Application Security News and Articles


OAuth 2.0 in Practice: Building an OAuth Client

Explore OAuth 2.0 implementation by building your own client. Understand client credentials, access tokens, authorization code flow, and secure integration techniques. The post OAuth 2.0 in Practice: Building an OAuth Client appeared first on ...

Product showcase: Smarter pentest reporting and exposure management with PlexTrac

The threat landscape is evolving faster than ever. Staying ahead means going beyond automated scans and check-the-box assessments. It demands continuous, hands-on testing through a security approach that proactively identifies, prioritizes, and ...

CISO 3.0: Leading AI governance and security in the boardroom

In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic enterprise risk advisor. With AI now embedded across business functions, ...

Review: Metasploit, 2nd Edition

If you’ve spent any time in penetration testing, chances are you’ve crossed paths with Metasploit. The second edition of Metasploit tries to bring the book in line with how pentesters are using the tool. It mostly succeeds, with some caveats ...

Security awareness training isn’t stopping breaches. Can AI help?

In this Help Net Security video, Mick Leach, Field CISO at Abnormal AI, explores why security awareness training (SAT) is failing to reduce human error, the top cause of cybersecurity incidents. He discusses how AI can transform SAT into a ...

48% of security pros are falling behind compliance requirements

32% of security professionals think they can deliver zero-vulnerability software despite rising threats and compliance regulations, according to Lineaje. Meanwhile, 68% are more realistic, noting they feel uncertain about achieving this near ...

Finding Stability in Cloud-Native Security Solutions

How Critical is Stability in Cloud-Native Security? Stability is an essential aspect of a reliable cloud-native security strategy. Do you ever question, how can a company ensure stability? The answer lies with Non-Human Identities (NHIs) and ...

Six Levers That Quietly Change Your Risk and How to Spot Them

Most people think risk only moves when you add controls, but five other hidden forces are quietly reshaping your exposure behind the scenes. This post breaks down the six levers that actually move the math, so you can stop treating risk like a ...

Future-proofing your enterprise: the role of crypto-agile PKI in long-term security

Traditional PKI creates bottlenecks that slow digital transformation due to manual processes and limited integration. As organizations adopt cloud, DevOps, and Zero Trust, scalable and automated certificate management becomes essential. Modern ...

OffensiveCon25 – Pwn20wn Winners Announcement

Author/Presenter: Brian Gore and Dustin Childs Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events ...

OffensiveCon25 – Pwn20wn Winners Announcement

Author/Presenter: Brian Gore and Dustin Childs Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events ...

Addressing Our ‘Age of Insecurity’ — in Cyber Too

Recent cyber attacks have given a new urgency to business resiliency in the public and private sectors. Let’s explore the problem and some workable answers. The post Addressing Our ‘Age of Insecurity’ — in Cyber Too appeared first on ...

Week in review: NIST proposes new vulnerabilities metric, flaws in NASA’s open source software

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerabilities found in NASA’s open source software Vulnerabilities in open source software developed and used in-house by NASA could be ...

Scalable Strategies for Managing Cloud Machine Identities

Are We Doing Enough to Safeguard Our Machine Identities? Securing human identities and their access permissions has been a focal point for most organizations. But, have we addressed a largely overlooked and equally crucial aspect – the ...

Ensuring Safety in Your Secrets Vaulting Techniques

Is Your Organization Unlocking Optimum Secrets Vaulting Possibilities? A particularly striking component is Non-Human Identities (NHIs). They have become a vital aspect of many businesses’ strategies, especially those that operate. This article ...

Is Innovation Driving Better NHI Management?

How is Innovation Paving the Way for Improved NHI Management? Innovation stands as the lighthouse amidst the tumultuous sea of evolving threats. But how does this innovation affect Non-Human Identities (NHIs) management, a cornerstone of modern ...

How Secrets Scanning is Evolving for Better Security

Why is Secrets Scanning Important in Cybersecurity? Secrets scanning is paramount in cybersecurity. It involves identifying and mitigating risks associated with sensitive data like passwords, tokens, or keys, collectively known as “secrets”. ...

Run SCA and SAST scans on your project

Looking to get your CASA assessment done? Scan your project for vulnerabilities using Fluid AttacksContinue reading on Medium »

BSidesLV24 – Keynotes: Closing Ceremony

Author/Presenter: Daemon Tamer Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

New Relic Enhances Software Reliability with GitHub Copilot Integration

New Relic's integration with GitHub Copilot to boost productivity and enhance software reliability. Discover more now! The post New Relic Enhances Software Reliability with GitHub Copilot Integration appeared first on Security Boulevard.