Application Security News and Articles


Immunity Evasion: Defeating Security with Active Measures & Long-Lived Domains

In Q1 2025, Cofense Intelligence identified a sophisticated phishing tactic combining long-lived domains, custom CAPTCHAs, and anti-automated analysis to bypass SEGs. This combination allows threat actors to evade detection by replacing malicious ...

From cleaners to creepers: The risk of mobile privilege escalation

In this Help Net Security video, Nico Chiaraviglio, Chief Scientist at Zimperium, explores how Android apps can be abused to escalate privileges, giving attackers access to sensitive data and system functions. Drawing on Zimperium’s recent ...

Employees are using AI where they know they shouldn’t

Despite widespread anticipation about AI’s positive impact on workforce productivity, most employees feel they were overpromised on its potential, according to GoTo. In fact, 62% believe AI has been significantly overhyped. However, this is ...

Beyond Playbooks and AI Agents: Embracing Persistent, Autonomous Security Operations

Why traditional SOC playbooks and AI agents fall short. Learn how Morpheus AI delivers autonomous security operations without the complexity. The post Beyond Playbooks and AI Agents: Embracing Persistent, Autonomous Security Operations appeared ...

MY TAKE: Microsoft takes ownership of AI risk — Google, Meta, Amazon, OpenAI look the other way

Last week at Microsoft Build, Azure CTO Mark Russinovich made headlines by telling the truth. Related: A basis for AI optimism In a rare moment of public candor from a Big Tech executive, Russinovich warned that current AI ...

Why SaaS DCIM is the Perfect Fit for Modern Data Centers

There’s no room for guesswork in today’s data center operations. Modern IT environments demand tools that provide real-time insights, predictive analytics, and seamless integration to ensure uptime and efficiency. By leveraging cutting-edge ...

Why a Layered Approach Is Essential for Cybersecurity and Zero Trust 

Today’s cybersecurity landscape is complex and unforgiving. Remote work, Saas, AI Agents, cloud migration, and ever-evolving cyber threats have exposed the limitations of relying on standalone security measures. To reduce risk, CISOs and IT ...

Why Enterprises Need Just-in-Time Provisioning to Secure AI at Scale

AI agents are no longer science experiments in the enterprise. They’re becoming actors in critical workflows—making decisions, performing transactions, and chaining together complex API calls across multi-cloud environments. Gartner calls ...

How Safe Are Your Secrets in the Cloud?

Are Your Cloud Secrets as Secure as They Could Be? You’d likely agree that secrets management, particularly for Non-Human Identities (NHIs), is a critical aspect of cybersecurity. But how safe are your secrets stored in the cloud? NHIs, a term ...

Make Your Team Capable with Advanced NHIDR

Are You Leveraging NHIDR Capabilities for Advanced Cybersecurity? Managing Non-Human Identities (NHIs) and Secrets Security is not only a critical factor but also a cornerstone. With cyber threats become increasingly sophisticated, isn’t it ...

Ensure Certainty in Your Cloud-Native Security

How Secure is Your Cloud-Native Security? We can’t ignore the rising importance of non-human identities (NHIs) and Secrets Security Management in the field of cloud-native security. Defined by the unique interplay between “Secrets” and ...

How Just-in-Time Provisioning Creates Artificial Agent Identities on Demand

Artificial intelligence is entering its agentic era—where AI systems don’t just assist humans, they act autonomously to accomplish complex tasks. These agents can reason, delegate, and interact with APIs and systems across clouds, all at ...

New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in Stealthy Hack

Researchers identify a previously unknown ClickFix variant exploiting PowerShell and clipboard hijacking to deliver the Lumma infostealer via a compromised travel site. The post New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in ...

GitGuardian Partners with GuidePoint Security to Strengthen Application Security Offerings

GitGuardian and GuidePoint Security have partnered to deliver enhanced secrets detection and non-human identity security solutions to North American customers, offering tools to combat secrets sprawl and mismanaged identities. The post ...

LinuxFest Northwest: Challenges of Managing Community Meetup Post-Pandemic

Author/Presenter: Mariatta Wijaya (Python Core Developer) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb ...

Cycles That Drive Cybersecurity

  The cybersecurity industry moves fast! The attackers are constantly adapting and relentless in their pursuits that victimize others. New users are being added to the global online ecosystem. Services are hungry for data, which is rising in ...

U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam

The DOJ is moving to collect $7.74 million seized two years ago in connection with a criminal case involving an IT worker scam run by North Korean operatives. The case is one of many that have been running in the United States and elsewhere for ...

Building a Resilient, Secure Healthcare and Life Sciences Ecosystem

Listen to this article Healthcare is in the midst of a technology-driven revolution. From AI-enabled decision support to networked medical devices, advancements are reshaping how providers deliver care and how patients experience it. Sudipto ...

Researchers unearth keyloggers on Outlook login pages

Unknown threat actors have compromised internet-accessible Microsoft Exchange Servers of government organizations and companies around the world, and have injected the organizations’ Outlook on the Web (OWA) login page with browser-based ...

LinuxFest Northwest: Guarding Your Digital Treasure A Quest for Secure Credential Management

Author/Presenter: Shelby Palmersheim CEH & CISSP (Technical Marketing Manager) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for ...