Application Security News and Articles


NDSS 2025 – Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack

Session 1A: WiFi and Bluetooth Security Authors, Creators & Presenters: Ziqiang Wang (Southeast University), Xuewei Feng (Tsinghua University), Qi Li (Tsinghua University), Kun Sun (George Mason University), Yuxiang Yang (Tsinghua ...

Randall Munroe’s XKCD ‘’Window Screen”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Window Screen” appeared first on Security Boulevard.

Introducing audit logs in SonarQube Cloud: Enhancing compliance and security

Introducing the initial release of audit logs for SonarQube Cloud, a new feature designed to provide enhanced governance and support for our Enterprise plan customers. This initial, API-driven release focuses on core authentication and ...

OAuth vs. OIDC: What’s the Difference and When Should You Use Each?

5 min readLearn when to use OAuth for authorization, OIDC for authentication, or both protocols together based on your architecture and use case. The post OAuth vs. OIDC: What’s the Difference and When Should You Use Each? appeared first on ...

Scanning GitHub Gists for Secrets with Bring Your Own Source

Developers treat GitHub Gists as a "paste everything" service, accidentally exposing secrets like API keys and tokens. BYOS lets you scan and monitor these blind spots. The post Scanning GitHub Gists for Secrets with Bring Your Own Source ...

Zumigo enhances fraud prevention with low-code tools and passwordless authentication

Zumigo has upgraded its solutions designed to help businesses fortify their defenses against rising sophisticated consumer fraud with an identity-first security approach. Recognizing that consumer and user access points are often exploited for ...

Albireo PCS delivers secure, managed cloud alternative to on-premise servers

Albireo Energy launched Private Cloud Services (PCS), a secure, fully managed cloud service designed to host and protect Building Automation System (BAS) and Energy Power Management Systems (EPMS) data without the capital expense, complexity, or ...

Data Sovereignty in 2025: Managing Cross-Border Data

The post <b>Data Sovereignty in 2025: Managing Cross-Border Data</b> appeared first on Sovy. The post Data Sovereignty in 2025: Managing Cross-Border Data appeared first on Security Boulevard.

Chainguard Raises $280 Million in Growth Funding

Chainguard has raised $636 million in the past six months alone for its software supply chain security solutions.  The post Chainguard Raises $280 Million in Growth Funding appeared first on SecurityWeek.

Louvre Jewel Heist

I assume I don’t have to explain last week’s Louvre jewel heist. I love a good caper, and have (like many others) eagerly followed the details. An electric ladder to a second-floor window, an angle grinder to get into the room and the display ...

NDSS 2025 – Lend Me Your Beam: Privacy Implications Of Plaintext Beamforming Feedback In WiFi Session 1A: WiFi and Bluetooth Security

Session 1A: WiFi and Bluetooth Security Authors, Creators & Presenters: Rui Xiao (Zhejiang University), Xiankai Chen (Zhejiang University), Yinghui He (Nanyang Technological University), Jun Han (KAIST), Jinsong Han (Zhejiang ...

Jumio introduces selfie.DONE to simplify digital identity verification

Jumio announced the launch of selfie.DONE, a new solution that delivers on the company’s vision for true reusable identity. selfie.DONE empowers trusted users to be instantly recognized and reverified with just a selfie, eliminating the need to ...

Gaining (and Regaining) Competitiveness in the Age of AI

The pace of change isn’t slowing down. If anything, it’s accelerating. Emerging technologies, new competitors, and new customer expectations are rewriting the rules of business....Read More The post Gaining (and Regaining) Competitiveness in ...

eBook: A quarter century of Active Directory

Active Directory (AD) remains the backbone of enterprise identity and a prime target for attackers. Explore its 25-year history, evolving risks, and how organizations can modernize password security. This eBook shows why AD defenses must evolve ...

Massive China-Linked Smishing Campaign Leveraged 194,000 Domains

The malicious Smishing Triad domains were used to collect sensitive information, including Social Security numbers. The post Massive China-Linked Smishing Campaign Leveraged 194,000 Domains appeared first on SecurityWeek.

Ransomware, extortion groups adapt as payment rates reach historic lows

Ransomware groups are facing an economic downturn of their own: In Q3 2025, only 23 percent of victims paid a ransom, and for data theft incidents that involved no encryption, the payment rate dropped to just 19 percent, according to Coveware. ...

How to Take Vulnerability Management to the Next Level and Supercharge Your Career

At Tenable, we believe the next generation of great CISOs and security leaders will arise from those vulnerability management professionals who are driving the shift to exposure management today. Key takeaways: Vulnerability management is ...

Exploring Vein-Based Password Technology: Expert Insights

Discover vein-based password technology: A deep dive into its security features, development aspects, and expert opinions on its role in future authentication systems. The post Exploring Vein-Based Password Technology: Expert Insights appeared ...

Understanding the Concept of Enterprise IAM

Demystifying Enterprise IAM: Learn the core concepts, benefits, and implementation strategies for effective identity and access management in your organization. The post Understanding the Concept of Enterprise IAM appeared first on Security ...

T.H.E. Journal: The Hidden Cyber Risk in Schools

This article was originally published in T.H.E. Journal on 10/22/25 by Charlie Sander. Printers may not be glamorous, but they are an often-overlooked attack vector that should be part of every district’s cybersecurity strategy Cyber attacks ...