Application Security News and Articles


Qmulos Launches Q-Behavior Analytics and Audit (Q-BA2)

Built on the intelligence community's gold standard for insider threat detection, Q-BA2 delivers real-time, data-driven insights to proactively identify, investigate, and mitigate security threats The post Qmulos Launches Q-Behavior Analytics and ...

Introduction to the Australian Privacy Principles

The post Introduction to the Australian Privacy Principles appeared first on Feroot Security. The post Introduction to the Australian Privacy Principles appeared first on Security Boulevard.

BSidesLV24 – Breaking Ground – Operation So-Seki: You Are a Threat Actor. As Yet You Have No Name

Authors/Presenters: Kaichi Sameshima, Atsushi Kanda, Ryo Minakawa Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at ...

Legit Scans for Secrets in SharePoint

Get details on Legit's new ability to scan for secrets in SharePoint. The post Legit Scans for Secrets in SharePoint appeared first on Security Boulevard.

Emulating the Misleading CatB Ransomware

AttackIQ has released a new attack graph designed to emulate the Tactics, Techniques, and Procedures (TTPs) associated with CatB ransomware observed in its most recent activities, enabling defenders to test and validate their detection and ...

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools

Google plans to unleash automated AI agents into overtaxed SOCs to reduce the manual workload for cybersecurity investigators. The post Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools appeared first on SecurityWeek.

Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them. The post Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy appeared ...

AI Now Outsmarts Humans in Spear Phishing, Analysis Shows

Agentic AI has improved spear phishing effectiveness by 55% since 2023, research shows. The post AI Now Outsmarts Humans in Spear Phishing, Analysis Shows appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Decay Chain’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Decay Chain’ appeared first on Security Boulevard.

Trends-To-Watch Q&A: The future of edge—will decentralization ever be more than a talking point?

For decades, a handful of tech giants have shaped digital infrastructure—and, with it, how businesses and governments manage data, security, and connectivity. Related: Practical uses for edge computing Now, the rise of distributed edge ...

News alert: Gcore launches Super Transit – accelerated DDoS protection to safeguard enterprises

Luxembourg, Luxembourg, Apr. 9, 2025, CyberNewswire — Gcore, the global edge AI, cloud, network, and security solutions provider, has launched Super Transit, a cutting-edge DDoS protection and acceleration feature, designed to safeguard ...

Patch Tuesday Update – April 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 134 CVEs, including 9 republished CVEs. Overall, Microsoft announced one Zero-Day, 11 Critical, and 113 Important vulnerabilities. From an Impact ...

BSidesLV24 – Breaking Ground – Chrome Cookie Theft On macOS, And How To Prevent It

Author/Presenter: Nick Frost Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Wyden to Hold Up Trump CISA Nominee Over Telecom ‘Cover Up’: Report

Senator Ron Wyden (D-OR) is demanding CISA release a three-year-old report critical of telecoms' security in the wake of the expansive Salt Typhoon hacks before he lifts a hold on President Trump's nomination of Sean Plankey as head of the ...

Why traditional bot detection techniques are not enough, and what you can do about it

Bots are often used to conduct attacks at scale. They can be used to automatically test stolen credit cards, steal user accounts (account takeover), and create thousands of fake accounts. Detecting bot activity has traditionally relied on ...

AI-Powered Cookie Consent Management: Navigating the Future of Website Privacy Compliance

AI is revolutionizing cookie consent management, turning a complex compliance challenge into a strategic advantage. With automated scanning, intelligent categorization, and adaptive interfaces, businesses can now ensure regulatory compliance ...

CodeSecure and FOSSA Partner to Deliver Single Integrated Platform for Binary and Open Source Analysis

Consolidated capabilities enable customers to create comprehensive software bill of materials and eliminate security blindspots across the software development lifecycle BETHESDA, Md., Apr. 9, 2025 – CodeSecure, a leading global provider of ...

Bringing Rigor to CTEM with Threat-Informed Defense

While vulnerability management is an essential part of good cyber hygiene, it isn’t the only defense necessary against threat actors. Even if organizations could keep all their systems patched, exploited vulnerabilities are only responsible for ...

The Database Kill Chain

Modern attacks targeting sensitive data have become complex. An organization with many assets might be lost when trying to assess its overall risk, understand the pain points and prioritize the tasks required to secure its information systems. ...

Forescout eyeScope provides organizations with insight into their security posture

Forescout announced new Forescout eyeScope cloud visibility and monitoring solution, expanding the Forescout 4D Platform to the cloud. Forescout also announced a new, small footprint, edge data collector for enterprises that require Forescout’s ...