Application Security News and Articles


Reflections on a Tumultuous 2024: How Cybersecurity and DevSecOps Took Center Stage

As we near the end of 2024, one fact is clear: It’s been another bang up year with an unprecedented amount of security incidents. All the usual suspects and some new ones have thrown things around. Resiliency is the name of the game it seems.  ...

The Ultimate Guide to Establishing a Strong Cybersecurity Baseline: Key Steps and Best Practices

Security baselines are the foundational guidelines that help organizations maintain a minimum protection standard. They provide a starting point—a basic level of security that must be in place to protect against the most common threats. ...

NFT scammers charged for stealing $22 million through “rug pulls”

A six-count indictment was unsealed on Friday in Los Angeles charging two California men with defrauding investors of more than $22 million in cryptocurrency through a series of digital asset project “rug pulls,” a type of fraud ...

A Primer on JA4+: Empowering Threat Analysts with Better Traffic Analysis

What is JA4+ and Why Does It Matter? Introduction Threat analysts and researchers are continually seeking tools and methodologies to gain... The post A Primer on JA4+: Empowering Threat Analysts with Better Traffic Analysis appeared first on ...

CISO Reporting Structure Explained: How to Optimize Reporting for Cyber Risk Success

The Changing Landscape of CISO Reporting The Chief Information Security Officer (CISO) role has evolved dramatically in recent years. Traditionally reporting to the Chief Information Officer (CIO), CISOs now often report directly to the CEO, ...

Top Open Source API Security Tools

The modern world relies on Application Programming Interfaces (APIs). They allow applications to communicate with each other, servers, and consumers to facilitate data sharing and simplify application development. Without them, the internet would ...

Why cryptography is important and how it’s continually evolving

Cryptography is fundamental to modern cybersecurity, forming the foundation for secure communication and data protection in a world increasingly reliant on digital technologies. Its importance cannot be overstated, as it safeguards sensitive ...

AppViewX 2025 Predictions: Machine Identity Security, Certificate Lifecycle Management and PKI

In 2024, we certainly witnessed some interesting trends and disruptions in machine and non-human management, certificate lifecycle management (CLM), and PKI. In research from the Enterprise Strategy Group, non-human (machine) identities are ...

NIS2 vs. DORA: Key Differences and Implications for Cybersecurity and Operational Resilience

Discover the key differences between the EU's NIS2 and DORA frameworks and what they mean for your business. The post NIS2 vs. DORA: Key Differences and Implications for Cybersecurity and Operational Resilience appeared first on Scytale. The post ...

Evilginx: Open-source man-in-the-middle attack framework

Evilginx is an open-source man-in-the-middle attack framework designed to phish login credentials and session cookies, enabling attackers to bypass 2FA safeguards. “Back in 2017, I was experimenting with extracting cookies from one browser ...

Maximizing the impact of cybercrime intelligence on business resilience

In this Help Net Security interview, Jason Passwaters, CEO of Intel 471, discusses how integrating cybercrime intelligence into an organization’s security strategy enables proactive threat management and how measuring intelligence efforts can ...

How companies can fight ransomware impersonations

As these threat actors become increasingly strategic and harder to detect, organizations must take all measures to protect their data, including cybersecurity training. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead ...

What open source means for cybersecurity

With outdated and inadequately maintained components, along with insecure dependencies, the open-source ecosystem presents numerous risks that could expose organizations to threats. In this article, you will find excerpts from 2024 open-source ...

Ensure Certainty with Advanced Threat Detection Methods

Why Advanced Threat Detection Matters? Ever wondered why organizations across various sectors -financial services, healthcare, travel, and DevOps, are placing great emphasis on advanced threat detection? Well, the reason lies in our increasingly ...

Innovations in Handling Cloud-Based Secret Sprawl

Have You Ever Wondered about the Management of Cloud-Based Secret Sprawl? With the rapid digital transformation and the upsurge in cloud computing, enterprises are continually looking for innovative strategies to manage the ever-increasing ...

Capable Compliance through Rigorous Secrets Rotation

Is Your Organization Taking a Rigorous Approach to Secrets Rotation? In today’s advanced technological landscape, ensuring compliance and maintaining a capable security posture is no longer optional. Particularly, the management of Non-Human ...

Protected Access: Enhancing Cloud IAM Strategies

Unpacking the Importance of Non-Human Identities (NHIs) in Cloud Security Can we imagine a world where Non-Human Identities (NHIs) weren’t instrumental to our cybersecurity strategies? NHIs, or machine identities, perform an irreplaceable ...

Building Trust with Efficient Privileged Access Management

Why is Privileged Access Management Crucial? Does it ever cross your mind how privileged access management plays a significant role in safeguarding your organization’s data and systems? With a largely digitalized economy, the landscape of ...

Harnessing Innovation in Machine Identity Management

How Does Innovation Impact Machine Identity Management? Imagine an environment where machine identities are as secure as human identities, where every “tourist” in the system is accounted for, their “passports” encrypted and secure. This ...

Understanding Cyber Threats During the Holiday Season

Understanding Cyber Threats During the Holiday Season Understanding Cyber Threats During the Holiday Season The holiday season, while festive, presents heightened cybersecurity risks for businesses. Cybercriminals exploit increased online ...