Application Security News and Articles


7 Ransomware Predictions for 2025: From AI Threats to New Strategies

Security leaders have fought to keep pace with rapidly evolving ransomware tactics for decades, and 2024 served as yet another reminder of the dynamic and persistent nature of the ransomware threat. Attacks are more personalized, sophisticated, ...

Staying Ahead with Enhanced IAM Protocols

Staying Ahead in a Fraught Landscape? Is it possible to stay ahead with cybersecurity threats? With the increased digitization of systems, our reliance on machines has skyrocketed, necessitating the need for an enhanced Identity Access Management ...

Scalable Solutions for Global Secrets Management

Are Your Secrets Secure in a Cloud World? Where robust digital identities govern access to resources, the effective management of Non-Human Identities (NHIs) becomes paramount. But how significantly does the approach to secure these identities ...

Empower Your Security with Advanced NHI Detection

Why is NHI Detection Crucial in Today’s Cybersecurity Landscape? Imagine being able to mitigate security risks, meet regulatory compliance, save on operational costs, and increase efficiency, all by refining one aspect of your cybersecurity ...

Ensuring Compliance with Secure Secrets Vaulting

Why is Secure Secrets Vaulting a Critical Factor? The requirement to manage Non-Human Identifiers (NHIs) and their secrets with utmost precision is more vital than ever. With the surge of massive amounts of data traversing through numerous ...

Alibaba’s Qwen 2.5-Max: The AI Marathoner Outpacing DeepSeek and Catching OpenAI’s Shadow

Discover how Alibaba's Qwen 2.5-Max AI model with Mixture-of-Experts architecture outperforms DeepSeek V3 in key benchmarks, challenges OpenAI, and revolutionizes healthcare, finance, and content creation. Explore technical breakthroughs and ...

DEF CON 32 – Tough Adversary Don’t Blame Sun Tzu

Author/Presenter: Gregory Carpenter, DrPH Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and ...

Introducing WAF Rule Tester: Test with Confidence, Deploy without Fear | Impart Security

Security teams can now validate WAF rules before they hit production, thanks to Impart Security's new WAF Rule Tester. No more crossing fingers and hoping for the best when deploying new rules. The Old Way: Hope-Driven Security ‍ Traditionally, ...

How to Instantly Assess Your Vulnerability to Bot Attacks

Instantly assess your website’s vulnerability to bot attacks with DataDome’s free Bot Vulnerability Assessment. Get real-time insights & secure your business today. The post How to Instantly Assess Your Vulnerability to Bot Attacks ...

The OWASP NHI Top 10 and AI risk: What you need to know

Identity management has long been a pillar of any sound cybersecurity program, ensuring that only authorized persons and machines have access to specific data and systems. Today, the rapid adoption of artificial intelligence (AI) is making it ...

API Security Is At the Center of OpenAI vs. DeepSeek Allegations

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one in the AI community today.  According to multiple reports, OpenAI and Microsoft have been investigating whether ...

Randall Munroe’s XKCD ‘Muons’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Muons’ appeared first on Security Boulevard.

SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws

Watch this: Want more “speculative execution” bugs? You’re gonna be in a great mood all day. The post SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws appeared first on Security Boulevard.

Our Digital Footprints are Breadcrumbs for Mapping our Personal Behavior

The Government Accountability Office states that customers are usually unaware of the potential privacy risks and biases that arise from use of personal information. The post Our Digital Footprints are Breadcrumbs for Mapping our Personal ...

Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)

CVE-2024-40891, a command injection vulnerability in Zyxel CPE Series telecommunications devices that has yet to be fixed by the manufacturer, is being targeted by attackers, cybersecurity company Greynoise has warned. Successful exploitation ...

New Zyxel Zero-Day Under Attack, No Patch Available

GreyNoise reports active exploitation of a newly discovered zero-day vulnerability in Zyxel CPE devices. There are no patches available. The post New Zyxel Zero-Day Under Attack, No Patch Available appeared first on SecurityWeek.

How to Find Old Accounts for Deletion

Old accounts are often unmaintained and forgotten - which can be problematic when you want to "clean up" some of your digital footprint by deleting them or go back to secure them with stronger passwords/MFA. How do you find these old accounts ...

Codefinger Ransomware: Detection and Mitigation Using MixMode

The Codefinger ransomware represents a new frontier in cyber threats, specifically targeting AWS S3 buckets. By exploiting Server-Side Encryption with Customer-Provided Keys (SSE-C), attackers gain control over the encryption process, rendering ...

Aligning compliance with business goals: A strategic approach

Compliance management has emerged as a cornerstone of sustainable growth and risk mitigation. Companies today face increasing regulatory demands while striving to achieve ambitious business objectives. Strategic compliance management, therefore, ...

Oligo Raises $50M to Tackle Application Detection and Response

Oligo Security has raised $50 million in Series B funding for its application detection and response (ADR) platform. The post Oligo Raises $50M to Tackle Application Detection and Response appeared first on SecurityWeek.