Application Security News and Articles


Be careful what you share with GenAI tools at work

We use GenAI at work to make tasks easier, but are we aware of the risks? According to Netskope, the average organization now shares more than 7.7GB of data with AI tools per month, and 75% of enterprise users are accessing applications with ...

Modern authentication: Why OIDC and SAML are just the start

You modernized your apps. Switched to OIDC. Added SAML. Then called it a day. But here’s the uncomfortable truth: modern authentication protocols alone aren’t enough for modern security. When people talk about “modernizing” ...

Are Your Security Spendings Justified and Effective?

Are We Maximizing Our Security Investments? Organizations must justify their security spend and ensure the effective use of their budget. With growing reliance on the cloud and increased utilization of Non-Human Identities (NHIs), the question ...

Gaining Certainty in Uncertain Security Landscapes

Why is Security Certainty a Necessity in Today’s Cybersecurity Landscape? Where data breaches are increasing at an alarming rate, maintaining cybersecurity certainty has become a daunting task. But what if you could ensure certainty? Enter ...

CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine

Russian military intelligence hackers intensify targeting of Western logistics and technology companies moving supplies into Ukraine.  The post CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine appeared first on SecurityWeek.

Securing Open Banking: How Fintechs Can Defend Against Automated Fraud & API Abuse

Open Banking is accelerating innovation, and fraud—with API abuse, credential stuffing, and fake account creation now among the top threats fintechs must defend against in real time. The post Securing Open Banking: How Fintechs Can Defend ...

SaaS Security Made Simple: Build Your Case, Choose Your Vendor, and Protect Your Data

Cut through SaaS security complexity. Discover how to protect data, avoid costly missteps, and evaluate the right tools—plus get a free ebook with practical templates and checklists. The post SaaS Security Made Simple: Build Your Case, Choose ...

BSidesLV24 – PasswordsCon – Detecting Credential Abuse

Authors/Presenters: Troy Defty, Kathy Zhu Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation

Redmond’s threat hunters found 394,000 Windows systems talking to Lumma controllers, a victim pool included global manufacturers.  The post Microsoft Sinkholes Domains, Disrupts Notorious ‘Lumma Stealer’ Malware Operation appeared first on ...

What Kind of Identity Should Your AI Agent Have?

7 min readAI agents don’t neatly fit into your IAM chart. They switch roles, borrow authority, and rewrite what identity means at runtime. Here's what that means for you. The post What Kind of Identity Should Your AI Agent Have? appeared first ...

Lumma Stealer Malware-as-a-Service operation disrupted

A coordinated action by US, European and Japanese authorities and tech companies like Microsoft and Cloudflare has disrupted the infrastructure behind Lumma Stealer, the most significant infostealer threat at the moment. What is Lumma Stealer? ...

How 2024 will impact quality engineering teams

As we step into the new year, it's time to explore the exciting trends that will shape the world of Quality Engineering in 2024. Here’s what we’ve been seeing in our work with Quality Engineering teams around the globe. The post How 2024 will ...

The Role of AI in FinTech: Innovation, Transformation, and the Ethics You Can’t Ignore

The financial services industry is in the midst of a thrilling transformation, and Artificial Intelligence (AI) is the spark igniting it all! Picture this: in...Read More The post The Role of AI in FinTech: Innovation, Transformation, and the ...

Survey: Too Much Time Being Spent on Managing Cybersecurity Tools

A survey of 2,058 security leaders finds nearly half of respondents (46%) are spending more time maintaining tools than they do defending their organization from actual cyberattacks. The post Survey: Too Much Time Being Spent on Managing ...

LLM03: Supply Chain – FireTail Blog

May 21, 2025 - Lina Romero - LLM03: Supply Chain 20/5/2025 Excerpt The OWASP Top 10 List of Risks for LLMs helps developers and security teams determine where the biggest risk factors lay. In this blog series from FireTail, we are exploring each ...

Breach Readiness in a World That’s Always Connected

Rajesh Khazanchi, CEO & Co-founder of ColorTokens, explains how microsegmentation keeps critical services running in hyper-connected world, delivering true breach readiness and business resilience. The post Breach Readiness in a World ...

Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway

More than 100 AutomationDirect MB-Gateway devices may be vulnerable to attacks from the internet due to CVE-2025-36535. The post Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway appeared first on SecurityWeek.

BSidesLV24 – GroundFloor – Insert Coin: Hacking Arcades For Fun

Authors/Presenters: Ignacio Navarro Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Strata Identity VP of Product and Standards to Discuss Future of Authorization at Identiverse 2025

MEDIA ADVISORY Strata Identity VP of Product and Standards to Discuss Future of Authorization at Identiverse 2025 Gerry Gebel to join fellow AuthZEN co-chairs to discuss next-gen authorization interoperability and open standards BOULDER, Colo., ...