Application Security News and Articles


New Attacks Against Secure Enclaves

Encryption can protect data at rest and data in transit, but does nothing for data in use. What we have are secure enclaves. I’ve written about this before: Almost all cloud services have to perform some computation on our data. Even the ...

Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site

The Cl0p website lists major organizations such as Logitech, The Washington Post, Cox Enterprises, Pan American Silver, LKQ Corporation, and Copeland. The post Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site appeared ...

QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland

Multiple vulnerabilities across QNAP’s portfolio could lead to remote code execution, information disclosure, and denial-of-service (DoS) conditions. The post QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland appeared first on SecurityWeek.

Australia Sanctions Hackers Supporting North Korea’s Weapons Program

Australia mirrored the US’s recent sanctions against bankers, financial institutions, and others allegedly involved in laundering funds for North Korea. The post Australia Sanctions Hackers Supporting North Korea’s Weapons Program ...

The Mosaic Effect: Why AI Is Breaking Enterprise Access Control 

AI’s mosaic effect turns harmless data into sensitive insight. Learn why traditional access control fails and how REBAC secures AI-driven environments. The post The Mosaic Effect: Why AI Is Breaking Enterprise Access Control  appeared first on ...

AI Demands Laser Security Focus on Data in Use 

AI’s growth exposes new risks to data in use. Learn how confidential computing, attestation, and post-quantum security protect AI workloads in the cloud. The post AI Demands Laser Security Focus on Data in Use  appeared first on Security ...

With Geopolitical Uncertainty Rising, Is It Time to Reimagine Your GCC & Nearshore Strategy?

Think of your global capability center (GCC) strategy as a high-wire act. For years, it’s been about balance, cost savings on one side, operational efficiency...Read More The post With Geopolitical Uncertainty Rising, Is It Time to Reimagine ...

The Professionalised World of Cybercrime and the New Arms Race 

Cybercrime is now a global, professionalised industry. Learn how AI, ransomware, and organised groups are reshaping cybersecurity and business defence. The post The Professionalised World of Cybercrime and the New Arms Race  appeared first ...

The Role of Customer Feedback in Product Development

Discover how customer feedback shapes product development, drives innovation, and helps brands like Yotpo improve satisfaction and stay competitive. The post The Role of Customer Feedback in Product Development appeared first on Security Boulevard.

250th Marine Corps Birthday: A Message From Commandant Marine Corps Gen. Eric M. Smith And Sergeant Major Of The Marine Corps Sgt. Maj. Carlos A. Ruiz

The post 250th Marine Corps Birthday: A Message From Commandant Marine Corps Gen. Eric M. Smith And Sergeant Major Of The Marine Corps Sgt. Maj. Carlos A. Ruiz appeared first on Security Boulevard.

250th Marine Corps Birthday: A Message From The Commandant Marine Corp And Sergeant Major Of The Marine Corps

Video By Chief Warrant Officer Joshua Chacon, Sgt.James Stanfield) And John Martinez Permalink The post 250th Marine Corps Birthday: A Message From The Commandant Marine Corp And Sergeant Major Of The Marine Corps appeared first on Security ...

250th Marine Corps Birthday: A Message From Commandant Marine Corps Gen. Eric M. Smith And Sergeant Major Of The Marine Corps Sgt. Maj. Carlos A. Ruiz

Embed Block Add an embed URL or code. Learn more The post 250th Marine Corps Birthday: A Message From Commandant Marine Corps Gen. Eric M. Smith And Sergeant Major Of The Marine Corps Sgt. Maj. Carlos A. Ruiz appeared first on ...

Wi-Fi signals may hold the key to touchless access control

Imagine walking into a secure building where the door unlocks the moment your hand hovers near it. No keycards, no PINs, no fingerprints. Instead, the system identifies you by the way your palm distorts the surrounding Wi-Fi signal. That is the ...

Adopting a counterintelligence mindset in luxury logistics

In this Help Net Security interview, Andrea Succi, Group CISO at Ferrari Group, discusses how cybersecurity is integrated into every aspect of the logistics industry. He explains why protecting data can be as critical as securing physical assets ...

sqlmap: Open-source SQL injection and database takeover tool

Finding and exploiting SQL injection vulnerabilities is one of the oldest and most common steps in web application testing. sqlmap streamlines this process. It is an open-source penetration testing tool that automates the detection and ...

How to adopt AI security tools without losing control

In this Help Net Security video, Josh Harguess, CTO of Fire Mountain Labs, explains how to evaluate, deploy, and govern AI-driven security tools. He talks about the growing role of AI in security operations and the new kinds of risks it brings. ...

Meet NEO 1X: The Robot That Does Chores and Spies on You?

The future of home robotics is here — and it’s a little awkward. Meet the NEO 1X humanoid robot, designed to help with chores but raising huge cybersecurity and privacy questions. We discuss what it can actually do, the risks of having an ...

AI is rewriting how software is built and secured

AI has become part of everyday software development, shaping how code is written and how fast products reach users. A new report from Cycode, The 2026 State of Product Security for the AI Era, explores how deeply AI now runs through development ...

Should I create a Single Sign-On account or another authentication method?

Choosing between SSO and other authentication methods? This guide helps CTOs/VPs understand the security, UX, and management implications to make the right choice. The post Should I create a Single Sign-On account or another authentication ...

What is CIAM?

Explore Customer Identity and Access Management (CIAM): its definition, importance, benefits, and how it differs from IAM. Learn how CIAM enhances user experience and security. The post What is CIAM? appeared first on Security Boulevard.