Application Security News and Articles


Chainsaw: Open-source tool for hunting through Windows forensic artefacts

Chainsaw is an open-source first-response tool for quickly detecting threats in Windows forensic artefacts, including Event Logs and the MFT file. It enables fast keyword searches through event logs and identifies threats using built-in Sigma ...

Time for a change: Elevating developers’ security skills

Organizations don’t know their software engineers’ security skills because they don’t assess them in the interview process. Trying to do that in an interview is challenging, of course, given the time it takes for a proper assessment. ...

The Vanity Press in Academia

I’ve never been a regular resident of the ivory halls of academia, but Mich Kabay recently made me aware of an article about legitimate scientific journals driven to distraction by being flooded with commentary apparently reflecting a surge in ...

DEF CON 32 – Open Source Hacker V. Government Lawyer

Authors/Presenters: Rebecca Lively, Eddie Zaneski Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

PCI DSS Requirements With v4.0.1 Updates For 2024

PCI DSS refers to the Payment Card Industry Data Security Standard created by the PCI Security Standards Council (PCI SSC), an independent entity founded by major payment card brands, including Visa, JCB International, MasterCard, American ...

What is PCI DSS 4.0: Is This Still Applicable For 2024?

In a time when cyber threats continuously evolve, a security standard or framework is essential for protecting digital assets. The Payment Card Industry Data Security Standard (PCI DSS), developed by the PCI Security Standards Council, empowers ...

Week in review: Exploited Ivanti Connect Secure zero-day, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282) Ivanti has fixed two vulnerabilities affecting Ivanti Connect Secure, ...

Advancements in Machine Identity Protections

The Strategic Importance of Non-Human Identities Are we taking the necessary steps to secure our machine identities, or are we leaving our systems exposed to potential attackers? Non-Human Identities (NHIs) play a critical role in maintaining ...

From Chaos to Control: Building Your Company’s Access Management Foundation

Transform your company's digital security from chaos to control with a access management system. This comprehensive guide walks you through selecting the right tools, implementing core security measures, and creating efficient processes—all ...

DEF CON 32 – Porn & Privacy – ET

Author/Presenter: ET Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

2025 SaaS Security Word of the Year: Adaptability | Grip

Discover why adaptability is the 2025 SaaS security word of the year. This is the year to address shadow SaaS, AI risks, and evolving cyber threats effectively! The post 2025 SaaS Security Word of the Year: Adaptability | Grip appeared first on ...

Strategic Approaches to Enhance Data Security

How Crucial Are Non-Human Identities to Data Security? Data security has long been the bedrock of digital enterprises, providing robust defenses against the myriad of cyber threats that organizations face daily. But how often have you considered ...

2025 Threat Landscape Trends to Watch

What Type of Attacks Will We See in 2025? January 23, 2025Time: 1:00 pm ET | 10:00 am PTSpeaker: Paul Asadoorian, Principal Security Researcher Bootkits, network infrastructure attacks, and firmware vulnerabilities all saw major development ...

The Cost of Complacency in Credential Hygiene

The PowerSchool breach highlights the risks of poor credential hygiene. This article covers proactive steps to protect your SaaS environment. The post The Cost of Complacency in Credential Hygiene appeared first on Security Boulevard.

DEF CON 32 – Practical Exploitation of DoS in Bug Bounty

Author/Presenter: Roni Lupin Carta Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

Below the Surface Winter 2024 Edition – The Year in Review

The Year of the Typhoon Highlights from this edition: The post Below the Surface Winter 2024 Edition – The Year in Review appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post Below the Surface Winter 2024 ...

Minimizing Risk & Driving Growth: Insights from Sumeet Sabharwal at Build IT 2024 

At the recent Build IT 2024 event, our partner Sumeet Sabharwal from Netgain Technology, LLC participated in a compelling panel discussion. He shared valuable insights into the strategic decisions behind building their own solutions rather than ...

New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)

After a long, long, long writing effort … eh … break, we are ready with our 5th Deloitte and Google Cloud Future of the SOC paper “Future of SOC: Transform the ‘How’.” As a reminder (and I promise you do need it; it has been ...

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #320 – Aligning Teams

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Mikkel ...