Application Security News and Articles


Week in review: Exploited zero-day in Cisco email security appliances, Kali Linux 2025.4 released

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How researchers are teaching AI agents to ask for permission the right way People are starting to hand more decisions to AI agents, from booking ...

How essential are NHIs in the effective management of cloud security

Are Non-Human Identities the Missing Piece in Cloud Security? Where data breaches and cyber threats are a constant concern, the question of how organizations can effectively manage cloud security has become more critical than ever. Non-Human ...

Can NHIs drive better data security practices

How Do Non-Human Identities (NHIs) Enhance Data Security Practices? Have you ever considered the importance of firmly managing Non-Human Identities (NHIs) in your organization’s data security strategy? With digital becomes increasingly ...

How to leverage Agentic AI for cost-effective security

Are You Effectively Leveraging Agentic AI for Cost-Effective Security? The rise of digital transformation within organizations has significantly enhanced productivity and innovation yet has introduced potential vulnerabilities, particularly for ...

What innovations in NHIs are transforming cybersecurity

What Are Non-Human Identities and How Do They Impact Cybersecurity? How can organizations secure their digital amidst a rapidly transforming cybersecurity environment? Where industries increasingly transition to cloud-based solutions, managing ...

NDSS 2025 – Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems

Session 6D: Software Security: Vulnerability Detection Authors, Creators & Presenters: Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University) PAPER Too Subtle to Notice: Investigating Executable Stack ...

Are We Becoming Children of the MagentAI?

(If you’d prefer, you can skip the intro blathering and just download the full white paper) Back in 1997, a commercial airline captain noticed his fellow pilots had a problem: they’d gotten so used to following the magenta flight path lines ...

Cybersecurity Budgets are Going Up, Pointing to a Boom 

KPMG finds cybersecurity budgets rising sharply as leaders invest in AI-driven defense, resilience, and smarter security operations. The post Cybersecurity Budgets are Going Up, Pointing to a Boom  appeared first on Security Boulevard.

FedRAMP Audit Log Retention Rules and Storage Options

Every cloud service provider that seeks an authorization to operate with the federal government using the FedRAMP framework has to undergo and pass an audit. Beyond passing the audit, the CSP needs to keep and maintain proof of not just their ...

Surge of OAuth Device Code Phishing Attacks Targets M365 Accounts

Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft's legitimate OAuth 2.0 device authorization grant flow to trick users into giving them access to their M365 ...

How does Agentic AI influence cybersecurity trends

How Do Non-Human Identities Reshape Cybersecurity Trends? Where every digital entity has the potential to be an entry point into an organization’s confidential assets, what role do machine identities, or non-human identities (NHIs), play in ...

What is the future of Non-Human Identities in cybersecurity

How Do Non-Human Identities Enhance Cybersecurity in Cloud Environments? Imagine where machine identities significantly outnumber human identities within corporate networks. This scenario is no longer a prediction but a reality, making the ...

How do NHIs manage secrets securely

What Are Non-Human Identities (NHIs) in Cybersecurity? How do we ensure the security of machine-to-machine communications? Within cybersecurity, Non-Human Identities (NHIs) are crucial for managing secrets and ensuring comprehensive security. ...

What compliance challenges do NHIs pose

What Are Non-Human Identities, and Why Do They Matter? Have you ever considered the hidden facets of machine identities that silently power our digital infrastructure? Non-Human Identities (NHIs) are increasingly becoming a cornerstone in ...

NCC Group Taps Qualys to Extend Managed Security Service into Shadow IT Realm

NCC Group this week revealed it has allied with Qualys to expand the scope of its managed attack surface management (ASM) services to address instances of shadow IT. Amber Mitchell, lead product manager for ASM at NCC Group, said the managed ...

4 Pillars of Network Risk Reduction: A Guide to Network Security Risk Management

Large enterprises today find themselves stuck in the “messy middle” of digital transformation, managing legacy on-premise firewalls from Palo Alto, Check Point, and Fortinet while simultaneously governing fast-growing cloud ...

NIS2 Compliance: Maintaining Credential Security

Strengthen NIS2 compliance by preventing weak and compromised passwords with Enzoic's continuous credential protection. The post NIS2 Compliance: Maintaining Credential Security appeared first on Security Boulevard.

NDSS 2025 – Interventional Root Cause Analysis Of Failures In Multi-Sensor Fusion Perception Systems

Session 6C: Sensor Attacks Authors, Creators & Presenters: Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong), Kui Wu (University of Victoria), Jinghuai Deng (City University of Hong Kong), Dapeng Wu (City ...

Thailand Conference Launches International Initiative to Fight Online Scams

Similar pledges to fight scam networks were made by members of the Association of Southeast Asian Nations in the months leading up to the Bangkok conference. The post Thailand Conference Launches International Initiative to Fight Online Scams ...

Preventing This Week’s AWS Cryptomining Attacks: Why Detection Fails and Permissions Matter

The recent discovery of a cryptomining campaign targeting Amazon compute resources highlights a critical gap in traditional cloud defense. Attackers are bypassing perimeter defenses by leveraging compromised credentials to execute legitimate but ...