Application Security News and Articles


U.S. Treasury Sanctions Chinese Individual, Company for Data Breaches

The U.S. Treasury sanction a Chinese bad actor for participating in the hack of the agency's networks and a Chinese for its involvement with Salt Typhoon's attacks on U.S. telecoms. Meanwhile, the FCC calls for stronger cybersecurity measures for ...

The AI Revolution No One Saw Coming Until It Was Too Late

With the AI revolution comes hidden security risks. Employees are embracing AI faster than businesses can secure it, exposing critical gaps in governance. The post The AI Revolution No One Saw Coming Until It Was Too Late appeared first on ...

Mobile Cybersecurity Trends for 2025: Key Predictions and Preparations

  The post Mobile Cybersecurity Trends for 2025: Key Predictions and Preparations appeared first on Security Boulevard.

Streamline Certificate Lifecycle Management with AppViewX AVX ONE CLM and ServiceNow

ServiceNow is a leading ITSM platform that helps organizations optimize IT services, workflows, and digital experiences. It streamlines processes like service requests, incident management, and change approvals, improving efficiency and service ...

Web Application Security: Static Application Security Testing (SAST)

I’m Subhadip Sardar, a cybersecurity enthusiast with a strong foundation in IT and cybersecurity. I’m passionate about sharing knowledge…Continue reading on Medium »

Executive Order 14144 on Cybersecurity: Building on 2021’s Foundation with Advanced NHI Security

Building on EO 14028, EO 14144 advances U.S. cybersecurity with actionable steps for NHI security and secrets management. Learn what this means for you. The post Executive Order 14144 on Cybersecurity: Building on 2021’s Foundation with ...

Industry Moves for the week of January 20, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of January 20, 2025. Stay updated with the latest industry trends and shifts.

Bluesky AT Protocol: Building a Decentralized TikTok

The Bluesky AT Protocol aims to decentralize social media, empowering users with control over their data and interactions. By shifting power away from centralized platforms like TikTok, it paves the way for a more equitable and resilient social ...

Privacy Roundup: Week 3 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 12 JAN 2025 - 18 JAN 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due ...

Biden Signs New Cybersecurity Order

President Biden has signed a new cybersecurity order. It has a bunch of provisions, most notably using the US governments procurement power to improve cybersecurity practices industry-wide. Some details: The core of the executive order is an ...

The 2025 Themes on Data GPS 

With the continued mainstreaming of data privacy concerns, nearly all consumer-facing organizations will be forced to treat data GPS as a first-class initiative within their businesses. The post The 2025 Themes on Data GPS  appeared first on ...

From Dark Web to Jackpot: How Cybercriminals Exploit Stolen Credentials in iGaming

It is essential to address credential stuffing directly and collaborate with the broader iGaming community to mitigate its risks. The post From Dark Web to Jackpot: How Cybercriminals Exploit Stolen Credentials in iGaming appeared first on ...

Information Security Manual (ISM)

What is the Information Security Manual (ISM)? The Information Security Manual (ISM) is a cybersecurity framework developed by the Australian Signals Directorate (ASD) to help organizations protect their IT and operational technology systems, ...

CERT-UA warns against “security audit” requests via AnyDesk

Attackers are impersonating the Computer Emergency Response Team of Ukraine (CERT-UA) via AnyDesk to gain access to target computers. The request (Source: CERT-UA) “Unidentified individuals are sending connection requests via AnyDesk under ...

Dr. Martin Luther King, Jr. Day 2025

Permalink The post Dr. Martin Luther King, Jr. Day 2025 appeared first on Security Boulevard.

MY TAKE: Here’s why Donald Trump really needs to fully embrace Joe Biden’s cybersecurity EO

As one of his final official acts, President Joe Biden issued a landmark directive, addressing the evolving challenges posed by cyber threats while charting a strategic course toward a more secure digital ecosystem. Related: How Trump views of ...

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data, user privacy, and other resources while streamlining compliance, preventing fraud, and ...

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?

The twin cryptocurrency and digital identity revolutions are supposed to be building a better future, where anybody can take charge of their sovereignty and security in a world where both face unprecedented threats. Yet at one crucial level, the ...

AI-driven insights transform security preparedness and recovery

In this Help Net Security interview, Arunava Bag, CTO at Digitate, discusses how organizations can recover digital operations after an incident, prioritize cybersecurity strategies, and secure digital operations with effective frameworks. What ...

Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban

In this episode, we explore Meta’s recent decision to replace traditional fact-checking with community notes and its potential impact on misinformation. We also discuss the implications of a TikTok ban in the U.S., with users migrating to ...