Application Security News and Articles


What Is Software Composition Analysis (SCA)? Tools and Benefits

Modern software development uses open-source components to save time and resources. But with that efficiency comes security issues. Open-source code can carry vulnerabilities or licensing issues that put your software—and the sensitive data it ...

Magecart Attacks Surge as E-Commerce Security Struggles to Keep Pace

by Source Defense A new report by Recorded Future’s Insikt Group reveals a concerning rise in Magecart attacks and e-skimming activity targeting online retailers. The research highlights how cybercriminals are evolving their tactics to bypass ...

Adopt a Personal Safety Plan Outside of Work

Digital security and personal safety go hand in hand. We believe that adopting a comprehensive personal safety plan outside of work is crucial for protecting yourself from potential threats. Here are some essential steps to enhance your personal ...

Consent Phishing: The New, Smarter Way to Phish

What is consent phishing? Most people are familiar with the two most common types of phishing — credential phishing and phishing payloads, where attackers trick users into revealing credentials and downloading malicious software ...

The Critical Risk of Using Dummy Email Domains in Payment Gateways

During our recent security assessments across multiple clients, we discovered a concerning pattern: many companies are unknowingly exposing their customers’ sensitive payment information through a simple yet critical misconfiguration in... The ...

The modern CISO is a cornerstone of organizational success

The chief information security officer (CISO) role has undergone a remarkable transformation, evolving from a purely technical position to a role that bridges business strategy, operational efficiency, and cybersecurity. The post The modern CISO ...

Best practices for ensuring a secure browsing environment

In this Help Net Security interview, Devin Ertel, CISO at Menlo Security, discusses how innovations like AI and closer collaboration between browser vendors and security providers will shape the future of browser security. The post Best practices ...

Every minute, 4,080 records are compromised in data breaches

A recent Domo report shows that the world’s internet population has reached a record high of 5.52 billion people and uncovers signs that AI may be unseating digital juggernauts as it brings in new forms of engagement. “The phenomenal ...

Deepfakes question our ability to discern reality

As deepfakes become increasingly sophisticated and accessible, their potential for misuse in areas such as cybercrime, misinformation campaigns, and identity theft continues to grow. In this article, you will find key insights from 2024 reports ...

Justify Your Security Investment with Smart NHIDR Practices

Are Your Security Practices Up to the Challenge? As organizations continue to invest more heavily in cybersecurity measures, one question often arises. How can businesses justify these increased security investments, particularly when it comes to ...

Achieve Peace of Mind with Secure Secrets Vaulting

What Does Secrets Vaulting Hold for your Business? In a world where data is the new gold, organizations are under increasing pressure to protect their resources from potential thieves. With the rise of cloud services, secrets vaulting has become ...

PCI DSS 4.0.1: A Comprehensive Guide to Successfully Meeting Requirements 6.4.3 and 11.6.1

The post PCI DSS 4.0.1: A Comprehensive Guide to Successfully Meeting Requirements 6.4.3 and 11.6.1 appeared first on Feroot Security. The post PCI DSS 4.0.1: A Comprehensive Guide to Successfully Meeting Requirements 6.4.3 and 11.6.1 appeared ...

Best of 2024: National Public Data (NPD) Breach: Essential Guide to Protecting Your Identity

Following the publication of our in-depth analysis on the National Public Data (NPD) breach last week, Constella Intelligence received several inquiries about how to safeguard against identity attacks using the exposed SSNs.  The recent National ...

PreVeil Drive in 2025: The Evolution of Flexible Enterprise Security

The post PreVeil Drive in 2025: The Evolution of Flexible Enterprise Security appeared first on PreVeil. The post PreVeil Drive in 2025: The Evolution of Flexible Enterprise Security appeared first on Security Boulevard.

DEF CON 32 – War Games Red Team for OT Based on Real World Case Studies

Author/Presenter: Shishir Gupta Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Randall Munroe’s XKCD ‘Lasering Incidents’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Lasering Incidents’ appeared first on Security Boulevard.

DataDome Releases Google Cloud Platform Server-Side Integration

Our new Google Cloud server-side integration is the latest in a range of 50+ integrations that ensure DataDome stops bad bots & fraud on any infrastructure. The post DataDome Releases Google Cloud Platform Server-Side Integration appeared ...

Eating Your Own Dog Food

Have you ever heard the phrase "eat your own dog food" - roughly translating to "use your own products"? The post Eating Your Own Dog Food appeared first on Security Boulevard.

DORA Regulation (Digital Operational Resilience Act): A Threat Intelligence Perspective

The Digital Operational Resilience Act (DORA) is coming in 2025. The post DORA Regulation (Digital Operational Resilience Act): A Threat Intelligence Perspective appeared first on Security Boulevard.

DEF CON 32 – V2GEvil: Ghost in the Wires

Authors/Presenters: Pavel Khunt & Thomas Sermpinis aka Cr0wTom Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las ...