Application Security News and Articles


NIST’s adversarial ML guidance: 6 action items for your security team

The National Institute of Standards and Technology’s latest guidance, on how to secure artificial intelligence (AI) applications against manipulation and attacks achieved with adversarial machine learning (ML), represents a major step toward ...

BSidesLV24 – Common Ground – Security for AI Basics – Not by ChatGPT

Author/Presenter: Chloé Messdaghi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

CSP FY: A Magecart Attack That Dodges Policy—and Makes a Joke While Doing It

by Source Defense When attackers are clever enough to name their cookie “csp_f_y,” you know they’re not just exfiltrating data—they’re mocking your defenses. In a recent attack spotted by the Source Defense Cyber Research team, a ...

Colortokens Named a Visionary by EMA in the Vendor Vision 2025 Report!

We’re thrilled to announce that ColorTokens has been named a Visionary in the Enterprise Management Associates’ (EMA) Vendor Vision for RSAC 2025! Out of hundreds of cybersecurity companies exhibiting at this year’s RSA Conference, EMA has ...

Randall Munroe’s XKCD ‘The Roads Both Taken’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘The Roads Both Taken’ appeared first on Security Boulevard.

Time to Migrate from On-Prem to Cloud? What You Need to Know

Migrating from on-premises infrastructure to the cloud is an important step for any business seeking to modernize operations, improve scalability, and (potentially) reduce costs. Using Amazon Elastic Kubernetes Service (EKS), Microsoft Azure ...

How Legit Is Using Classic Economic Tools to Prevent Application Vulnerabilities

Learn more about how Legit is helping enterprises prevent vulnerabilities in their SDLCs. The post How Legit Is Using Classic Economic Tools to Prevent Application Vulnerabilities appeared first on Security Boulevard.

What to Look for in Application Security Posture Management (ASPM)

Get details on the key capabilities for an ASPM platform.  The post What to Look for in Application Security Posture Management (ASPM) appeared first on Security Boulevard.

The Alternative to Acunetix: Escape DAST

Looking for an Acunetix alternative? Discover how Escape DAST offers seamless app and API security testing, modern integrations, and scalability. The post The Alternative to Acunetix: Escape DAST appeared first on Security Boulevard.

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects

Minh Phuong Ngoc Vong pleaded guilty to defrauding US companies of roughly $1 million in a fake IT worker scheme. The post Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects appeared first on SecurityWeek.

Your Network Is Showing – Time to Go Stealth

The Old Guard: Firewalls, VPNs and Exposed Control Planes Cyberattacks have evolved beyond the perimeter. No longer limited to opportunistic breaches, attackers are now executing coordinated campaigns that target the very foundations of ...

BSidesLV24 – Common Ground – How We Accidentally Became Hardware Hackers

Authors/Presenters: Kyle Shockley & Caleb Davis Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany ...

Attack Surface Management vs. Vulnerability Management

The post Attack Surface Management vs. Vulnerability Management appeared first on AI Security Automation. The post Attack Surface Management vs. Vulnerability Management appeared first on Security Boulevard.

The PCI DSS 4.0 Deadline Has Passed, But There’s Still Time to Play Catchup

The deadline for PCI DSS 4.0 has been and gone. But it’s never too late to advance compliance plans. It’s not just about avoiding potentially large fines and other penalties. Following the standard to the letter helps ensure organizations are ...

Introducing Rust in SonarQube

The popularity of the Rust programming language is growing. Rustaceans have been asking for SonarQube to support Rust and now it's here! The post Introducing Rust in SonarQube appeared first on Security Boulevard.

Escape Joins the AWS ISV Accelerate Program to Drive the Future of DAST in Enterprises

A couple of weeks before the RSA conference, we're thrilled to share that Escape has officially joined the AWS ISV Accelerate Program! This is a huge milestone for us, and it marks an exciting new chapter in our mission to transform how ...

Emulating the Stealthy StrelaStealer Malware

AttackIQ has released three new attack graphs designed to emulate the Tactics, Techniques, and Procedures (TTPs) associated with StrelaStealer observed in its most recent activities, enabling defenders to test and validate their detection and ...

How to Stay GDPR-Compliant Without Blocking Business Productivity

The post How to Stay GDPR-Compliant Without Blocking Business Productivity appeared first on Votiro. The post How to Stay GDPR-Compliant Without Blocking Business Productivity appeared first on Security Boulevard.

SafeLine Bot Management: Self-hosted alternative to Cloudflare

Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors. While Cloudflare Bot Management is a powerful cloud-native solution that leverages massive ...

Demystifying Security Posture Management

While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity. The post Demystifying Security Posture Management appeared first on SecurityWeek.