Application Security News and Articles


Is Your Secrets Management Scalable?

Is Your Organization Achieving Scalable Secrets Management? How well does your organization manage its Non-Human Identities (NHIs) and their secrets? A cybersecurity expert often asked about the best methods for managing NHIs, especially where ...

Deceptive Signatures: Advanced Techniques in BEC Attacks

KEY TAKEAWAYS Sophistication of BEC Attacks: Business Email Compromise (BEC) attacks are becoming increasingly sophisticated, leveraging advanced social engineering, AI-driven personalization, and phishing kits in order to overcome MFA ...

DEF CON 32 – Exploiting Bluetooth: From Your Car To The Bank Account$$

Authors/Presenters: Yso & Martin Strohmeier Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Rust vs. C — Linux’s Uncivil War

Kernel Panic in the Rust Belt. Memory safety: GOOD. Cheese motion: BAD. The post Rust vs. C — Linux’s Uncivil War appeared first on Security Boulevard.

7 CSPM Tools to Secure Your Cloud Infrastructure

Cloud security covers a wide range of tools and frameworks, which makes it hard to implement. Cloud security posture management (CSPM) organizes the process. The post 7 CSPM Tools to Secure Your Cloud Infrastructure appeared first on Security ...

What Are Non-Human Identities? Challenges and Best Practices

Non-human identities (NHIs) power automation, cloud services, and DevOps workflows for many organizations. These digital entities enable seamless system interactions and even outnumber human identities in some cases. The post What Are Non-Human ...

Expanding Seceon’s Reach: A Strategic Partnership with Tech First Gulf

At Seceon’s 2025 Q1 Innovation and Certification Days, Khaled Al Najjar of Seceon engaged in an insightful discussion with Tech First Gulf (TFG) leaders Ram Reddy, Dolly Lakhani, and Pratik Patel about their partnership and the expansion of ...

Daniel Stori’s Turnoff.US: ‘Ubuntu Core’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘Ubuntu Core’ appeared first on Security Boulevard.

Background check, drug testing provider DISA suffers data breach

DISA Global Solutions, a Texas-based company that provides employment screening services (including drug and alcohol testing and background checks) for over 55,000 organizations, has suffered a cyber incident that led to a data breach, which ...

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks. The post Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts appeared first on SecurityWeek.

What Is Cybersecurity Performance Management? | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post What Is Cybersecurity Performance Management? | Kovrr appeared first on Security Boulevard.

North Korean Hackers Steal $1.5B in Cryptocurrency

It looks like a very sophisticated attack against the Dubai-based exchange Bybit: Bybit officials disclosed the theft of more than 400,000 ethereum and staked ethereum coins just hours after it occurred. The notification said the digital loot ...

Offensive AI Startup Dreadnode Secures $14M to Stress-Test AI Systems

Dreadnode is building “offensive machine learning” tools to safely simulate how AI models might be exploited in the wild. The post Offensive AI Startup Dreadnode Secures $14M to Stress-Test AI Systems appeared first on SecurityWeek.

Behind the Baseline: Reflecting on the launch of the Open Source Project Security Baseline

It's been a while since I've shared an update on the work Sonatype is doing in the open source ecosystem, so I'm excited to share an update on a few things we're doing in the space — and how it led to the creation of a new security standard in ...

News alert: INE secures spot in G2’s 2025 Top 50 education software rankings

Cary, NC, Feb. 25, 2025, CyberNewswire — INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small business leader in online course providers and ...

GhostGPT: An Uncensored AI Chatbot Empowering Cybercriminals

GhostGPT is revolutionizing cybercrime by providing hackers with an AI tool that bypasses ethical guardrails found in mainstream models. Available as little as $150, it enables even novice attackers to generate malicious code, craft phishing ...

DeepSeek Lure Using CAPTCHAs To Spread Malware

IntroductionThe rapid rise of generative AI tools has created opportunities and challenges for cybercriminals. In an instant, industries are being reshaped while new attack surfaces are being exposed. DeepSeek AI chatbot that launched on January ...

China-based Silver Fox spoofs healthcare app to deliver malware

Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering the ValleyRAT backdoor to unsuspecting users by disguising the malware as legitimate healthcare app (the Philips DICOM viewer), a ...

Seceon’s AI-Driven Cybersecurity: Insights from Bhabani Prasad, Deeptesh Chandra, and German Moreno

At Seceon’s 2025 Q1 Innovation and Certification Days, Seceon’s Bhabani Prasad engaged in a conversation with cybersecurity experts Deeptesh Chandra and German Moreno about the evolving threat landscape and how Seceon’s AI-powered platform ...

Skybox Security Shuts Down, Lays off Entire Workforce 

The sudden shutdown follows the sale of Skybox Security’s business and technology assets to rival Israeli cybersecurity firm Tufin.  The post Skybox Security Shuts Down, Lays off Entire Workforce  appeared first on SecurityWeek.