Application Security News and Articles


Are You Free from Secrets Sprawl Worry?

Is your organization truly secure against Secrets sprawl? Cloud-based firms face a growing wave of identity and secrets security challenges. Among these, the phenomenon of Secrets sprawl threatens to jeopardize the integrity of data and IT ...

Satisfied with Your Secrets Management?

Are You Fully Satisfied with Your Current Secrets Management? How often do you question the effectiveness of your secrets management processes? It’s paramount to ensure the processes and tools employed in secrets management are keeping pace ...

How SBOMs power secure software acquisition | Sonatype Blog

CISA's Supply Chain Integrity Month reminds us of an undeniable truth about modern software development: transparency in software supply chains is no longer optional. The theme of week 4 is "Transparency: Securing Hardware and Software Across the ...

Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help

Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest risk to their operations. Existing scoring systems are invaluable but can lack context. Here’s ...

What is the xBOM?

The software supply chain has never been more complex — or more critical to secure. For years, the Software Bill of Materials (SBOM) has been the go-to tool for documenting components within software, offering much-needed visibility into ...

BSidesLV24 – Ground Truth – ZERO-RULES Alert Contextualizer & Correlator

Author/Presenter: Ezz Tahoun Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

ADR vs EDR and WAF | Application Security Tool Comparison | Contrast Security

New research demonstrates cyberattacks on the application layer often evade the most common tools, Endpoint Detection and Response (EDR) and web application firewalls (WAFs). Contrast Labs spent several weeks testing several attack methods to ...

AI Innovation at Risk: FireTail’s 2025 Report Reveals API Security as the Weak Link in Enterprise AI Strategies – FireTail Blog

Apr 25, 2025 - Alan Fagan - Washington, D.C. — 25th April 2025 — FireTail, the leading AI & API security platform, has released its annual report, The State of AI & API Security 2025, revealing a critical blind spot in the way ...

Guide: What is KMI (Key Management Infrastructure)?

One of the most critical elements of modern information security is encryption. Encryption is a complex field based solely on the arms race between people seeking secure ways to encode and encrypt data at rest and in transit and those seeking to ...

New Spin on Vishing: Attackers Are Now Targeting Healthcare Appointments

When we think about vishing (voice phishing), the usual suspects come to mind: fake refund scams impersonating Norton, PayPal, or Geek Squad. The post New Spin on Vishing: Attackers Are Now Targeting Healthcare Appointments appeared first on ...

North Korean Group Creates Fake Crypto Firms in Job Complex Scam

The North Korean hackers behind the Contagious Interview worker scam, which threat intelligence analysts have followed since late 2023, are now hiding behind three bogus crypto companies they created as fronts for their info- and crypto-stealing ...

Euler’s Königsberg Bridges: How Simple Math Can Model Lateral Movement for Effective Microsegmentation

You may have seen the “no-lift pencil” puzzles online — challenges that ask you to draw a shape without lifting your pencil or retracing any lines. I solved a few of these on our whiteboard at home, much to my kids’ amazement. Of course, ...

HiddenLayer Researchers Surface Prompt Technique Bypassing All AI Guardrails

HiddenLayer this week disclosed its researchers have discovered a prompt injection technique that bypasses instruction hierarchy and safety guardrails across all the major foundational artificial intelligence (AI) models. The post HiddenLayer ...

200,000 Workers’ PII at Risk in WorkComposer S3 SNAFU

Don’t say ‘spyware’—21 million screenshots in one open bucket. The post 200,000 Workers’ PII at Risk in WorkComposer S3 SNAFU appeared first on Security Boulevard.

CVE-2025-31324: Zero-Day Vulnerability in SAP NetWeaver Exploited in the Wild

SAP has released out-of-band patch to address CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver that has been exploited by threat actors. Organizations are strongly encouraged to apply patches as soon as possible. Background On ...

Bipartisanship Key to CISA Renewal

As fractious as Congress has been for the better part of a decade, it did manage to pass the Cybersecurity Information Sharing Act in 2015. And now that it’s up for renewal, it seems prudent—no, necessary—that Congress unite to okay it once ...

AI-Based Cybersecurity Solutions

Empower your MSP or MSSP with AI-driven cybersecurity. Discover how Seceon enables service providers to deliver scalable, automated threat detection and response across multi-tenant environments. Whether you’re a Managed Security Service ...

Cybersecurity for Service Providers

In today’s hyper-connected digital world, Cybersecurity for Service Providers have emerged as critical enablers of modern business operations. Whether it’s managed service providers (MSPs), managed security service providers (MSSPs), cloud ...

The Hidden Security Risk on Our Factory Floors

ICS and SCADA (supervisory control and data acquisition) networks were built as isolated systems, never meant to connect to the internet. The post The Hidden Security Risk on Our Factory Floors appeared first on Security Boulevard.

Partner-Ready Security Solutions: Empowering Growth, Elevating Protection

In today’s rapidly evolving threat landscape, cybersecurity is no longer optional—it’s a necessity. Businesses of all sizes are seeking robust, scalable, and intelligent solutions that offer not only protection but also agility and ...