Application Security News and Articles


Fake CAPTCHA Scams: Ruining Consumer Trust and Driving Website Abandonment

CAPTCHAs frustrate users, fail to stop sophisticated bots, and now pose a serious malware risk. The post Fake CAPTCHA Scams: Ruining Consumer Trust and Driving Website Abandonment appeared first on Security Boulevard.

The Benefits of Implementing Least Privilege Access

Why is Least Privilege Access a Key Aspect in Security Practices? If you’re involved in cybersecurity, the term “Least Privilege Access” may be familiar. But why is it considered a central feature in security practices across diverse ...

Chinese-linked Hackers May Be Exploiting Latest Ivanti Vulnerability

Software maker Ivanti, which for more than a year has been plagued by security flaws in its appliance, unveiled two new ones this week, with Mandiant researchers saying that one likely is being activity exploited by China-linked threat ...

CES 2025: Think Before Relying on Shiny New Solutions

Chris Clements, VP of Solutions Architecture Just as a $5,000 gaming PC won’t make someone a better gamer if they haven’t mastered the basic controls, a sophisticated security solution won’t protect an organization that hasn’t implemented ...

DEF CON 32 – Reflections on a Decade in Bug Bounties

Authors/Presenters: Nikhil Shrivastava & Charlie Waterhouse Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to Know

Learn about OWASP’s newest focus on Non-Human Identities and how to mitigate risks like secret leakage, overprivileged NHIs, and insecure authentication with GitGuardian. The post OWASP Top 10 Non-Human Identity Risks for 2025: What You Need to ...

Stay on kOps or Move to EKS? 6 Reasons Tech Leaders May Want to Switch

Kubernetes recently celebrated its 10th anniversary, and it sure has come a long way. Despite its renowned complexity, K8s has since become the de facto standard for container orchestration. Quickly after Docker popularized containerization, more ...

Randall Munroe’s XKCD ‘Features of Adulthood’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Features of Adulthood’ appeared first on Security Boulevard.

Banshee Stealer variant targets Russian-speaking macOS users

The Banshee Stealer is a stealthy threat to the rising number of macOS users around the world, including those in Russian-speaking countries, according to Check Point researcher Antonis Terefos. Banshee Stealer was first publicly profiled in ...

Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency

While AI/ML and automation promise to help streamline and reduce security operation costs, these efforts could be significantly boosted by the increased availability of standard interfaces The post Open Interfaces Needed to Cut Security ...

8 Cyber Predictions for 2025: A CSO’s Perspective

As we step into 2025, the cyberthreat landscape is once again more dynamic and challenging than the year before. In 2024, we witnessed a remarkable acceleration in cyberattacks of all types, many fueled by advancements in generative AI. For ...

Vulnerability Research Highlights 2024

Our Vulnerability Research team looks back at a great year and summarizes the highlights of 2024. The post Vulnerability Research Highlights 2024 appeared first on Security Boulevard.

DEF CON 32 – Reverse Engineering And Hacking Ecovacs Robots

Authors/Presenters: Dennis Giese, Braelynn Hacker Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

The Hidden Costs of Poor Access Management: Why Small Businesses Can’t Afford to Ignore It

When a former employee retains access to sensitive systems months after leaving, it's more than a security oversight—it's a serious business risk. Learn true costs of poor access management, from immediate impacts to long-term reputation ...

SafeBreach 2024 Year in Review: Reflections from Co-Founder & CEO Guy Bejerano

SafeBreach CEO and Co-founder Guy Bejerano reflects on the highlights and accomplishments of the team and surrounding community in 2024. The post SafeBreach 2024 Year in Review: Reflections from Co-Founder & CEO Guy Bejerano appeared first on ...

Security Implications of Configuration Drift 

Addressing configuration drift - a seemingly minor issue - is essential to maintaining a secure and resilient IT environment.  The post Security Implications of Configuration Drift  appeared first on Security Boulevard.

SSL certificate FAQs: Your comprehensive guide from basics to advanced principles

Digital certificates play an important role in shaping the modern digital ecosystem, offering a much-needed foundation of trust through the power of authentication and encryption. Many people recognize the value of these certificates but struggle ...

SIM Swapping and How to Prevent it

SIM swapping attacks have been a threat for years, but gained mainstream attention in 2019 when hackers took over the cellular account of Twitter CEO Jack Dorsey. Because we use our cell phone number as an authentication method for a variety of ...

Leveraging Government Grants to Enhance Critical Security Systems

The Biden-Harris Administration’s Bipartisan Infrastructure Law, also known as the Infrastructure Investment and Jobs Act (IIJA), allows organizations to receive government grant money for improved cybersecurity. The post Leveraging Government ...

Webinar: The security mistakes everyone makes in M&A

If you often manage security across diverse brands or handle mergers and acquisitions, this webinar is not to be missed, as a panel of guest experts take you through all of the real-world security pitfalls when bringing companies together. The ...