Application Security News and Articles


Smart Tactics for Effective Secrets Rotation

Are Your Secrets Safe? A Closer Look at Non-Human Identities and Secrets Security Management The management of Non-Human Identities (NHIs) is emerging as a pivotal component. With organizations increasingly moving operations to the cloud, the ...

Choosing the Right Secrets Scanning Tools

Why Is Secrets Security Management Crucial for Non-Human Identities? Have you ever pondered how organizations safeguard their digital environments from unauthorized access? The answer often lies in robust secrets security management, especially ...

Satisfy Compliance with Improved IAM Policies

How Can Organizations Satisfy Compliance with Robust IAM Policies? The question of managing them effectively remains crucial. This is especially true for Non-Human Identities (NHIs), which serve as pivotal components in various industries. But ...

Optimizing Secrets Sprawl Management

How Can Organizations Achieve Efficient Security with Optimized Management of Non-Human Identities? Where cybersecurity threats are becoming increasingly sophisticated, organizations are compelled to rethink their security strategies, ...

The Code Fortress: Securing Software Like a Castle

Imagine your software as a fortress. Every line of code, every module, every dependency is part of this structure. At the heart of it lies…Continue reading on Medium »

NDSS 2025 – Symposium On Usable Security And Privacy (USEC) 2025, Paper Session 1

Authors, Creators & Presenters: PAPERS On-demand RFID: Improving Privacy, Security, and User Trust in RFID Activation through Physically-Intuitive Design Youngwook Do (JPMorganChase and Georgia Institute of Technology), Tingyu Cheng (Georgia ...

Russia’s Coldriver Ramps Up Malware Development After LostKeys Exposure

Google threat researchers in May publicized the Russian-based threat group Coldriver's LostKeys credential-stealing malware. However, five days later, the bad actors launched three new malware families that they developed rapidly and used ...

Keep Your Enterprise Running No Matter What

Ensuring Branch · Site · Network Resiliency with Dispersive Stealth NetworkingThis post is a quick response from Scott Higgins, Senior Director of Engineering at Dispersive, following the recent AWS US-East-1 outage. The incident serves as a ...

Randall Munroe’s XKCD ‘’Measure Twice, Cut Once”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Measure Twice, Cut Once” appeared first on Security Boulevard.

Survey: Cybersecurity Teams Struggling to Keep Pace in the Age of AI

A survey of 1,100 cybersecurity and IT professionals published this week finds more than three quarters (76%) report their organization is struggling to keep pace with cyberattacks that have increased in both volume and sophistication. Conducted ...

F5 Networks Breach: A Wake-Up Call for Supply Chain Cybersecurity

When a foundational technology provider like F5 Networks, whose systems power government agencies, critical infrastructure, and enterprises worldwide, suffers a cyber breach, the ripple effects extend far beyond a single organization. This latest ...

TARmageddon Flaw in Popular Rust Library Leads to RCE

The vulnerability impacts multiple Rust tar parsers, allowing attackers to smuggle additional archive entries. The post TARmageddon Flaw in Popular Rust Library Leads to RCE appeared first on SecurityWeek.

Tenable Recognized as a CTEM Leader in Latio’s 2025 Cloud Security Market Report

Tenable has been named a Continuous Threat Exposure Management (CTEM) Leader in Latio’s 2025 Cloud Security Market Report. This recognition is based on rigorous product testing conducted by Latio founder and lead analyst James Berthoty. Key ...

Auditing MCP Server Access and Usage

6 min readRobust auditing is essential for secure MCP deployments, providing compliance evidence, forensic capabilities, and operational confidence for managing AI agents and context-aware systems at scale. The dynamic nature of MCP makes a lack ...

Third-Party Breaches: Why Vendor Passwords Put Your Organization at Risk

The Expanding Threat Surface in Third-Party Access No matter how secure an organization’s internal defenses may be, the risk created by third parties cannot be ignored. A single vendor often has connections across dozens of client environments. ...

What is MCP Security: A Complete Introduction

5 min readAI agents' rise has transformed software, as they make decisions and coordinate tasks. However, their security is often weak due to poor authentication and ad-hoc controls. The Model Context Protocol (MCP), developed by Anthropic, ...

Attackers target retailers’ gift card systems using cloud-only techniques

A newly uncovered attack campaign mounted by suspected Morocco-based attackers has been hitting global retailers and other businesses issuing gift cards. What makes this campaign stand out is how the threat actors avoid typical malware techniques ...

How to detect disposable email domains without relying on 3rd party APIs and lists

To scale a fraud or bot attack, adversaries need more than just realistic automation. They need infrastructure. A convincing browser fingerprint and human-like interaction (mouse movements, keystrokes, etc.) are table stakes. But even with a ...

Critical Vulnerabilities Patched in TP-Link’s Omada Gateways

One of the flaws can be exploited by remote unauthenticated attackers for arbitrary command execution. The post Critical Vulnerabilities Patched in TP-Link’s Omada Gateways appeared first on SecurityWeek.

From Path Traversal to Supply Chain Compromise: Breaking MCP Server Hosting

We found a path traversal vulnerability in Smithery.ai that compromised over 3,000 MCP servers and exposed thousands of API keys. Here's how a single Docker build bug nearly triggered one of the largest AI supply chain attacks to date. The post ...