Application Security News and Articles


6 Effective Secret Scanning Tools

Secret scanning tools identify and protect sensitive information that may be exposed within software assets. Developers often embed secrets like API keys, database credentials, and encryption keys in source code—but if left unprotected, these ...

Randall Munroe’s XKCD ‘Giants’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Giants’ appeared first on Security Boulevard.

Security Pros Push Back as Trump Orders Halt to Cyber Ops vs. Russia

The Trump Administration's orders to the DoD and CISA to halt cyber operations and investigations against Russia is a gift to the United States' longtime foreign adversary and makes the country less safe, according to cybersecurity ...

Security Pros Push Back as Trump Orders Halt to Cyber Ops vs. Russia

The Trump Administration's orders to the DoD and CISA to halt cyber operations and investigations against Russia is a gift to the United States' longtime foreign adversary and makes the country less safe, according to cybersecurity ...

CISA: No Change on Defending Against Russian Cyber Threats

The CISA public clarification follows news the Trump administration is temporarily pausing offensive cyber operations against Moscow. The post CISA: No Change on Defending Against Russian Cyber Threats appeared first on SecurityWeek.

Online crime-as-a-service skyrockets with 24,000 users selling attack tools

The growth of AI-based technology has introduced new challenges, making remote identity verification systems more vulnerable to attacks, according to iProov. Innovative and easily accessible tools have allowed threat actors to become more ...

Innovation vs. security: Managing shadow AI risks

In this Help Net Security video, Tim Morris, Chief Security Advisor at Tanium, shares practical best practices to help organizations balance innovation and security while leveraging AI. Morris warns of an even riskier shadow AI trend in which ...

DEF CON 32 – Cybersecurity Schoolhouse Rock

Author/Presenter: Avi McGrady Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Have you silenced WAF alerts in your SIEM or just stopped sending them altogether? You're not alone. Many SOCs find themselves overwhelmed by the sheer volume of noise generated by traditional WAFs, forcing them to choose between alert fatigue or ...

What is Identity Attack Surface Management (IASM)

Discover how Identity Attack Surface Management (IASM) helps protect digital identities, mitigate cyber threats, and enhance security across hybrid environments. The post What is Identity Attack Surface Management (IASM) appeared first on ...

Privacy Roundup: Week 9 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 23 FEB 2025 - 1 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due to ...

AI is Evolving Faster Than Our Ability to Secure It

As AI continues to evolve, so will the associated security risks, and cybersecurity professionals must remain vigilant and proactive. The post AI is Evolving Faster Than Our Ability to Secure It first appeared on Security Boulevard. The post AI ...

AI is Evolving Faster Than Our Ability to Secure It

As AI continues to evolve, so will the associated security risks, and cybersecurity professionals must remain vigilant and proactive. The post AI is Evolving Faster Than Our Ability to Secure It appeared first on Security Boulevard.

Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits

Amazon claims its researchers have combined cat qubit technology and additional quantum error correction components onto a microchip that can be manufactured in a scalable fashion. The post Quantum Wars: Google, Microsoft, and Amazon’s ...

Mimic Raises $50 Million to Stop Ransomware Attacks

Ransomware defense startup Mimic has raised $50 million in a Series A funding round led by Google Ventures and Menlo Ventures. The post Mimic Raises $50 Million to Stop Ransomware Attacks appeared first on SecurityWeek.

US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack

The US government has seized roughly $31 million in cryptocurrency stolen in 2021 from Uranium Finance. The post US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack appeared first on SecurityWeek.

Cybersecurity M&A Roundup: 28 Deals Announced in February 2025

Cybersecurity-related merger and acquisition (M&A) deals announced in February 2025.  The post Cybersecurity M&A Roundup: 28 Deals Announced in February 2025 appeared first on SecurityWeek.

First 90 Days: Exploring the CISO Role

The first 90 days in any new role are critical, but for a Chief Information Security Officer (CISO), they can be make-or-break. This period is your opportunity to understand the organization, build relationships, and set the foundation for a ...

Vulnerable Paragon Driver Exploited in Ransomware Attacks

Ransomware operators exploit a vulnerable Paragon driver in BYOVD attacks to elevate privileges to System. The post Vulnerable Paragon Driver Exploited in Ransomware Attacks appeared first on SecurityWeek.

New York SHIELD Act: Everything You Need to Know for Compliance

New York’s Privacy Laws: A Legacy and a Challenge New York is a leader in finance, culture, and technology. Less than a decade ago, it was also a forerunner in privacy and cybersecurity regulation. As the home of Wall Street and a hub for ...