Application Security News and Articles


BSidesLV24 – Ground Truth – Seek Out New Protocols, And Boldly Go Where No One Has Gone Before

Authors/Presenters: Douglas McKee Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Grip Security Defines the Identity-Driven Future of SecOps

Discover how SecOps is evolving from reactive alert handling to proactive, identity-driven security operations, and how Grip helps teams stay ahead of threats. The post Grip Security Defines the Identity-Driven Future of SecOps appeared first on ...

Identity is the New Perimeter: CybeReady’s Analysis of IBM’s X-Force 2025 Threat Intelligence Index

The New Dawn Returns – Horizon Shifts in Cyberattack Trends Following our in-depth analysis of IBM’s 2025 Threat Intelligence Index, CybeReady’s research team has identified a significant “Back to the Future” moment in cyberattack ...

NSFOCUS APT Monthly Briefing – March 2025

Regional APT Threat Situation Overview In March 2025, the global threat hunting system of NSFOCUS Fuying Laboratory discovered a total of 19 APT attack activities. These activities were mainly distributed in South Asia, East Asia, Eastern Europe, ...

Week in review: MITRE ATT&CK v17.0 released, PoC for Erlang/OTP SSH bug is public

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs MITRE has released the latest version of its ATT&CK framework, which now also ...

GDPR Data Breach Notification Template With Examples [Download]

The GDPR is a law developed by the European Union (EU) to protect individuals’ personal data. Although it originated in the EU, several countries and organisations outside Europe have to date also adopted this regulation, which shows how ...

Endpoint Security Policy Template [Download Word]

Protecting your organisation from cyber attacks is crucial. We have seen many companies fall victim to ransomware attacks and data breaches, highlighting the importance of data security in maintaining compliance. Organisations implement many ...

MY TAKE: Notes on how GenAI is shifting tension lines in cybersecurity on the eve of RSAC 2025

SAN FRANCISCO — The first rule of reporting is to follow the tension lines—the places where old assumptions no longer quite hold. Related: GenAI disrupting tech jobs I’ve been feeling that tension lately. Just arrived in the City by the … ...

Secure Your Secrets with Effective Rotation

Why Does Secrets Rotation Matter in Cybersecurity? Secrets rotation, a cybersecurity best practice, is a procedure to refresh and modify privileged credentials regularly. It’s a critical facet of managing Non-Human Identities (NHIs) and their ...

Feel Supported by Robust PAM

Can Robust PAM Systems Make a Difference? We delve into the intricacies of Non-Human Identities (NHIs) and Secrets Security Management. A well-configured PAM system, especially for organizations operating, can be the cornerstone of a solid ...

Adapting to Modern Threats in Cloud Security

Are You Effectively Managing Your Non-Human Identities? For quite a while, organizations have been grappling with numerous cybersecurity challenges. However, one obstacle stands out – the management of Non-Human Identities (NHIs) and their ...

Stay Ahead in Cloud-Native Security

Is Staying Current in Cloud-Native Security Trends Important? Absolutely! Staying ahead in cloud-native security trends is essential for organizations of all sizes and across various industries. Non-Human Identities (NHIs) and their secrets are ...

BSidesLV24 – Ground Truth – Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs

Author/Presenter: Suha Sabi Hussain Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Cynomi Raises $37 Million Series B to Expand Its vCISO Platform

Cynomi announced a new $37 million Series B funding to grow its AI-powered vCISO platform for MSPs and MSSPs. The post Cynomi Raises $37 Million Series B to Expand Its vCISO Platform appeared first on SecurityWeek.

AirSwap $sAST: A Smart Way to Maximize Earnings

Efficient Techniques to Earn More with AirSwap $sASTContinue reading on Medium »

Crypto Success: Using AirSwap to Your Advantage

A step-by-step guide to earning more with AirSwapContinue reading on Medium »

Qualys Adds Tool to Automate Audit Workflows

Qualys this week added a tool that makes it possible for organizations to continuously run audits in a way that promises to dramatically reduce failure rates. The post Qualys Adds Tool to Automate Audit Workflows appeared first on Security Boulevard.

Browser Security Firm SquareX Raises $20 Million

SquareX offers what it has dubbed a “Browser Detection and Response (BDR)” solution. The post Browser Security Firm SquareX Raises $20 Million appeared first on SecurityWeek.

Anton’s Security Blog Quarterly Q1 2025

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Dall-E security blogging image Top ...

Innovations in Non-Human Identity Management

Is Your Enterprise Leveraging NHI Management Innovations? Every organization operating in our interconnected digital era must adopt modern cybersecurity measures to safeguard their data and systems. But how many are aware of the critical role ...