Application Security News and Articles


A Hyperscaler for Cybersecurity

Hyperscalers like AWS and GCP have transformed IT and general tech. Now it's time for the cybersecurity industry to catch up by shifting to specialized hyperscaler platforms built for security operations (SecOps) at scale. Why the cybersecurity ...

Why continuous discovery is critical to closing security gaps

Ask me how many applications are running in a typical enterprise cloud environment, and I’ll give you an estimate. Ask me again a few minutes later, and I might give you a completely different number. It’s not that I’m unsure on purpose — ...

Material Nonpublic Information: Why It Deserves Enterprise-Grade Protection

The post Material Nonpublic Information: Why It Deserves Enterprise-Grade Protection appeared first on Votiro. The post Material Nonpublic Information: Why It Deserves Enterprise-Grade Protection appeared first on Security Boulevard.

News Alert: Halo Security reaches SOC 2 milestone, validating its security controls and practices

Miami, Fla., May 22, 2025, CyberNewsWire — Halo Security, a leading provider of attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type 1 compliance following a comprehensive audit by ...

Optimistic Security: A New Era for Cyber Defense

Why Optimistic Cybersecurity? Ever wondered how evolving technology could help fortify your entity against cyber threats? Well, this might be the perfect time to introduce the concept of Optimistic Cybersecurity, an innovative approach that’s ...

News alert: INE Security, Abadnet Institute partner to deliver cybersecurity training in Saudi Arabia

Cary, NC. May 22, 2025, CyberNewswire — INE Security, a global leader in Cybersecurity training and certifications, has announced a strategic partnership with Abadnet Institute for Training, a Riyadh-based leader in specialized Information ...

Model Context Protocol Decoded: What it is and How to Use it

The post Model Context Protocol Decoded: What it is and How to Use it appeared first on AI Security Automation. The post Model Context Protocol Decoded: What it is and How to Use it appeared first on Security Boulevard.

Response to CISA Advisory (AA25-141B): Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

AttackIQ has updated an existing assessment template in response to the CISA Advisory (AA25-141B) published on May 21, 2025, which disseminates Tactics, Techniques and Procedures (TTPs) and Indicators of Compromise (IOCs), associated with threat ...

Operation Endgame 2.0: DanaBusted

IntroductionOn May 22, 2025, international law enforcement agencies released information about additional actions that were taken in conjunction with Operation Endgame, an ongoing, coordinated effort to dismantle and prosecute cybercriminal ...

BSidesLV24 – PasswordsCon – Breaking Historical Ciphertexts With Modern Means

Authors/Presenters: Elonka Dunin, Klaus Schmeh Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites ...

Evaluating open-source tools for data masking

Can you use open-source tools to mask sensitive production data for use in testing and development? We explore the available options and weigh the pros and cons of relying on DIY data masking solutions. The post Evaluating open-source tools for ...

Randall Munroe’s XKCD ‘Baker’s Units’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Baker’s Units’ appeared first on Security Boulevard.

Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw

Akamai documents a privilege escalation flaw in Windows Server 2025 after Redmond declines to ship an immediate patch. The post Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw appeared first on SecurityWeek.

Signal Gives Microsoft a Clear Signal: Do NOT Recall This

Black screen of DRM: Privacy-first messenger blocks Microsoft Recall The post Signal Gives Microsoft a Clear Signal: Do NOT Recall This appeared first on Security Boulevard.

Navigating the New Frontiers of Identity: Insights from KuppingerCole EIC Summit 2025

Discover why machine identities are the new security frontier from KuppingerCole EIC 2025. Learn about secrets sprawl, AI agents, and why traditional IAM fails to protect NHIs in this GitGuardian recap. The post Navigating the New Frontiers of ...

Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform

Miami, Florida, 22nd May 2025, CyberNewsWire The post Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform appeared first on Security Boulevard.

Unpatched Windows Server vulnerability allows full domain compromise

A privilege escalation vulnerability in Windows Server 2025 can be used by attackers to compromise any user in Active Directory (AD), including Domain Admins. “The [“BadSuccessor”] attack exploits the delegated Managed Service ...

Law Enforcement, Microsoft Disrupt Operations of Popular Lumma Stealer

International law enforcement agencies and cybersecurity vendors seized thousands of domains used to run the MaaS operations of the widely popular Lumma Stealer malware, which was used to facilitate ransomware, malvertising, and phishing attacks ...

BSidesLV24 – PasswordsCon – Picking A Fight With The Banks

Author/Presenter: Cecilie Wian Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

10 Proven Growth Strategies for B2B SaaS: Lessons from Business Classics & Applications for AI Startups

Transform your B2B SaaS growth trajectory with 10 battle-tested strategies derived from business classics and proven by market leaders. Learn how these frameworks can be specifically adapted for AI startups, with actionable tactics that drive ...