Application Security News and Articles


Attackers are Using Fake Windows Updates in ClickFix Scams

Huntress threat researchers are tracking a ClickFix campaign that includes a variant of the scheme in which the malicious code is hidden in the fake image of a Windows Update and, if inadvertently downloaded by victims, will deploy the ...

News alert: Veteran-led Blast Security launches, pushing proactive cloud defense over response

TEL AVIV, Israel, Nov. 24, 2025, CyberNewswire — Blast Security, a cybersecurity startup founded by industry veterans from Solebit (acquired by Mimecast) and elite IDF units, today announced its launch from stealth and a $10 million seed round ...

How to Build an AI Governance Program in 2026

Key Takeaways Artificial intelligence is becoming a core part of how organizations deliver services, make decisions, and manage operations. But as AI moves deeper into production workflows, leadership teams face a new responsibility: ensuring ...

FAQ About Sha1-Hulud 2.0: The “Second Coming” of the npm Supply-Chain Campaign

Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to immediately audit for at least 800 compromised ...

How does Secrets Management deliver value in Agentic AI management?

What Role Does Secrets Management Play in Harnessing Agentic AI? Where machines not only execute tasks but also make decisions, adapt, and evolve just like humans. This is the emerging frontier of Agentic AI, a transformative force. However, as ...

How is the lifecycle of NHIs supported in enterprise environments?

Are You Effectively Managing Your Non-Human Identities? Cybersecurity professionals often grapple with a unique challenge—managing Non-Human Identities (NHIs) or machine identities. These identities, typically comprising secrets such as ...

How can Agentic AI be adaptable to regulatory changes?

Why Is Managing Non-Human Identities Essential in Cloud Security? Non-Human Identities (NHIs) play an instrumental role in modern cybersecurity frameworks. But what exactly constitutes an NHI, and why is its management vital in safeguarding our ...

What exciting advancements are coming in NHIs management?

How Does Non-Human Identity Management Shape Today’s Cybersecurity Landscape? Imagine where machines seamlessly interact with each other in a secure yet complex web of communication. How do we ensure the security of such vast and intricate ...

Size ≠ Security: Bigger Businesses Still Fail at Bot Protection

DataDome's 2025 report reveals 61% of large enterprises fail basic bot detection. Company size doesn't equal security. Learn why bigger businesses remain vulnerable. The post Size ≠ Security: Bigger Businesses Still Fail at Bot Protection ...

NDSS 2025 – Deanonymizing Device Identities Via Side-Channel Attacks In Exclusive-Use IoTs

Session4A: IoT Security Authors, Creators & Presenters: Christopher Ellis (The Ohio State University), Yue Zhang (Drexel University), Mohit Kumar Jangid (The Ohio State University), Shixuan Zhao (The Ohio State University), Zhiqiang Lin (The ...

The Death of Legacy MFA and What Must Rise in Its Place

Tycoon 2FA proves that the old promises of “strong MFA” came with fine print all along: when an attacker sits invisibly in the middle, your codes, pushes, and one-time passwords become their codes, pushes, and one-time passwords too. Tycoon ...

Hack of SitusAMC Puts Data of Financial Services Firms at Risk

SitusAMC, a services provider with clients like JP MorganChase and Citi, said its systems were hacked and the data of clients and their customers possibly compromised, sending banks and other firms scrambling. The data breach illustrates the ...

Randall Munroe’s XKCD ‘’Airspeed”

Permalink The post Randall Munroe’s XKCD ‘’Airspeed” appeared first on Security Boulevard.

Top 7 Strategies for Securing Customer Data While Expanding Your Business Internationally

Learn the top strategies to secure customer data when expanding internationally, from MFA and encryption to compliance, SIEM, and scalable security partners. The post Top 7 Strategies for Securing Customer Data While Expanding Your Business ...

Beyond the Dark Web: How OSINT Cyber Intelligence Uncovers Hidden Digital Risks

Cyber threats no longer hide exclusively in the dark web. Increasingly, the early signs of compromise—leaked credentials, impersonation accounts, phishing campaigns—emerge across the surface web, social platforms, and open-source data. To ...

From User Identity to Payroll Accuracy: Automating Local Tax Compliance with SaaS Tools

Learn how SaaS platforms can automate local payroll tax compliance using identity data, real-time tax APIs, geolocation, and secure workflows for accuracy. The post From User Identity to Payroll Accuracy: Automating Local Tax Compliance with SaaS ...

Shai-Hulud 2.0: over 14,000 secrets exposed

On November 24, a new wave of the Shai-Hulud supply chain attack emerged. The threat actors exfiltrate stolen credentials directly to GitHub repositories created with compromised tokens. GitGuardian identified 14,206 secrets across 487 ...

When the Browser Becomes the Battleground for AI and Last-Mile Attacks

For years we treated the browser as just another application. That era is over. As Vivek Ramachandran points out, the browser has quietly become the new endpoint—and attackers have noticed. Users now live in the browser for work, banking, ...

Stop Optimizing for Google. Start Optimizing for AI That Actually Answers Questions.

AI answer engines changed the game. It's no longer about ranking #1—it's about being cited in AI-generated responses. Learn how to build content infrastructure that ChatGPT, Perplexity, and Claude actually reference. Includes real ...

NDSS 2025 – Towards Understanding Unsafe Video Generation

SESSION Session 3D: AI Safety ----------- ----------- Authors, Creators & Presenters: Yan Pang (University of Virginia), Aiping Xiong (Penn State University), Yang Zhang (CISPA Helmholtz Center for Information Security), Tianhao Wang ...