Application Security News and Articles


Digital Ghosting, The Third Step in Breach Readiness

Learn how Digital Ghosting and microsegmentation strategies can enhance cyber defense, boosting your organization's breach readiness. The post Digital Ghosting, The Third Step in Breach Readiness appeared first on ColorTokens. The post Digital ...

GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability

Professional hackers have built a network of ASUS routers that can survive firmware upgrades, factory reboots and most anti-malware scans. The post GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability appeared first on ...

Streamline SCA with Sonatype’s build-safe automation

As open source adoption accelerates across the enterprise, so too does its complexity. Development teams are building software with hundreds of components, each carrying its own risks, release cycles, and dependencies. The post Streamline SCA ...

LogonBox VPN 2.4.12 – Now Available

IntroductionLogonBox is pleased to announce the immediate availability of LogonBox VPN 2.4.12.This release includes performance improvements for large user counts, disabled account license changes, and retries for cloud-delivered OTP messages. ...

Microsoft Authenticator Phases Out Password Features and Apple Watch Support

Microsoft is phasing out password features in Authenticator. Transition to Edge for autofill and explore passwordless authentication. Learn more! The post Microsoft Authenticator Phases Out Password Features and Apple Watch Support appeared first ...

19 Billion Passwords Leaked: Protect Yourself from Cyber Threats

Discover the implications of the 19 billion passwords leaked in the RockYou2024 breach. Learn essential actions to secure your accounts now! The post 19 Billion Passwords Leaked: Protect Yourself from Cyber Threats appeared first on Security ...

k0s Enters CNCF Sandbox: A New Lightweight Kubernetes Option

How k0s, a lightweight Kubernetes distribution, joins the CNCF Sandbox, enhancing cloud-native computing. Explore its features today! The post k0s Enters CNCF Sandbox: A New Lightweight Kubernetes Option appeared first on Security Boulevard.

AWS Centralized Product Lifecycle Page: Enhance Transparency & Info

Discover AWS's new Product Lifecycle page for tracking service changes and updates. Stay informed and enhance your cloud strategy today! The post AWS Centralized Product Lifecycle Page: Enhance Transparency & Info appeared first on Security ...

Getting Ahead of AI Risk: What Comes Next for Tenable

The acquisition of Apex Security adds a powerful new layer of visibility, context and control to the Tenable One Exposure Management Platform to govern usage, enforce policy and control exposure across both the AI that organizations use and the ...

Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari

PALO ALTO, California, 29th May 2025, CyberNewsWire The post Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari appeared first on Security Boulevard.

Unmasking ECH: Why DNS-at-the-Root-of-Trust Holds the Key to Secure Connectivity

Encrypted Client Hello (ECH) has been in the news a lot lately. For some background and relevant and recent content, see: IETF Proposed Standard Cloudflare Blog from 2023 announcing ECH support RSA 2025 talk: ECH: Hello to Enhanced Privacy or ...

Microsoft unveils “centralized” software update tool for Windows

Microsoft is looking to streamline the software updating process for IT admins and users by providing a Windows-native update orchestration platform, and to help organizations upgrade their computer fleet to Windows 11 with the help of Windows ...

Your IT Infrastructure is Hybrid. So Why Not Your Security Model?

A hybrid security model provides the ability to deploy a variety of rule sets for specific applications while providing a single, centralized way to manage it all. The post Your IT Infrastructure is Hybrid. So Why Not Your Security Model? ...

Victoria’s Secret Website Taken Offline After Cyberattack

Website remains offline following suspected cyber incident, as experts warn of escalating threats targeting major retailers The post Victoria’s Secret Website Taken Offline After Cyberattack appeared first on SecurityWeek.

Adidas Data Breach Linked to Third-Party Vendor

Adidas said hackers accessed a “third-party customer service provider” and stole customer information. The post Adidas Data Breach Linked to Third-Party Vendor appeared first on SecurityWeek.

An Enterprise Playbook to Defending Against Volt Typhoon 

An identity threat detection approach built on access intelligence is key to identifying and disrupting campaigns like Volt Typhoon.  The post An Enterprise Playbook to Defending Against Volt Typhoon  appeared first on Security Boulevard.

Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management

Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization. The post Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management appeared first on SecurityWeek.

RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector

Executives are under digital siege—and most don’t even know it. Related: Shareholders sue over murder At RSAC 2025, I sat down with Chuck Randolph, SVP of Strategic Intelligence and Security at 360 Privacy, to unpack a … (more…) The post ...

Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025

Agentic AI can be a great tool for many of the ‘gray area’ tasks that SOC analysts undertake. The post Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 appeared first on SecurityWeek.

AI Agents and APIs: Understand Complexities Today to Authenticate Tomorrow

The growth of AI agents puts the need for robust API authentication practices front and center, so today we’re highlighting two AI agent scenarios and how you could deal with their typical authentication challenges.  The post AI Agents and ...