Application Security News and Articles


Nearly half of CISOs now report to CEOs, showing their rising influence

The CISO’s rise to the C-suite comes with more engagement with the boardroom, an audience with the CEO, and the power to make strategic decisions for the business, according to Splunk. CISOs report to the C-suite (Source: Splunk) 82% of ...

GUI frontends for GnuPG, the free implementation of the OpenPGP standard

GnuPG is a free and comprehensive implementation of the OpenPGP standard. It enables encryption and signing of data and communications, featuring a key management system and support for public key directories. While primarily a command-line tool, ...

Deepfakes force a new era in fraud detection, identity verification

The rise in identity fraud over the past two years has significantly impacted all industries, especially finance, banking, fintech, and crypto, according to Regula. With deepfakes threatening every second company around the world, businesses ...

New infosec products of the week: January 24, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Bitsight, DataDome, DigitalOcean, Lookout, and XONA Systems. Lookout Mobile Intelligence APIs identifies cross-platform attacks Lookout Mobile ...

A K-12 Guide to the Digital Classroom

Digital tools have transformed how teachers and students engage in classroom activities, creating opportunities to enhance learning, communication, and organization. In this guide, we’ll explore the types of educational technologies available, ...

CAF-aligned DSPT FAQs for NHS and Healthcare Organisations (2024-2025 and beyond)

NHS DSPT compliance has gone through a significant change. The transition from the National Data Guardian’s 10 data security standards structure to the CAF-aligned Data Security and Protection Toolkit (DSPT) is a significant step for UK health ...

Understanding the 3-Layers of Non-Human Identity (NHI) Security in TrustFour’s Posture and Attack Surface Management Framework

In today’s interconnected digital ecosystems, securing Non-Human Identities (NHIs) has become a critical focus. NHIs—representing machines, applications, containers, and microservices—outnumber human identities exponentially and serve as ...

Safe Secrets Rotation: A Must for Modern Clouds

Why is Secrets Rotation Crucial for Cloud Security? Are you familiar with the concept of secrets rotation? Does it sound like an unfamiliar cybersecurity jargon that goes over your head? Or do you already know and understand its implications but ...

Boosting Confidence in Cloud-Native Security

Are You Confident in Your Cloud-Native Security? Navigating cybersecurity can be like walking through a maze filled with lurking threats. How can you feel confident navigating through this seemingly complex labyrinth? Proper data protection and a ...

Unlocking Innovation with Protected Machine Identities

Is Your Organization Paying Enough Attention to Non-Human Identities? Organizations extensively utilize cloud services and automated systems. In doing so, they inevitably fragment their digital presence into countless Non-Human Identities (NHIs). ...

How to Stop Layer 7 DDoS Attacks in 2025

Stop stealthy Layer 7 DDoS attacks in 2025 that bypass CDNs. With DataDome’s AI-powered, edge-based protection, you can ensure uninterrupted operations---blocking threats in real time. The post How to Stop Layer 7 DDoS Attacks in 2025 appeared ...

6 Ways IT Can Help You Modernize Case Management Software

Your IT department can be a valuable ally in overcoming inevitable resistance to change Modern and effective corporate security teams operate in a complex digital environment. You access and connect data from social media, court records, weather, ...

Insurance companies can reduce risk with Attack Path Management

TL;DR Insurance companies host large amounts of sensitive data (PII, PHI, etc.) and often have complex environments due to M&A and divestitures Most breaches start with human error Fortune 500 companies rely on Microsoft Active Directory as ...

DEF CON 32 – The Wild And Wonderful World Of Early Microprocessors With A Focus On 6502

Author/Presenter: Michael Brown Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

SOC vs MSSP: Which is Right for Your Business?

One of the most pivotal decisions an organization faces is whether to build an in-house Security Operations Center (SOC) or outsource security operations to a Managed Security Service Provider (MSSP). While the choice may seem straightforward at ...

TrustFour’s OWASP 2025 NHI Top Ten Coverage

T4 redefines ASM by ensuring only authorized workloads can utilize NHIs through robust isolation powered by mTLS and a “ring-fenced” authorization map. With T4, unauthorized workloads are stopped in their tracks, slashing the attack surface ...

Randall Munroe’s XKCD ‘Chemical Formulas’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Chemical Formulas’ appeared first on Security Boulevard.

CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild according to researchers. Update January 23: The Analysis and Identifying affected systems sections have been updated to include ...

Juniper enterprise routers backdoored via “magic packet” malware

A stealthy attack campaign turned Juniper enterprise-grade routers into entry points to corporate networks via the “J-magic” backdoor, which is loaded into the devices’ memory and spawns a reverse shell when instructed to do so. ...

Conduent Confirms Cyberattack After Government Agencies Report Outages

Conduent has confirmed suffering disruptions due to a cyberattack after government agencies reported service outages. The post Conduent Confirms Cyberattack After Government Agencies Report Outages appeared first on SecurityWeek.