Application Security News and Articles


Staying Ahead in Cloud Security: Key Steps

How Can Non-Human Identities Enhance Cloud Security? As advancements in technology take us to the peaks of innovation, the threat landscape also evolves, posing unique challenges to cloud security. So, how do we stay ahead? The answer lies in ...

Unlocking the Benefits of Automated Secrets Vaulting

Why Should You Consider Automated Secrets Vaulting? How secure is your organization’s sensitive information within your cloud environment? With rampant digital threats and complex network systems, safeguarding Non-Human Identities (NHIs) and ...

The Transformative Role of AI in Cybersecurity

2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this ...

Top Healthcare RCM Company Enhances PHI Safeguards with Symmetry

SYMMETRY CUSTOMER CASE STUDY Top Healthcare RCM Company Enhances PHI Safeguards with Symmetry ABOUT Industry: Healthcare, Fintech Size: 10K+ Employees... The post Top Healthcare RCM Company Enhances PHI Safeguards with Symmetry appeared first on ...

DEF CON 32 – An Adversarial Approach To Airline Revenue Management Proving Ground

Authors/Presenters: Craig Lester Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Why Developers Still Hardcode Credentials

What Developers Tell Me About Hardcoded Credentials (and Why They’re Not Wrong)Continue reading on Medium »

Julianna Lamb on Choosing Authentication Platforms Over DIY

Stytch CTO Julianna Lamb explains why, when it comes to authentication, most organizations are going to be better off relying on a platform than trying to manage these processes at scale themselves. Julianna goes on to discuss the complexities of ...

Eric Brüggemann on Code Intelligence Launching Spark

Eric Brüggemann, CEO of Code Intelligence, introduces Spark, their new AI-driven security testing tool. Spark automates vulnerability detection by integrating into CI/CD pipelines and eliminating the need for developers to manually write ...

Creating realistic, secure test data for Databricks

Databricks is a data analytics platform built to handle the scale and complexity of today’s data. Learn how Tonic integrates seamlessly with Databricks to generate synthetic test data based on production data that is both complex enough to be ...

News alert: Doppler announces integration with Datadog to streamline credential security

San Francisco, Calif., Jan. 30, 2025, CyberNewswire — Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog, a cloud application monitoring and security platform.. This collaboration provides ...

Ransomware Scum — Out For Blood: NYBCe is Latest Victim

Bloody hell: New York Blood Center Enterprises crippled by ransomware scrotes unknown. The post Ransomware Scum — Out For Blood: NYBCe is Latest Victim appeared first on Security Boulevard.

In Other News: Browser Syncjacking, Fake AWS Hack, Google Blocked 2M Bad Apps

Noteworthy stories that might have slipped under the radar: stealing browser data via Syncjacking, hackers falsely claim AWS breach, Google prevented 2 million bad apps from reaching Google Play.  The post In Other News: Browser Syncjacking, ...

Zimperium’s Protection Against Tria Stealer’s SMS Data Theft

As part of our ongoing mission to identify emerging threats to mobile security, our zLabs team shares how we can help protect you against Tria Stealer. The post Zimperium’s Protection Against Tria Stealer’s SMS Data Theft appeared first on ...

Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Learn how the F1 score helps you choose the right tool to strengthen your security posture. The post Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score appeared first on Security Boulevard.

DEF CON 32 – Famous and Not So Famous Unsolved Codes

Authors/Presenters: Elonka Dunin, Klaus Schmeh Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

SlackPirate Set Sails Again! Or: How to Send the Entire “Bee Movie” Script to Your Friends in Slack

TLDR: SlackPirate has been defunct for a few years due to a breaking change in how the Slack client interacts with the Slack API. It has a new PR by yours truly to let you loot Slack again out of the box, and a BOF exists to get you all the ...

Analyzing DeepSeek’s System Prompt: Jailbreaking Generative AI

DeepSeek, a disruptive new AI model from China, has shaken the market, sparking both excitement and controversy. While it has gained attention for its capabilities, it also raises pressing security concerns. Allegations have surfaced about its ...

Fenix24 Acquires vArmour to Boost Cyber Resiliency Services

Fenix24 this week acquired vArmour to add an ability to detect the relationship between software, as part of an effort to extend the services it provides to enable organizations to recover faster from a cyberattack. The post Fenix24 Acquires ...

How Fraud is Eating Away at Food Delivery Profits

The food delivery industry has a fraud problem. With slim profit margins already under pressure, bad actors are exploiting vulnerabilities on both the consumer and courier sides of delivery platforms. The post How Fraud is Eating Away at Food ...

Italy Blocks Access to the Chinese AI Application DeepSeek to Protect Users’ Data

Italy’s data protection authority expressed dissatisfaction with DeepSeek’s response to its query about what personal data is collected, where it is stored and how users are notified. The post Italy Blocks Access to the Chinese AI Application ...