Application Security News and Articles


Build Confidence with Robust Secrets Management

How Does Effective Secrets Management Enhance Robust Security? Have you ever considered the impact of non-human identities in your organization’s security framework? While human factors in cybersecurity get a lot of attention, it’s ...

Scaling Identity Security in Cloud Environments

How Can Organizations Achieve Scalable Security in Cloud Environments? The increasing reliance on cloud environments means organizations face an unprecedented need for scalable security solutions. One of the more complex challenges is managing ...

Empowering Teams with Better Access Management

How Can Access Management Revolutionize Team Empowerment? What if the key to unlocking your team’s full potential lies in how you manage access to your digital assets? The effective management of Non-Human Identities (NHIs) is not just a ...

NDSS 2025 – Oreo: Protecting ASLR Against Micro-Architectural Attacks

Authors, Creators & Presenters: Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute of Technology), Mengjia Yan (Massachusetts Institute of Technology) PAPER Oreo: Protecting ASLR Against ...

NDSS 2025 – Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth

Authors, Creators & Presenters: Maximilian von Tschirschnitz (Technical University of Munich), Ludwig Peuckert (Technical University of Munich), Moritz Buhl (Technical University of Munich), Jens Grossklags (Technical University of ...

Cyber Awareness Month: Protecting Your Child in the Digital Age

How can you be a cyber-smart parent? In this interview with Chad Rychlewski, the co-author of a new book, we unpack what family online protection looks like in 2025.   The post Cyber Awareness Month: Protecting Your Child in the Digital Age ...

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most AI privacy research looks the wrong way Most research on LLM privacy has focused on the wrong problem, according to a new paper by ...

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension…

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension campaign Short read for everyone: we found a malicious Chrome extension that stole login data from a crypto trading site. Tracing the domain it talked to ...

How Secure Are Your Machine Identities?

How Effective Is Your Non-Human Identity Management? Are your data security strategies truly effective in safeguarding machine identities within your organization’s cloud infrastructure? Where businesses increasingly rely on machine ...

NDSS 2025 – CHAOS: Exploiting Station Time Synchronization In 802.11 Networks Session 1A: WiFi and Bluetooth Security

Authors, Creators & Presenters: Sirus Shahini (University of Utah), Robert Ricci (University of Utah) PAPER - CHAOS: Exploiting Station Time Synchronization in 802.11 Networks Many locations, especially in urban areas, are quite noisy with ...

$1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal

WhatsApp told SecurityWeek that the two low-impact vulnerabilities cannot be used for arbitrary code execution.  The post $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal appeared first on SecurityWeek.

OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks

Researchers have discovered that a prompt can be disguised as an url, and accepted by Atlas as an url in the omnibox. The post OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks appeared first on SecurityWeek.

How AI & LLMs Are Improving Authentication Flows

AI & LLMs are reshaping authentication. Learn how they enable adaptive security, fraud detection, and personalized login experiences in identity verification. The post How AI & LLMs Are Improving Authentication Flows appeared first on ...

The Hidden Infrastructure of Internet Privacy: How Modern Networks Shape Digital Freedom

Explore how modern network infrastructure impacts internet privacy, surveillance, and digital freedom — and what tech protects your data. The post The Hidden Infrastructure of Internet Privacy: How Modern Networks Shape Digital Freedom appeared ...

OWASP Mobile Top 10 for Android – How AutoSecT Detects Each Risk?

How trending are mobile apps? Statistics say that mobile apps are now a part of 70% of the digital interactions across the globe. The number of smartphone users now stands at over 6.8 billion. Based on the most recent available data from 2023, ...

How MSSPs Achieve Exponential SOC Performance With Morpheus AI

Learn how AI-powered SOC operations process 1M+ alerts daily, investigate 100% of threats, and shrink Time to Close from hours to minutes. The post How MSSPs Achieve Exponential SOC Performance With Morpheus AI appeared first on D3 Security. The ...

News alert: Arsen rolls out ‘Smishing Simulation’ to strengthen defenses against mobile phishing threats

PARIS, Oct. 24, 2025, CyberNewswire — Arsen, the cybersecurity company dedicated to helping organizations defend against social engineering, today introduced its new Smishing Simulation module: a feature designed to let companies run realistic, ...

Getting Better at Managing Cloud Risks

How Can Organizations Improve Their Approach to Cloud Risk Management? Where cloud adoption continues to surge, how can organizations ensure their cybersecurity strategy genuinely addresses all vulnerabilities, particularly those associated with ...

Stay Calm with Effective Cyber Risk Management

Are Your Cyber Risk Management Strategies Truly Effective? A growing concern among security professionals is whether they have implemented effective strategies to manage the cyber risks posed by Non-Human Identities (NHIs). With the increased ...

Assured Security with Enhanced NHIs

How Can Organizations Ensure Assured Security with Enhanced Non-Human Identities? Maintaining assured security requires more than just safeguarding human credentials. When organizations increasingly rely on automation, cloud environments, and ...