Application Security News and Articles


Can AI-powered gamified simulations help cybersecurity teams keep up?

Traditional training often lacks the hands-on experience cybersecurity teams need to counter advanced threats. AI-powered gamified simulations combine artificial intelligence with interactive learning to enhance their skills. Conventional ...

AI threats and workforce shortages put pressure on security leaders

In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a ...

Indictments of Chinese Cyber Spies Reveal Hacker-For-Hire Operation

The U.S. DOJ indicted a dozen Chinese nationals for their role in a years-long hacker-for-hire campaign that included the Chinese government using private companies and freelance hackers to steal data from U.S. and other governments while ...

New infosec products of the week: March 7, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Outpost24, Palo Alto Networks, Red Canary, and Sonatype. Outpost24 introduces CyberFlex to streamline attack surface management and pen testing Outpost24 ...

Armis Acquires Otorio to Expand OT and CPS Security Suite

The transaction is valued in the range of $120 million and gives Armis an on-premises CPS solution The post Armis Acquires Otorio to Expand OT and CPS Security Suite appeared first on SecurityWeek.

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

The $1.4 billion ByBit cryptocurrency heist combined social engineering, stolen AWS session tokens, MFA bypasses and a rigged JavaScript file. The post How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist appeared ...

Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations

Agentic AI excels when APIs are impractical, but enterprise SOCs usually have robust APIs. Learn why unified solutions like Morpheus AI outperform agentic approaches. The post Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security ...

How can NHIs be incorporated into our overall security strategy?

Do Non-Human Identities Play a Significant Role in Our Security Strategy? Indeed, they do. Non-Human Identities (NHIs) are becoming increasingly crucial in the security scenario and their importance in corporate IT ecosystems can’t be ...

What are the key security controls for NHIs at the executive level?

Why Should CISOs Consider Non-Human Identities Security Controls? Did you know NHIs represent a significant portion of all entities in a typical network environment? A lack of robust Non-Human Identities (NHIs) security controls can pose ...

How can I align NHI management with our digital transformation initiatives?

Why is Non-Human Identities Management Critical for Digital Transformation? Have you ever considered the sheer quantity of non-human identities (NHIs) that exist within your corporate network? These NHIs, also known as machine identities, play an ...

What role do NHIs play in our organization’s security posture?

What Essential Role Do Non-Human Identities (NHIs) Play in Our Organization’s Security Posture? When our world increasingly moves towards digitalization, one quite critical question that could be floating around your mind is, “What is the ...

What Is Data Leak Prevention? Benefits and Best Practices

Today’s organizations work with incredible quantities of data. From corporate trade secrets to customers’ and employees’ personal information, much of this data is not fit for public consumption. But with growing volumes and complex IT ...

What Is an Identity Provider (IdP) and How Does It Work?

Managing online accounts shouldn’t feel like a chore. But when so many websites and systems require credentials, it’s hard to keep track. The post What Is an Identity Provider (IdP) and How Does It Work? appeared first on Security Boulevard.

Patch Management Guide: Benefits and Best Practices

Developers periodically review software and release patches to remedy any bugs. When patches happen often, they can be hard to track. The post Patch Management Guide: Benefits and Best Practices appeared first on Security Boulevard.

DEF CON 32 – War Stories – Hacking Millions Of Modems And Investigating Who Hacked My Modem

Author/Presenter: Sam Curry Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Votiro’s Proven Protection: Retroscan for Zero-Day Threats

The post Votiro’s Proven Protection: Retroscan for Zero-Day Threats appeared first on Votiro. The post Votiro’s Proven Protection: Retroscan for Zero-Day Threats appeared first on Security Boulevard.

Daniel Stori’s Turnoff.US: ‘Docker Panacea’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘Docker Panacea’ appeared first on Security Boulevard.

Emulating the Relentless RansomHub Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by RansomHub ransomware since its emergence in February 2024. This sophisticated ransomware employs double extortion techniques and shares notable similarities with Knight ...

Why Understanding Your Secrets is the Key to Faster Remediation

Up to 27 days to fix a leaked secret? We feel your pain. Explore how contextual secrets management helps you take control, cut remediation time, and strengthen your security posture. Don't just detect, understand your secrets. The post Why ...

Inside Black Basta Ransomware Group’s Chat Leak

Internal conflicts within the notorious Black Basta ransomware group have led to a massive leak of the group’s internal chat messages. While the messages are disorganized and full of internal jargon, they contain a wealth of insight into the ...