Application Security News and Articles


The hidden risk lurking in your infrastructure: mismanaged certificates

Mismanaged certificates in hybrid environments pose a critical but often invisible risk to enterprise operations. Expired internal PKI certificates can lead to costly outages, compliance failures, and long-term damage especially in regulated ...

INE Security and RedTeam Hacker Academy Announce Partnership to Advance Cybersecurity Skills in the Middle East

Cary, North Carolina, 28th May 2025, CyberNewsWire The post INE Security and RedTeam Hacker Academy Announce Partnership to Advance Cybersecurity Skills in the Middle East appeared first on Security Boulevard.

LogicGate brings risk management to individual business units

LogicGate is elevating its Risk Cloud platform with a new Operational Risk Management (ORM) Solution designed to allow organizations to prioritize risks based on process criticality and financial impact. By helping minimize operational ...

Why data provenance must anchor every CISO’s AI governance strategy

Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording ...

Woodpecker: Open-source red teaming for AI, Kubernetes, APIs

Woodpecker is an open-source tool that automates red teaming, making advanced security testing easier and more accessible. It helps teams find and fix security weaknesses in AI systems, Kubernetes environments, and APIs before attackers can ...

GitHub becomes go-to platform for malware delivery across Europe

Phishing has become the go-to method for attackers looking to get past security controls and access sensitive environments in Europe, according to Netskope. Users are now constantly dealing with phishing attempts, which have become so common and ...

Hottest cybersecurity open-source tools of the month: May 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Vuls: Open-source agentless vulnerability scanner Vuls is an open-source tool that ...

Choosing a secrets manager for multi-cloud: Doppler vs. cloud-native tools

Doppler helps teams manage secrets across clouds with one source of truth. Learn how it simplifies security, scaling, and compliance in multi-cloud environments. The post Choosing a secrets manager for multi-cloud: Doppler vs. cloud-native tools ...

Zscaler to Acquire MDR Specialist Red Canary

Zscaler signals a big push into the security-operations market with the announcement of plans to buy Denver-based Red Canary. The post Zscaler to Acquire MDR Specialist Red Canary appeared first on SecurityWeek.

Understanding the Cookie-Bite MFA Bypass Risk

The Cookie-Bite attack is an advanced evolution of Pass-the-Cookie exploits. This tactic bypasses Multi-Factor Authentication (MFA) by leveraging stolen authentication cookies—such as Azure Entra ...

eSkimming Security – Driving Bottom Line Results through Fraud Reduction and Revenue Maximization

by Source Defense Even with the PCI DSS 4.0 deadline now behind us, many organizations are still exposed to costly eSkimming threats and compliance gaps. Source Defense recently hosted a webinar to explore how compliance actually drives better ...

BSidesLV24 – PasswordsCon – Long Live Short Lived Credentials – Auto-Rotating Secrets At Scale

Author/Presenter: Dwayne McDaniel Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack

Sina Gholinejad pleaded guilty to computer-fraud and wire-fraud-conspiracy charges linked to the Robbinhood ransomware hit on Baltimore. The post Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Drafting’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Drafting’ appeared first on Security Boulevard.

RSA and Bitcoin at BIG Risk from Quantum Compute

PQC PDQ: Researchers find we’ll need 20 times fewer qubits to break conventional encryption than previously believed. The post RSA and Bitcoin at BIG Risk from Quantum Compute appeared first on Security Boulevard.

Seceon Wins “MSP Platform Provider Vendor of the Year” at Technology Reseller Awards 2025

At Seceon, we’re honored to announce that we have been named the “MSP Platform Provider Vendor of the Year” at the Technology Reseller Awards 2025. This recognition is a meaningful milestone that celebrates our ongoing commitment to ...

SBOM management and generation: How Sonatype leads in software supply chain visibility

As software supply chain threats become more complex, organizations need more than just vulnerability scanning — they need complete visibility into the components that make up their applications. The post SBOM management and generation: How ...

Protecting Biomedical Devices in the Large Healthcare Enterprise

Discover how Claroty and ColorTokens secure IoMT and prevent lateral movement in healthcare networks with agentless microsegmentation and visibility. The post Protecting Biomedical Devices in the Large Healthcare Enterprise appeared first on ...

DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a managed service provider. The post DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities appeared first on SecurityWeek.

Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas 

An alert from CISA, FBI, EPA and DOE came after CISA observed attacks by “unsophisticated” cyber actors leveraging “basic and elementary intrusion techniques” against ICS/SCADA systems.  The post Unsophisticated Actors, Poor Hygiene ...