Application Security News and Articles


Coinbase Breach: Can You Act Quickly to an Insider Threat?

The Coinbase breach exposed more than data; it revealed what most orgs still can’t see. Learn why proactive SaaS access visibility is your real defense. The post Coinbase Breach: Can You Act Quickly to an Insider Threat? appeared first on ...

BSidesLV24 – GroundFloor – Rolling Out The C2: A Take On Modern Red Team Infrastructure

Author/Presenter: George Polivka & Unnamed User Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany ...

Orca Security Acquires Opus to Gain AI Agent Orchestration Technology

Orca Security this week revealed it has acquired Opus to gain access to technologies capable of orchestrating artificial intelligence (AI) agents that are trained to automate a range of cybersecurity tasks. Opus previously has been employing that ...

DoD SPRS Scores: How Often Should You Update Them?

The overall defense industrial base is growing increasingly aware of the needs of modern information and cyber security. From recent major supply chain attacks to the constant threat of nation-state actors trying to compromise systems, it’s ...

Why Context is King in Cyber Risk Quantification: Key Webinar Takeaways

In cybersecurity, the most complex problems often do not have neat solutions. But in a recent conversation with veteran CISO Ed Amoroso and Balbix CEO and Founder Gaurav Banga, one thing was clear: we’re past the point where “we tried our ...

Top Tools and Plugins to Detect AI Hallucinations in Real-Time

Imagine relying on your GPS for directions, only to find yourself at a dead end. This scenario mirrors the challenge of AI hallucinations, instances where...Read More The post Top Tools and Plugins to Detect AI Hallucinations in Real-Time ...

BSidesLV24 – GroundFloor – EHLO World: Spear-Phishing At Scale Using Generative AI

Author/Presenter: Josh Kamdjou Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Google Warns UK Retailer Hackers Now Targeting US

Google says the hacking group behind the recent cyberattacks on UK retailers is now shifting focus to the US. The post Google Warns UK Retailer Hackers Now Targeting US appeared first on SecurityWeek.

Beyond Human Access: Machine-to-Machine Authentication for Modern B2B SaaS

Machines talk to machines without human intervention. But how do you ensure these automated conversations remain secure? Discover the authentication frameworks that enable scaling safely while protecting your digital ecosystem from unauthorized ...

In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach

A summary of noteworthy stories that might have slipped under the radar this week. The post In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach appeared first on SecurityWeek.

Building a Complete DevSecOps Pipeline with GitHub Actions: From Code to Security

The evolution of DevOps has brought an essential interdisciplinary approach with security into modern software development. Building…Continue reading on Medium »

Linux Foundation Shares Framework for Building Effective Cybersecurity Teams

The Linux Foundation this week made available a customizable reference guide intended to help organizations identify critical cybersecurity skills requirements. The post Linux Foundation Shares Framework for Building Effective Cybersecurity Teams ...

Cybersecurity Insights with Contrast CISO David Lindner | 05/16/25

Insight No. 1 — Security vendor alert Regarding the open letter that hit a nerve at RSAC this year for calling out lack of reliability, accountability and transparency on the part of some security vendors, consider this: A security vendor that ...

Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty

The major data breach of cryptocurrency exchange Coinbase could cost the company as much as $400 million, it told the SEC. However, rather than pay the $20 million extortion demand, Coinbase issued a $20 million bounty on the hackers. The post ...

Is it Illegal to Listen to a Podcast or Watch a Movie Online?

Defining wire communications, and whether the wiretap statute makes it illegal to listen to a podcast or watch a movie online? The post Is it Illegal to Listen to a Podcast or Watch a Movie Online? appeared first on Security Boulevard.

Modern Threats, Missed Phish: How Exposed Are You? (Part 2)

Alright, you’ve come this far. You’ve admitted that your SEG isn’t exactly the security soulmate you thought it was. Maybe you’ve even started to notice the red flags – missed phishes, frustrated clients, constant rule tuning. But ...

From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries. The post From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth appeared first on SecurityWeek.

CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)

A high-severity Chrome vulnerability (CVE-2025-4664) that Google has fixed on Wednesday is being leveraged by attackers, CISA has confirmed by adding the flaw to its Known Exploited Vulnerabilities catalog. About CVE-2025-4664 CVE-2025-4664 stems ...

Cranium introduces AI red teaming platform

Cranium has launched Arena, an AI red teaming platform built to proactively test and secure AI systems across the full model and supply chain lifecycle. As artificial intelligence continues its rapid integration into enterprise infrastructure, ...

Russian APT Exploiting Mail Servers Against Government, Defense Organizations

Russia-linked APT28 has been exploiting mail server vulnerabilities against government and defense entities since September 2023. The post Russian APT Exploiting Mail Servers Against Government, Defense Organizations appeared first on SecurityWeek.