Application Security News and Articles


National Public Data Shuts Down Months After Massive Breach

National Public Data, the data broker whose systems were breached and 2.9 billion files holding sensitive data from 170 million this year, has shut down following the attack and after a judge dismissed parent company Jerico Pictures' bankruptcy ...

DEF CON 32 – The Way To Android Root: Exploiting Smartphone GPU

Authors/Presenters: Xiling Gong, Eugene Rodionov Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

SQL Injection Prevention: 6 Strategies

SQL Injection (SQLi) attacks are critical and widespread threats that inject malicious code into backend databases. This gives bad actors unauthorized access to sensitive data. These breaches can lead to stolen data, compromised systems, and ...

IAM tech debt: Balancing modernization and legacy identity infrastructure

“As enterprises modernize their identity systems to keep pace with multi-cloud strategies, they find themselves in a quagmire of technical debt, complexity, and resource constraints.” – State of Multi-Cloud Identity Report 2025 Technical ...

CMMC Level 2 Requirements: A Guide to Achieving Compliance

If your organization handles sensitive information and aims to work with the Department of Defense (DoD), you must meet the Cybersecurity Maturity Model Certification (CMMC) requirements. These standards protect Controlled Unclassified ...

Secrets Scanning: How It Works and Why It’s Important

All software development environments have secrets—think API keys, passwords, and tokens—that can lead to significant security breaches if left vulnerable. Best practices like secrets scanning detect and protect sensitive information before ...

API Key Security Best Practices: Secure Sensitive Data

Application programming interfaces (APIs) connect applications, allowing them to communicate and exchange data easily. But as web apps handle more sensitive data and integrate with an increasing number of services, the risk of unauthorized access ...

Randall Munroe’s XKCD ‘Second Stage’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Second Stage’ appeared first on Security Boulevard.

SaaS Security Outlook for 2025 | Grip Security

Mitigate shadow SaaS and shadow AI risks more effectively by aligning innovation with control. Explore how to build a proactive SaaS security strategy for 2025. The post SaaS Security Outlook for 2025 | Grip Security appeared first on Security ...

News alert: Green Raven study shows cybersecurity to be a black hole in more ways than just budget

Cheltenham, England, Dec. 4, 2024 –A majority of senior cybersecurity professionals at the UK’s largest organisations struggle with feelings of helplessness and professional despair, new research by Green Raven Limited indicates. These ...

China is Still Inside US Networks — It’s Been SIX Months

Hell froze over: FBI and NSA recommend you use strong encryption. The post China is Still Inside US Networks — It’s Been SIX Months appeared first on Security Boulevard.

DEF CON 32 – Atomic Honeypot – A MySQL Honeypot That Drops Shells

Authors/Presenters: Alexander Rubin, Martin Rakhmanov Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Solana’s popular web3.js library backdoored in supply chain compromise

A software supply chain attack has lead to the publication of malicious versions of Solana’s web3.js library on the npm registry. Just like the recent Lottie Player supply chain compromise, this attack was reportedly made possible due to ...

How CSPs are Adapting to the Threat Landscape and Meeting new Cybersecurity Challenges

The year 2024 is one of continual evolution for communication service providers (CSPs) and the cybersecurity landscape. The post How CSPs are Adapting to the Threat Landscape and Meeting new Cybersecurity Challenges appeared first on Security ...

Christmas is Coming: Cybersecurity Lessons from the Holidays

The holiday season is a time of joy, celebrations, and—unfortunately—a spike in cybersecurity threats. Cybercriminals often exploit the festive cheer, targeting individuals and organizations distracted by the season’s busyness. This ...

How widespread is mercenary spyware?

A targeted hunt on 2,500 mobile devices for indicators of compromise associated with mercenary spyware has revealed that its use is not as rare as one would hope. The results of the hunt Earlier this year, iVerify added a threat hunting feature ...

Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says

China's growing presence in the global market for LiDAR, a remote sensing technology widely used in defense and commercial system, presents a national security risk for the United States, which already is dealing with intrusions into critical ...

How AppOmni and Cisco Advance Zero Trust SaaS Security

Learn how AppOmni’s SSPM and Cisco’s SSE create a unified Zero Trust security solution, bridging SaaS and cloud service vulnerabilities to protect critical data. The post How AppOmni and Cisco Advance Zero Trust SaaS Security appeared first ...

Protecting Against Bot-Enabled API Abuse

APIs have become the backbone of modern digital ecosystems, powering everything from mobile apps to e-commerce platforms. However, as APIs grow in importance, they also become prime targets for malicious actors. Increasingly, bots are being ...

Product showcase: Securing Active Directory passwords with Specops Password Policy

Password policies are a cornerstone of cybersecurity for any organization. A good password policy ensures every end user has a strong and unique password, significantly reducing the risk of unauthorized access and data breaches. These policies ...