Application Security News and Articles


Powerful Tools to Manage Machine Identities

Why Are Non-Human Identities Critical in Cybersecurity? What happens when machine identities are not managed efficiently? Cybersecurity is rapidly transforming with increasing reliance on machine identities, also referred to as Non-Human ...

Preventing DNS filtering bypass by Encrypted DNS (DoT, DoH, DoQ)

DNS over HTTPS (DoH) and other encrypted DNS protocols like DNS over TLS (DoT) & DNS over QUIC (DoQ) enhances user privacy and security by encrypting DNS queries in transit, shielding them from eavesdropping, tampering, and censorship on ...

The Phishing Renaissance, How AI Brought Back the Classics

I've been giving talks lately about the evolution of phishing attacks - tracking them from the Nigerian Prince emails of 1993 all the way to today's deepfake video calls. It's a fun trip down memory lane, filled with AOL phishing scams and QR ...

Defending DNS with Infoblox and Protective DNS

For too long, we’ve treated DNS as a simple utility. It’s just a phonebook for the internet, right? Treating it that way is a mistake. Nearly every single malicious action, whether it’s a phishing link, a command-and-control ...

PhantomRaven: npm Malware Evolves Again

Published 3:00 p.m. ET on October 31, 2025; last updated 5:00 p.m. ET on October 31, 2025 This week, an open source malware campaign dubbed ‘PhantomRaven’ has run rampant, flooding the npm registry with over a hundred malicious packages that ...

NDSS 2025 – Was This You? Investigating the Design Considerations for Suspicious Login Notifications

Authors, Creators & Presenters: Sena Sahin (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Frank Li (Georgia Institute of Technology) PAPER Was This You? Investigating the Design Considerations for Suspicious ...

Randall Munroe’s XKCD ‘Hot Water Balloon”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Hot Water Balloon” appeared first on Security Boulevard.

From Visibility to Action: How AI and Automation Are Reshaping Enterprise Security

Alan speaks with Shailesh Athalye, senior vice president of product management at Qualys, about how AI, automation, and integrated platforms are redefining the way enterprises approach cybersecurity and risk management. Athalye notes that many ...

Working Towards Improved PAM: Widening The Scope And Taking Control

Learn how GitGuardian supports expanding privileged access management to include non-human identities and improve secrets management across your infrastructure and vaults. The post Working Towards Improved PAM: Widening The Scope And Taking ...

Cyber Risk in Real Time: Lessons from the Front Lines

Alan and Kip Boyle, founder and chief information security officer at Cyber Risk Opportunities, discuss how organizations can rethink cybersecurity in terms of measurable risk rather than endless checklists and compliance frameworks. Boyle, a ...

In Other News: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Solution

Other noteworthy stories that might have slipped under the radar: several interesting Android malware families, UN cybercrime treaty, criminal complaint against Clearview AI in Europe. The post In Other News: WhatsApp Passkey-Encrypted Backups, ...

Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)

A Windows vulnerability (CVE-2025-9491, aka ZDI-CAN-25373) that state-sponsored threat actors and cybercrime groups have been quietly leveraging since at least 2017 continues to be exploited for attacks. “Arctic Wolf Labs assesses with high ...

What is the Agent Payments Protocol (AP2) and How Does It Work?

An amazing post The post What is the Agent Payments Protocol (AP2) and How Does It Work? appeared first on Security Boulevard.

Stateless Authentication: Understanding Token-Based Auth

An amazing post The post Stateless Authentication: Understanding Token-Based Auth appeared first on Security Boulevard.

NDSS 2025 – Exploring User Perceptions Of Security Auditing In The Web3 Ecosystem

SESSION Session 1C: Privacy & Usability 1 Authors, Creators & Presenters: Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania State University), Kanye Ye Wang (University of ...

FCC Chair Carr Looks to Eliminate Telecom Cybersecurity Ruling

FCC Chair Brendan Carr said the agency will look to eliminate a declaratory ruling made by his predecessor that aimed to give the government more power to force carriers to strengthen the security of their networks in the wake of the widespread ...

Explainable & Trustworthy AI in Healthcare Analytics: How Blockchain and XAI Are Powering 2026’s Next Wave

Every healthcare CEO and CTO is asking the same question in 2025 and for 2026, “Can I trust what my AI just told me?” Artificial...Read More The post Explainable & Trustworthy AI in Healthcare Analytics: How Blockchain and XAI Are ...

Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges

Oleksii Oleksiyovych Lytvynenko is now in the US after being held in custody in Ireland since 2023. The post Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges appeared first on SecurityWeek.

Transnational Organized Crime Gang Steals $1 Million from Ontario Couple

Today my LinkedIn feed and Google News filter is showing me several stories that illustrate how we are failing to stop online scammers from stealing from our elderly.  It starts with the headlines. CTVNews:  Ontario seniors GIVE AWAY MORE THAN ...

Enterprise Vulnerability Management: A Comprehensive Guide

Learn about enterprise vulnerability management, its components, challenges, and best practices for Enterprise SSO, Enterprise Ready, and CIAM environments. Enhance your organization's security posture. The post Enterprise Vulnerability ...