Application Security News and Articles


China Admitted to US That It Conducted Volt Typhoon Attacks: Report

In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure. The post China Admitted to US That It Conducted Volt Typhoon Attacks: Report appeared first on SecurityWeek.

Rising Tides: Bryson Bort on Cyber Entrepreneurship and the Needed Focus on Critical Infrastructure

Very few people in the cybersecurity industry do not know, or know of, Bryson Bort. Yes, he’s the CEO/Founder of SCYTHE, but he’s also the co-founder of ICS Village (the next one at RSA Conference from April 28 to May 1, 2025). This event, ...

Microsoft’s April Security Update of High-Risk Vulnerabilities in Multiple Products

Overview On April 9, NSFOCUS CERT detected that Microsoft released a security update patch for April, fixing 126 security problems in widely used products such as Windows, Microsoft Office, Azure, Microsoft Edge for iOS, Microsoft Visual Studio, ...

KELA Digital Cyber Analysts improves security teams’ efficiency

KELA unveiled Digital Cyber Analysts, next-generation AI-powered digital employees designed to transform how security teams consume, prioritize, and act on threat intelligence. These always-on, interactive agents enhance the speed and efficiency ...

Authentication vs. Authorization: Understanding the Pillars of Identity Security

Authentication and authorization, while distinct, work in concert to create secure and usable applications. Authentication ensures that users are who they claim to be, while authorization ensures they can only access what they're permitted to see ...

Why security culture is crypto’s strongest asset

In this Help Net Security interview, Norah Beers, CISO at Grayscale, discusses key security challenges in managing crypto assets, adversary tactics, private key management, and securing both hot and cold wallets. From a threat modeling ...

Ransomware groups push negotiations to new levels of uncertainty

Ransomware attacks increased by nearly 20% in 2024, and the severity rose by 13%, according to At-Bay. The blast radius of ransomware continues to grow as businesses impacted by attacks on vendors and partners increased 43%, while the average ...

Why remote work is a security minefield (and what you can do about it)

Remote work is seen as more than a temporary solution, it’s a long-term strategy for many organizations. Remote work cybersecurity challenges Unsecured networks: Workers often operate from home or public Wi-Fi networks that don’t have the ...

iOS devices face twice the phishing attacks of Android

2024 brought about countless new cybersecurity challenges including significant growth of the mobile threat landscape, according to Lookout. Threat actors, ranging from nation-states to individuals, are increasingly targeting mobile devices for ...

New infosec products of the week: April 11, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Index Engines, Jit, RunSafe Security, and Seal Security. Jit launches AI agents to ease AppSec workload Jit has launched its new AI agents to ...

Get AirSwap (sAST) Rewards and Maximize APY

A Beginner's Guide To Staking $sAST from AirSwapContinue reading on Medium »

Reimagining Democracy

Imagine that all of us—all of society—have landed on some alien planet and need to form a government: clean slate. We do not have any legacy systems from the United States or any other country. We do not have any special or unique interests ...

How to Obtain sAST Fast

A quick guide to securing sAST effortlessly.Continue reading on Medium »

Agentic AI & Cybersecurity: A Powerful Partnership

The post Agentic AI & Cybersecurity: A Powerful Partnership appeared first on AI Security Automation. The post Agentic AI & Cybersecurity: A Powerful Partnership appeared first on Security Boulevard.

Trump Strips Security Clearances of Ex-CISA Head Krebs, SentinelOne

President Trump stripped former CISA head Chris Krebs of his security clearances, accusing him of disloyalty for claiming the 2020 election was safe and disagreeing with him regarding the pandemic. SentinelOne, where Krebs is an executive, also ...

Smart Secrets Vaulting Solutions for Modern Businesses

What Makes Secrets Vaulting Essential for Modern Business Security? Non-human identities (NHIs) and secrets management play a critical role in safeguarding sensitive data. NHIs, or machine identities, are created by combining a unique encrypted ...

Ensuring Stability in Your NHI Security Strategy

Are You Overlooking an Essential Part of Your Cybersecurity Strategy? When it comes to solidifying your organization’s cybersecurity strategies, an often-overlooked aspect is Non-Human Identities (NHIs). Given the increasing reliance on the ...

Frequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic Applications

The emergence of Model Context Protocol for AI is gaining significant interest due to its standardization of connecting external data sources to large language models (LLMs). While these updates are good news for AI developers, they raise some ...

Unlock Total API Visibility and Control, Cost-Effectively

In the current economic environment, IT and security leaders face significant challenges. Budget optimization and prioritizing initiatives that provide real business value are crucial, particularly amidst a growingly complex and threatening ...

How to Decrease Your Enumeration Fraud Before Visa’s New Rules Take Effect

Learn how to stop enumeration fraud before Visa’s new thresholds take effect. Protect your business with DataDome’s Cyberfraud Protection Platform. The post How to Decrease Your Enumeration Fraud Before Visa’s New Rules Take Effect appeared ...