Application Security News and Articles


DEF CON 32 – From Theory To Reality Demonstrating The Simplicity Of SPARTA Techniques

Author/Presenter: Randi Tinney Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Hiding in Plain Sight: The Hidden Dangers of Geolocation in Cloud Security

One of the biggest challenges organizations face today is detecting malicious activity in cloud environments. As highlighted in MixMode’s latest Threat Research Report, cybercriminals are increasingly leveraging trusted cloud providers like ...

Emulating the Deceptive Akira Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by Akira ransomware since its emergence in March 2023. Akira operators provide victims the option to pay for either file decryption or data deletion rather than being ...

Aembit Earns SOC 2 Type II Recertification for Ongoing Security and Compliance

2 min readThis certification validates our ongoing commitment to protecting customer data and maintaining rigorous security controls. The post Aembit Earns SOC 2 Type II Recertification for Ongoing Security and Compliance appeared first on ...

Randall Munroe’s XKCD ‘Scream Cipher’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Scream Cipher’ appeared first on Security Boulevard.

Enterprise Privacy Management with Feroot AlphaPrivacy AI: Implementation Guide

The post Enterprise Privacy Management with Feroot AlphaPrivacy AI: Implementation Guide appeared first on Feroot Security. The post Enterprise Privacy Management with Feroot AlphaPrivacy AI: Implementation Guide appeared first on Security Boulevard.

DISA Breach Highlights Need for Stronger Oversight: AppOmni CSO

Employment screening company DISA says data of 3.3 million people was exposed in a data breach lasts year, prompting AppOmni CSO Cory Michal to say that data collection companies like DISA and National Public Data need more oversight, ...

Spring 2025 Events Spotlight

Discover all of the exciting events you can find us at this March and April! The post Spring 2025 Events Spotlight appeared first on Security Boulevard.

Beware the Cookie Monster: Cyberhaven Extension Vulnerability Allowed Cookie Theft

We discovered a vulnerability in Cyberhaven's browser extension that allowed attackers to steal arbitrary cookies from their victims. The post Beware the Cookie Monster: Cyberhaven Extension Vulnerability Allowed Cookie Theft appeared first on ...

Lock Out Hackers: Why Every School Needs Strong Passwords

Lock Out Hackers: Why Every School Needs Strong Passwords We recently hosted a live webinar to help kick off 2025, encouraging you to strengthen your school district’s cybersecurity and online safety systems. This webinar featured two expert ...

New Anubis Ransomware Could Pose Major Threat to Organizations

Threat Intelligence firm Kela warns of a new ransomware group called Anubis operating as a RaaS service with an extensive array of options for affiliates. The post New Anubis Ransomware Could Pose Major Threat to Organizations appeared first on ...

What cybersecurity pros read for fun

While cybersecurity pros spend much of their time immersed in technical reports, risk assessments, and policy documents, fiction offers a refreshing perspective on security and hacking. Great cyber-themed novels can teach lessons on human ...

8 Reasons to Try SonarQube Free Tier

SonarQube Cloud Free tier offers more features that make it a viable alternative to SonarQube Community Build, including pull request analysis, enhanced security, and support for more programming languages. It also provides a maintenance-free ...

DEF CON 32 – How I Developed A Low Cost Raspberry Pi Based Device For ADS B Spoof

Author/Presenter: Angelina Tsuboi Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Understanding JWT: From Basics to Advanced Security

Discover how JSON Web Tokens (JWT) revolutionize web authentication. This guide covers everything from basic concepts to advanced security measures, helping you implement secure, scalable authentication in modern applications. The post ...

The Future of AI Security and Application Security Testing

AI-driven apps need advanced application security testing to prevent threats. Learn how HCL AppScan protects AI applications.Continue reading on HCL AppScan »

Building a security-minded development team: DevSecOps tools and SDLC best practices

In an increasingly adversarial threat landscape, software security can't be just one more checkpoint on the road to your next release. It should be integral to how every member of your development team works, from developers and DevOps ...

Is your email or password among the 240+ million compromised by infostealers?

For the second time since the start of 2025, a huge number of login credentials extracted from infostealer logs has been added to the database powering the HaveIBeenPwned (HIBP) site and breach notification service. In January 2025, HIBP’s ...

Fortanix protects enterprises from AI and quantum computing threats

Fortanix announced new capabilities to its data encryption and key management platform. Even as organizations struggle to manage the rising costs and complexity of data security, advances in AI and quantum computing will render current ...

Identity Security Is the Missing Link To Combatting Advanced OT Threats

Sophisticated OT threats, like living-off-the-land (LotL) attacks, exploit identity vulnerabilities to infiltrate critical infrastructure. Find out how robust identity security and unified exposure management can help you detect, prioritize and ...