Application Security News and Articles


LogonBox SSPR 2.4.10 – Now Available

IntroductionLogonBox is pleased to announce the immediate availability of LogonBox SSPR 2.4.10 and the Desktop Credentials Provider version 6.3.This release includes performance improvements relating to account unlocks and syncing large numbers ...

Optimizing efficiency and reducing waste in open source software management

As the use of open source software (OSS) continues to grow, so do the challenges around maintaining security and efficiency in software dependency management. The post Optimizing efficiency and reducing waste in open source software management ...

Sensitive Data Discovery for Enterprises: Turning Data Chaos into Compliance

In today’s data-driven landscape, sensitive information—like PII (Personally Identifiable Information), PHI (Protected Health Information), and PCI (Payment Card Information)—sprawls across enterprise systems. For data teams, keeping tabs ...

Google Cloud: MFA Will Be Mandatory for All Users in 2025

Google Cloud says it is taking a phased approach to making MFA mandatory for all users by the end of 2025 to help bolster the cyber-protections against increasingly sophisticated cyberattacks. The post Google Cloud: MFA Will Be Mandatory for All ...

GDS’s Journey from SOAR to AI-Enhanced Security Automation

The post GDS’s Journey from SOAR to AI-Enhanced Security Automation appeared first on AI-enhanced Security Automation. The post GDS’s Journey from SOAR to AI-Enhanced Security Automation appeared first on Security Boulevard.

DEF CON 32 – Your AI Assistant Has A Big Mouth: A New Side Channel Attack

Authors/Presenters: Yisroel Mirsky Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

MixMode Observes Increase in Threat Actor Activity Supporting CISA’s Heightened Election Security Concerns

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a joint statement with the Office of the Director of National Intelligence (ODNI) and the Federal Bureau of Investigation (FBI), highlighting the ongoing threat of ...

Beyond Secrets Managers: 5 Alternatives for Securing Non-Human Identities

5 min read Secrets managers offer value, but alternatives can help better secure non-human identities in complex, multi-cloud environments. The post Beyond Secrets Managers: 5 Alternatives for Securing Non-Human Identities appeared first on ...

Daniel Stori’s Turnoff.US: ‘Stranger Things – In The Sysadmin’s World’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘Stranger Things – In The Sysadmin’s World’ appeared first on Security Boulevard.

BTS #41 – Pacific Rim

In this episode, Paul Asadorian, Larry Pesce, and Evan Dornbush delve into the recent Sophos reports on threat actors, particularly focusing on the Pacific Rim case. They discuss the implications of the findings, including the tactics used by ...

Schneider Electric Confirms Ransom Hack — Hellcat Demands French Bread as ‘Joke’

That’s a lot of pain: $125,000 ransom seems small—but why do the scrotes want it paid in baguettes? The post Schneider Electric Confirms Ransom Hack — Hellcat Demands French Bread as ‘Joke’ appeared first on Security Boulevard.

Security Culture: The Best Tool Money Can’t Buy

Building positive relationships, sharing knowledge effectively, and making security "cool" are some of the most worthwhile security pursuits. The post Security Culture: The Best Tool Money Can’t Buy appeared first on Security Boulevard.

Downgrade attacks open patched systems to malware

A new report by the former SafeBreach researcher Alon Leviev is raising alarms about the risks posed by downgrade attacks on Microsoft Windows. In a blog post, Leviev, who now works for Microsoft, explained that his latest bypass could allow a ...

Interpol Operation Shuts Down 22,000 Malicious Servers

Interpol, other law enforcement agencies, and cybersecurity firms teamed up for Operation Synergia II, shutting down 22,000 malicious servers that supported ransomware, phishing, and other attacks and arresting 41 people connected to the ...

DEF CON 32 – 1 for All, All For WHAD: Wireless Shenanigans Made Easy

Authors/Presenters: Romain Cayre, Damien Cauquil Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

New Long-Term Trend Reports: Better Decision-Making, Insights, & Benchmarking

DataDome now offers up to two years of historical data with long-term trend reports for Enterprise and Enterprise Plus customers, helping businesses understand their attack landscape over time. The post New Long-Term Trend Reports: Better ...

All Google Cloud users will have to enable MFA by 2025

Google has announced that, by the end of 2025, multi-factor authentication (MFA) – aka 2-step verification – will become mandatory for all Google Cloud accounts. “Given the sensitive nature of cloud deployments — and with ...

Atakama introduces DNS filtering designed for MSPs

Atakama announced the latest expansion of its Managed Browser Security Platform, introducing DNS filtering explicitly designed for Managed Service Providers (MSPs). This new feature enables comprehensive in-browser and network-level filtering, ...

Navigating the Noise: Strategies for Reducing IT Chaos

The post Navigating the Noise: Strategies for Reducing IT Chaos appeared first on Votiro. The post Navigating the Noise: Strategies for Reducing IT Chaos appeared first on Security Boulevard.

Spectra Assure Malware Detection in ML and LLM Models

Machine learning (ML) models are transforming industries—from personalized recommendations to autonomous driving and healthcare diagnostics. As businesses increasingly rely on ML models to automate complex tasks and make data-driven decisions, ...