs available right now: January 21, 2025

CISO Sempra Infrastructure | USA | Hybrid – View job details As a CISO, you will develop and implement a robust information security strategy and program that aligns with the organization’s objectives and regulatory ...

U.S. Treasury Sanctions Chinese Individual, Company for Data Breaches

The U.S. Treasury sanction a Chinese bad actor for participating in the hack of the agency's networks and a Chinese for its involvement with Salt Typhoon's attacks on U.S. telecoms. Meanwhile, the FCC calls for stronger cybersecurity measures for ...

The AI Revolution No One Saw Coming Until It Was Too Late

With the AI revolution comes hidden security risks. Employees are embracing AI faster than businesses can secure it, exposing critical gaps in governance. The post The AI Revolution No One Saw Coming Until It Was Too Late appeared first on ...

Mobile Cybersecurity Trends for 2025: Key Predictions and Preparations

  The post Mobile Cybersecurity Trends for 2025: Key Predictions and Preparations appeared first on Security Boulevard.

Streamline Certificate Lifecycle Management with AppViewX AVX ONE CLM and ServiceNow

ServiceNow is a leading ITSM platform that helps organizations optimize IT services, workflows, and digital experiences. It streamlines processes like service requests, incident management, and change approvals, improving efficiency and service ...

Web Application Security: Static Application Security Testing (SAST)

I’m Subhadip Sardar, a cybersecurity enthusiast with a strong foundation in IT and cybersecurity. I’m passionate about sharing knowledge…Continue reading on Medium »

Executive Order 14144 on Cybersecurity: Building on 2021’s Foundation with Advanced NHI Security

Building on EO 14028, EO 14144 advances U.S. cybersecurity with actionable steps for NHI security and secrets management. Learn what this means for you. The post Executive Order 14144 on Cybersecurity: Building on 2021’s Foundation with ...

Industry Moves for the week of January 20, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of January 20, 2025. Stay updated with the latest industry trends and shifts.