Application Security News and Articles


Keeping Up with Cloud Security: Updates to Our AWS Assessments

AttackIQ has enhanced and expanded two AWS security assessments, by introducing nine new scenarios that emulate real-world techniques and tactics that could be used by threat actors to compromise AWS cloud environments. These updates are designed ...

One Policy for Every File

The post One Policy for Every File appeared first on Votiro. The post One Policy for Every File appeared first on Security Boulevard.

When “It’s Always DNS” Becomes Your Security Advantage

Every network engineer knows the refrain: “It’s always DNS.” When websites won’t load, applications fail to connect, or mysterious outages emerge, the Domain Name System—the internet’s essential address book—is usually involved. For ...

Why Cybersecurity Needs Continuous Exposure Management

Alan sits down with Himanshu Kathpal to discuss how modern cybersecurity teams are evolving from reactive defense to proactive exposure management. They explore why traditional approaches to risk reduction—built around scanning, alerting, and ...

Closing the Loop: The Future of Automated Vulnerability Remediation

At Qualys ROCon 2025, Alan catches up with Eran Livne, senior director of endpoint remediation at Qualys, to discuss how organizations are evolving from vulnerability detection to true automated remediation. Livne, who helped build Qualys’ ...

Elon Musk’s SpaceX ‘is Facilitating’ Scams via Starlink

Low Earth Pork: Pig-butchering scammers in Myanmar lose use of 2,500 Starlink terminals. The post Elon Musk’s SpaceX ‘is Facilitating’ Scams via Starlink appeared first on Security Boulevard.

Turning Data Security from a Cost Center into a Growth Enabler with TAMUNIO

The security function has often been at odds with the rest of the business. While the latter guns for growth, CISOs have historically been seen as more interested in managing cyber risk than supporting their colleagues. Sometimes this can lead to ...

DTTS | Zero Trust DNS Enforcement: Policy Violation Management

In a default-deny world, where only verified sources and verified destinations are allowed, which require a successful policy-allowed DNS resolution, many modern threats are mitigated, and there’s demonstrable value in choosing this path, ...

Introducing Multi-User Testing with Natural Language Queries in Escape DAST

Secure your multi-tenant SaaS applications with Escape DAST’s powerful multi-user testing and tenant isolation features. The post Introducing Multi-User Testing with Natural Language Queries in Escape DAST appeared first on Security Boulevard.

NDSS 2025 – Symposium on Usable Security and Privacy (USEC) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium & Keynote

Author, Creator & Presenter: Dr. Patrick Gage Kelley PhD Dr. Patrick Gage Kelley is the Head of Research Strategy for Trust & Safety at Google. He has worked on projects that help us better understand how people think about their data and ...

Russian Government Now Actively Managing Cybercrime Groups: Security Firm

The relationship between the Russian government and cybercriminal groups has evolved from passive tolerance. The post Russian Government Now Actively Managing Cybercrime Groups: Security Firm appeared first on SecurityWeek.

Researchers expose large-scale YouTube malware distribution network

Check Point researchers have uncovered, mapped and helped set back a stealthy, large-scale malware distribution operation on YouTube they dubbed the “YouTube Ghost Network.” The network published more than 3,000 videos across ...

Escaping Secrets Hell: How Workload Identity Scales Where Secrets Can’t

Organizations rushing to deploy AI agents and scale cloud native infrastructures are hitting an unexpected bottleneck: the complexity of securing machine-to-machine communications. Just 18 months ago, there were 45 machine identities for each ...

Wireshark 4.6.0 brings major updates for packet analysis and decryption

If you’ve ever used Wireshark to dig into network traffic you know how vital even small upgrades can be. With version 4.6.0 the team behind the open-source network protocol analyzer has added a number of features that could change how you ...

Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)

CVE-2025-61932, an “improper verification of source of a communication channel” vulnerability affecting Lanscope Endpoint Manager, has been exploited as a zero-day since April 2025, the Japan Computer Emergency Response Team ...

AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk

SquareX has shown how malicious browser extensions can impersonate AI sidebar interfaces. The post AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk appeared first on SecurityWeek.

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars

Palo Alto, California, 23rd October 2025, CyberNewsWire The post AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars appeared first on Security Boulevard.

NETSCOUT’s KlearSight Sensor delivers visibility into encrypted Kubernetes environments

NETSCOUT announced an innovation designed to meet organizations’ needs for observability within complex cloud environments. With the demands of large, multi-cluster Kubernetes deployments, organizations often face challenges related to ...

House Democrats Push Back at Reassignments, Firings of CISA Employees

Democrats in Congress are continuing to target the Trump Administrations actions with CISA, with the latest effort being a letter from House Democrats arguing the firing some employees and moving others to help with the president's expansive ...

The True Cost of Not Having a Cloud Repository

For many organizations, on-premises artifact repositories have long been "good enough." They are familiar. They work. They seem cheaper on paper. The post The True Cost of Not Having a Cloud Repository appeared first on Security Boulevard.