Application Security News and Articles


Is Your Cloud Truly Safe from Invisible Threats?

Why Do Cloud Security Gaps Exist? Can we confidently claim to have sealed all potential breaches? The truth is, despite significant investments in cybersecurity measures, gaps continue to exist. Many professionals overlook the importance of ...

How Protected Are Your Automated Systems?

Are Your Machine Identities Safe? Non-Human Identities (NHIs) and Secrets Security Management present a groundbreaking approach to data security. But what is the reality of your automated systems’ protection? We will explore this question, ...

Fostering Innovation with Secure Access Management

How Does Secure Access Management Fuel Innovation? Have you ever pondered the correlation between innovation security and business success? With businesses heavily rely on technology to innovate and drive growth, secure access management has ...

Building Confidence in Your Cybersecurity Strategy

Why is a Comprehensive Cybersecurity Strategy Essential? A robust cybersecurity strategy is no longer a luxury but a necessity. Whether it is financial services, healthcare, or travel, organizations are making significant shifts to the digital ...

How mental health affects students

Student mental well-being is continuing to worsen. 40% of school-aged students report persistent depressive symptoms, while 20% consider serious self-harm. As school communities debate the cause of increasing mental health issues among students, ...

BSidesLV24 – GroundFloor – Tactics of a Trash Panda

Author/Presenter: Angel Gamboa Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Security, Compliance, and Visibility in Kubernetes Infrastructure

The shift to cloud-native infrastructure has introduced a difficult dilemma for many security and compliance teams: do compliance requirements and the desire for visibility impede the ability to use more secure systems in cloud-native ...

Closing the Loop: Continuous API Security Testing – FireTail Blog

May 15, 2025 - Lina Romero - APIs power the modern internet as we know it. AI is grabbing the headlines, but less time is spent reporting on the APIs that connect these AI models behind the scenes to users, apps and data. As a result, API ...

When the Perimeter Fails: Microsegmentation as the Last Line of Defense

Perimeter defenses can fail. Learn how microsegmentation halts lateral movement, securing your network from internal threats. The post When the Perimeter Fails: Microsegmentation as the Last Line of Defense appeared first on ColorTokens. The post ...

Backdoor implant discovered on PyPI posing as debugging utility

Threat actors have all kinds of motivations for targeting open-source software (OSS) repositories like the Python Package Index (PyPI). Financial gain is one of them. As ReversingLabs (RL) 2025 Software Supply Chain Security Report noted, there ...

Emulating the Terrorizing VanHelsing Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by VanHelsing ransomware, a new and rapidly growing ransomware-as-a-service (RaaS) affiliate program that emerged in March 2025. This emulation enables defenders to test ...

Proofpoint to acquire Hornetsecurity

Proofpoint has entered into a definitive agreement to acquire Hornetsecurity, a pan-European provider of AI-powered Microsoft 365 (M365) security, data protection, compliance, and security awareness services. Terms of the deal are confidential. ...

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

Arachnid alarm: Three major British retailers recently attacked, resulting in huge damage. Now we see the self-same scum spotlighting stores in the States. The post Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce ...

Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data

Coinbase said a group of rogue contractors were bribed to pull customer data from internal systems, leading to a $20 million ransom demand. The post Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data appeared first ...

BSidesLV24 – GroundFloor – The Road To Developers’ Hearts

Author/Presenter: Sing Ambikapathi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Streamlining PCI DSS 4.0 Compliance for IBM Z Series Customers

IBM Z Series customers traditionally include some of the world’s biggest financial services and retail companies. This puts them firmly in the crosshairs of the Payment Card Industry Data Security Standard (PCI DSS). Yet while compliance can be ...

Coinbase suffers data breach, gets extorted (but won’t pay)

Cryptocurrency exchange platform Coinbase has suffered a breach, which resulted in attackers acquiring customers’ data that can help them mount social engineering attacks, the company confirmed today by filing a report with the US ...

GitLab 18 increases developer productivity by integrating AI throughout the platform

GitLab launched GitLab 18, including AI capabilities natively integrated into the platform and major new innovations across core DevOps, and security and compliance workflows that are available now, with further enhancements planned throughout ...

DHS Cancels $2.4 Billion Leidos Contract, Cites Changes at CISA

DHS cancelled a $2.4 billion contract to Leidos that was awarded last year for ACTS, a project aimed at supporting CISA. Rival Nightwing protested the award, but DHS said the contract was pulled in light of budgetary and mission changes at CISA ...

A Unified Approach to Exposure Management: Introducing Tenable One Connectors and Customized Risk Dashboards

Unified visibility and context are the keys to an effective exposure management program. Learn how the new Tenable One connectors and unified dashboards give you a comprehensive view of your attack surface, help you streamline decision-making and ...