Application Security News and Articles


Developing with Docker and Sonatype: Building secure software at scale

Docker remains a cornerstone of modern development environments, helping teams containerize applications, speed up delivery pipelines, and standardize across systems. But as container usage grows, so do concerns about software supply chain ...

MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s next

Stephen Klein didn’t just stir the pot. He lit a fire. Related: Klein’s LinkedIn debate In a sharply worded post that quickly went viral on LinkedIn, the technologist and academic took direct aim at what he called the “hype-as-a-service” ...

Beyond Auth0: A Comprehensive Guide to Authentication Alternatives in 2025

Struggling with Auth0's pricing or technical limitations? This comprehensive guide analyzes the top commercial and open-source authentication alternatives for 2025, helping you select the perfect solution based on your specific technical ...

BSidesLV24 – GroundFloor – Building Data Driven Access With The Tools You Have

Author/Presenter: John Evans Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

BSidesLV24 – GroundFloor – Prepare For The Apocalypse – Exposing Shadow And Zombie APIs

Author/Presenter: Amit Srour Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Shaping the Future of Cybersecurity: Seceon’s Unified Platform Strategy for 2025 and Beyond

The cybersecurity landscape is at a tipping point. Enterprises and service providers alike are burdened by tool sprawl, alert fatigue, siloed operations, and rising adversarial sophistication. Traditional approaches relying on loosely integrated, ...

HYPR Advances Identity Verification & Credential Management Processes in YubiKey Deployments

Why Phishing-Resistant MFA Isn’t Optional Anymore The escalating sophistication of phishing and social engineering attacks has pushed organizations towards stronger authentication methods. Phishing-resistant multi-factor authentication (MFA), ...

ThreatMark offers protection against social engineering attacks and scams

ThreatMark launched ScamFlag, a Generative AI-powered solution designed to protect digital banks and their customers from the scams and social engineering attacks. Seamlessly integrating into existing digital banking applications, ScamFlag ...

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide

A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360. The campaign uses fake Google ads, advanced filtering techniques, to steal sensitive login credentials and bypass MFA. ...

We’re Answering Your Exposure Management Questions

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this Exposure Management Academy FAQ, we help CISOs understand exposure ...

UK Legal Aid Agency Finds Data Breach Following Cyberattack

The UK’s Legal Aid Agency was targeted in a cyberattack in April and it recently determined that hackers have stolen sensitive data. The post UK Legal Aid Agency Finds Data Breach Following Cyberattack appeared first on SecurityWeek.

New Feature: CIS IG Level Controls | Kovrr Blog

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post New Feature: CIS IG Level Controls | Kovrr Blog appeared first on Security Boulevard.

Malicious RVTools installer found on official site, researcher warns

The official site for RVTools has apparently been hacked to serve a compromised installer for the popular utility, a security researcher has warned. It’s difficult to say how long the malicious version has been available for download, but ...

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Serviceaide exposed a database containing personal and medical information belonging to Catholic Health patients. The post 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak appeared first on SecurityWeek.

Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe

Neuromorphic computing is moving from theory to reality, with brain-inspired processors offering real-time intelligence, low power consumption, and built-in privacy—ushering in a new era for edge devices and cybersecurity. The post Spiking ...

17 Innovation Frameworks Every Business Leader Should Know in 2025

Innovation is not just a buzzword, it’s a critical driver of growth and competitive advantage. Understanding and implementing the right innovation frameworks can help organizations...Read More The post 17 Innovation Frameworks Every Business ...

200,000 Harbin Clinic Patients Impacted by NRS Data Breach

Harbin Clinic says the information of over 200,000 patients was stolen in a July 2024 data breach at Nationwide Recovery Services. The post 200,000 Harbin Clinic Patients Impacted by NRS Data Breach appeared first on SecurityWeek.

Open MPIC: The open-source path to secure Multi-Perspective Issuance Corroboration

Open MPIC is an open-source framework designed to help Certificate Authorities (CAs) meet new Multi-Perspective Issuance Corroboration (MPIC) requirements from the CA/Browser Forum. Developed with contributions from Princeton and Sectigo, it ...

Prison Sentence for Man Involved in SEC X Account Hack

Eric Council Jr. was sentenced to prison for hacking SEC’s official X account and publishing fraudulent posts increasing Bitcoin value. The post Prison Sentence for Man Involved in SEC X Account Hack appeared first on SecurityWeek.

Hackers Earn Over $1 Million at Pwn2Own Berlin 2025

Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems. The post Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 appeared first on SecurityWeek.