Application Security News and Articles


Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data

Aflac said that it’s in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals. The post Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, ...

Hands-On with Amazon Inspector’s Latest Feature: Code Security

Seamlessly integrates with GitHub to automatically detect code vulnerabilities — perfect for developers new to static analysis.Continue reading on Medium »

The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive

The $4.88 million question isn't really whether organizations can afford to implement passwordless authentication—it's whether they can afford not to. With breach costs rising 10% annually, credential-based attacks representing the primary ...

How NHIs Can Handle Your Security Needs

Why Should Professionals Consider NHI for Security Needs? Is your organization exploring efficient ways to secure cloud environments? By leveraging comprehensive Non-Human Identities (NHIs), businesses can improve their cybersecurity posture ...

Justify Your Investment in Advanced NHIs

Is Your Investment in Advanced NHIs Justifiable? Investing in advanced Non-Human Identities (NHIs) is no longer a luxury, but a necessity for businesses, particularly those operating in the cloud. But how can you ensure that your hefty investment ...

Why Satisfied Teams Use Cloud Compliance Tools

How Does Cloud Compliance Translate Into Team Satisfaction? Are you worried about securing machine identities? Certainly, managing Non-Human Identities (NHIs) is a complex task that requires the right cybersecurity approach. However, its ...

Stay Relaxed with Robust IAM Solutions

Why do You Need Robust IAM Solutions? How secure are your organizational operations? Establishing a relaxed security management mindset requires a significant leap. The answer could lie in robust Identity and Access Management (IAM) solutions. ...

PCI DSS 4.0.1: What Changed and How is this the Next Step for Universal MFA

As the transition period for PCI DSS 4.0 draws to a close on March 31, 2025, PCI DSS 4.0.1 stands as the current version of the standard. More importantly, the March 31, 2025 deadline for full compliance with all new and customized PCI DSS 4.0 ...

Enterprise Kubernetes Explained: How to Leverage K8s Effectively

Enterprise Kubernetes management is at the heart of modern cloud-native strategies, enabling organizations to deploy, scale, and govern applications effectively. In 2025, enterprise Kubernetes has evolved into a critical platform for businesses ...

LinuxFest Northwest: The Geology of Open Source

Author/Presenter: Hazel Weakly (Nivenly Foundation; Director, Haskell Foundation; Infrastructure Witch of Hachyderm) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), ...

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

DoJ, FBI, USSS yoinked USDT: Pretty girls plus investment fraud equals forfeiture recovery (eventually). The post US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency appeared first on Security Boulevard.

Tonic Validate is now on GitHub Marketplace! (Part 2)

Tonic Validate is a free, open-source library for evaluating RAG and LLM based applications. We recently announced a new listing on GitHub Marketplace that provides a GitHub Actions template to run Tonic Validate against code changes on every ...

Tonic Validate is now available on GitHub Marketplace!

Tonic Validate, our free, open-source library for evaluating RAG and LLM-based applications, can be run entirely as a GitHub Action. And it's now available for quick deployment on GitHub Marketplace! The post Tonic Validate is now available on ...

Tonic.ai Achieves HIPAA Compliance Certification, Ensuring Enhanced Security for Protected Health Information

We are proud to announce that we have successfully completed our HIPAA certification, marking a significant milestone in our commitment to data security and privacy. This achievement underscores our dedication to providing secure data ...

Steam Phishing: popular as ever

A month or so ago a friend of mine received the following message on Steam from someone in their Friends list (they were already friends): Figure 1 - 'this is for you'                                The two links are ...

CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin

Remote attackers can trigger an avalanche of internal ESI requests, exhausting memory and causing denial-of-service in Apache Traffic Server. Executive Summary Imperva’s Offensive Security Team discovered CVE-2025-49763, a high-severity ...

Top 7 Ambient Listening AI Tools Revolutionizing Healthcare in 2025

Imagine if every doctor had an invisible assistant, one that quietly listens during every patient interaction, captures every detail with precision, and instantly writes the...Read More The post Top 7 Ambient Listening AI Tools Revolutionizing ...

LinuxFest Northwest: The Intersectionality Of Human Psychology, Security And The Era Of AI And Misinfo

Author/Presenter: Autumn Nash (Product Manager At Microsoft, Specializing In Linux Security Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the ...

JavaScript Protector Pro: The Ultimate Tool to Obfuscate & Secure Your JavaScript Code

In today’s digital age, JavaScript is everywhere — powering everything from sleek single-page applications to complex web dashboards. But…Continue reading on Medium »

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer

Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer. The post In Other News: Viasat Hacked by China, Washington Post ...