Application Security News and Articles


The Security Gap JPMorgan Chase’s CISO Didn’t Mention — And Why It’s in Your Browser

The Security Gap JPMorgan Chase’s CISO Didn’t Mention — And Why It’s in Your Browser When the CISO of JPMorgan Chase issues a public letter to all technology vendors, the industry pays attention — and rightfully so. In his open ...

How to safely change your name without putting your identity at risk

Changing your name—whether due to marriage, divorce, or personal choice—is a significant life event. However, this process involves sharing sensitive personal information across various platforms, making it a potential target for identity ...

Unified Account Defense: How AI-Powered Layers Stop Bots and Human Fraud—Faster

From login abuse to in-session fraud, DataDome’s unified account protection layers stop both bots and human attackers in real time—without disrupting legitimate users. The post Unified Account Defense: How AI-Powered Layers Stop Bots and ...

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)

Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a “very limited” number of customers, Ivanti has confirmed on Tuesday, and urged customers to ...

Randall Munroe’s XKCD ‘Pascal’s Law’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Randall Munroe’s XKCD ‘Pascal’s Law’ appeared first on Security Boulevard.

BSidesLV24 – GroundFloor – Detection Engineering Demystified: Building Custom Detections For GitHub Enterprise

Author/Presenter: David French Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Scripting Outside the Box: API Client Security Risks (1/2)

Discover hidden risks in API testing tools like Postman and Insomnia. We dive into scripting vulnerabilities and explore JavaScript sandbox security pitfalls. The post Scripting Outside the Box: API Client Security Risks (1/2) appeared first on ...

Apple Device Users Can File Claims in $95 Million Siri Spying Settlement

Apple earlier this year agreed to a $95 settlement to end a lawsuit filed in 2021 that claimed the company's AI-powered assistant Siri recorded users' conversations even when it wasn't prompted to do so. Now anyone who feels their privacy was ...

Why Your Biggest Secret Leaks Happen Behind the Firewall: Private vs. Public Repos

Private repos leak plaintext secrets 8x more often than public ones. Learn why internal codebases are the biggest blind spot in your secrets management strategy. The post Why Your Biggest Secret Leaks Happen Behind the Firewall: Private vs. ...

Tufin TOS Discovery automates device discovery and onboarding

Tufin launched Tufin Orchestration Suite (TOS) Discovery, a new solution that helps security teams ensure their network topology is always accurate and up-to-date. Maintaining up-to-date network topology is a crucial task – one that enables ...

Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources

Lenovo introduced ThinkShield Solutions, security offerings tailored to protect small and medium sized business (SMBs), schools, and other organizations with limited IT resources facing significant risks. The new offering is part of Lenovo ...

Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments

CTI, digital brand protection and other cyber risk initiatives shouldn’t only be utilized by security and cyber teams. The post Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments appeared first on SecurityWeek.

How Can Fintech Companies Balance Innovation with Customer Protection?

Picture a world where your phone isn’t just a device, but a gateway to a financial revolution. The fintech industry is rewriting the rules of...Read More The post How Can Fintech Companies Balance Innovation with Customer Protection? appeared ...

Creating Hyperrealistic Deepfakes: The Challenges of Labeling

Synthesia's AI avatars revolutionizing digital media with realism and consent. Learn how these advancements impact trust and user experience. The post Creating Hyperrealistic Deepfakes: The Challenges of Labeling appeared first on Security Boulevard.

Nvidia RTX 5090 Cracks 8-Digit Passwords in Just 3 Hours

How the Nvidia RTX 5090 can crack passwords faster than ever. Learn about security implications and best practices for password management. The post Nvidia RTX 5090 Cracks 8-Digit Passwords in Just 3 Hours appeared first on Security Boulevard.

Product showcase: Go beyond VPNs and Tor with NymVPN

If you care about online privacy, you probably already know: Centralized VPNs and even Tor aren’t enough anymore. Traditional VPNs require you to trust a single company with your internet activity. Even if they promise “no logs,” you’re ...

SAP Patches Another Critical NetWeaver Vulnerability

SAP has released 16 new security notes on its May 2025 Security Patch Day, including a note dealing with another critical NetWeaver vulnerability. The post SAP Patches Another Critical NetWeaver Vulnerability appeared first on SecurityWeek.

Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

The Radware Cloud WAF product vulnerabilities disclosed by CERT/CC were addressed two years ago. The post Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 appeared first on SecurityWeek.

Same name, different hack: PyPI package targets Solana developers

The ReversingLabs research team has written about the surge in recent years in software supply chain attacks that target cryptocurrency. RL’s 2025 Software Supply Chain Security Report documented 23 distinct malicious supply chain campaigns ...

Top 5 Cybersecurity Automation Tools Transforming Risk Management

The expanding attack surface and growing regulatory requirements have created an unsustainable workload for cybersecurity teams relying on manual processes. Organizations now recognize that automation isn't just a convenience—it's a strategic ...