Application Security News and Articles


K8s Infrastructure Design Assessment: Optimize Cloud-Native Foundation

A Kubernetes Infrastructure Design Assessment is an important step for organizations seeking to ensure reliable, cost effective, and secure infrastructure. At Fairwinds, a K8s infrastructure design assessment is led by top-level engineers to ...

OffensiveCon25 – Attacking Browsers via WebGPU

Author/Presenter: Lukas Bernhard Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the ...

Akamai Extends Cybersecurity Reach to DNS Posture Management

Akamai this week launched an agentless posture management offering that provides visibility across multiple domain name servers (DNS) platforms. Sean Lyons, senior vice president and general manager for infrastructure security solutions and ...

Why Most Exposed Secrets Never Get Fixed

Our latest State of Secrets Sprawl 2025 research reveals a troubling reality: the majority of leaked corporate secrets found in public code repositories continue to provide access to systems for years after their discovery. The post Why Most ...

Yet Another Exposed Database, This Time with 184 Million Records

I had hoped by now we’d be long past the discovery of exposed or misconfigured databases, considering how dangerous they can be to businesses, governments and individuals—and given the heightened security measures that most organizations have ...

OffensiveCon25 – Keynote – How Offensive Security Made Me Better at Defense

Author/Presenter: Dino Dai Zovi Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the ...

What Links Hospital Outages, Crypto Botnets, and Sneaky Zip Files? A Ransomware Chaos

Listen to this article A massive nonprofit hospital network in Ohio, 14 medical centers strong, brought to its knees by cybercriminals—likely the gang behind the Interlock ransomware. Elective surgeries were canceled. Outpatient appointments ...

AI Speed Paradox | Securing AI Generated Code | Contrast Security

AI-powered code is developing so fast that security defenses can't keep up, leaving new vulnerabilities in its wake. The speed is outstripping traditional security measures, demanding immediate and radical changes to organizational risk ...

Cybersecurity Needs Satellite Navigation, Not Paper Maps

The cybersecurity landscape is undergoing a transformation so profound it can only be described as a seismic shift. We are witnessing the ground rules of digital defense being actively rewritten by the rapid emergence of autonomous AI agents, ...

Elevating the CISO to Business Enabler With CRQ | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Elevating the CISO to Business Enabler With CRQ | Kovrr appeared first on Security Boulevard.

Open source policy management: How Sonatype supports security at scale

As organizations rely more heavily on open source components, software composition analysis (SCA) has become essential for identifying risks. But visibility alone is not enough. What turns insight into action is effective policy management: the ...

Hackers Are Stealing Salesforce Data, Google Warns

By Christy Lynch This post summarizes the June 4, 2025 threat intelligence update from Google and offers additional recommendations from Reveal Security based on similar and recently observed attack patterns targeting SaaS applications and cloud ...

Introducing Enzoic for Active Directory 3.6

Better Active Directory security with Enzoic 3.6: Real-time password feedback. CrowdStrike SIEM integration. Clearer credential risk insights. The post Introducing Enzoic for Active Directory 3.6 appeared first on Security Boulevard.

Bitdefender unifies security, risk management, and compliance in a single platform

Bitdefender announced GravityZone Compliance Manager, a new addition to its GravityZone platform that helps organizations reduce the burden of compliance and streamline audit readiness. Designed specifically for today’s complex regulatory ...

Dynatrace extends platform with agentic AI capabilities

Dynatrace is accelerating the generational shift in enterprise software development by extending the Dynatrace platform with agentic AI capabilities. Designed to predict and prevent disruptions, protect systems and data, and optimize operations ...

Backdoored Open Source Malware Repositories Target Novice Cybercriminals

A threat actor has been creating backdoored open source malware repositories to target novice cybercriminals and game cheaters. The post Backdoored Open Source Malware Repositories Target Novice Cybercriminals appeared first on SecurityWeek.

Announcing our Series A | Impart Security

Today, we're announcing our $12 million Series A led by Madrona. This funding represents more than capital—it validates our solution to what I call the 'last mile problem' in application security. Here's a scenario every security professional ...

Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal

Cellebrite and Corellium, whose names have been mentioned in spyware stories, are joining forces to provide advanced investigative solutions. The post Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal appeared ...

Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison

Sagar Steven Singh and Nicholas Ceraolo, members of the Vile group, get prison sentences for identity theft and hacking. The post Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison appeared first on SecurityWeek.

ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware

Researchers have discovered and analyzed a ClickFix attack that uses a fake Cloudflare ‘humanness’ check. The post ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware appeared first on SecurityWeek.