Application Security News and Articles


Implementing a SCIM API for Your Application: A Comprehensive Guide

This article is part of SSOJet's technical series on identity protocols and standards. For more information on implementing SCIM with SSOJet's turnkey SSO integration solution, visit our documentation. The post Implementing a SCIM API for Your ...

BSidesLV24 – GroundFloor – A Quick Story Of Security Pitfalls With Exec Commands In Software Integrations

Author/Presenter: Lenin Alevski Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware

Google bundles multiple safeguards under a single Android toggle to protect high-risk users from advanced mobile malware implants. The post Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware appeared first on ...

SSOJet LLM-Friendly Documentation

Make SSOJet docs easy for ChatGPT, Claude, Copilot, and others. LLM-optimized formats now live—faster dev experience, better AI comprehension. The post SSOJet LLM-Friendly Documentation appeared first on Security Boulevard.

Hacking the Hardware Brains of Computers is the Ultimate Cyberattack

Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware proof-of-concept that infects at the hardware ...

Randall Munroe’s XKCD ‘Deposition’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Randall Munroe’s XKCD ‘Deposition’ appeared first on Security Boulevard.

MCP, OAuth 2.1, PKCE, and the Future of AI Authorization

6 min readThe MCP authorization spec sets a new standard for securing non-human AI agents – with lessons for anyone building autonomous, scalable systems. The post MCP, OAuth 2.1, PKCE, and the Future of AI Authorization appeared first on ...

Logging AI before it happens – FireTail Blog

May 14, 2025 - Jeremy Snyder - Did you know that some AI chatbots capture your text before you submit it?At FireTail, we've been working on helping customers understand the AI usage that's happening inside their organization. As a noted ...

Google strengthens secure enterprise access from BYOD Android devices

Google has introduced Device Trust from Android Enterprise, a new solution for making sure that private Android devices used for work are secure enough to access corporate resources and data. Device Trust from Android Enterprise (Source: Google) ...

As US CVE Database Fumbles, EU ‘Replacement’ Goes Live

Diesen Kuß der ganzen Welt! European Union Vulnerability Database (EUVD) launches this week. And not a moment too soon. The post As US CVE Database Fumbles, EU ‘Replacement’ Goes Live appeared first on Security Boulevard.

Patch Tuesday Update – May 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 83 CVEs, including 5 republished CVEs. Overall, Microsoft announced 5 Zero-Day, 11 Critical, and 66 Important vulnerabilities. From an Impact perspective, ...

BSidesLV24 – GroundFloor – Nothing Went to Plan….. Because You Didn’t Have a Plan

Author/Presenter: 0DDJ0BB Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via ...

Named an Example Vendor in 2025 Gartner® Guidance for Workforce Access Management Report

BOULDER, Colo.– Strata Identity, the Identity Orchestration company, today announced it has been named an Example Vendor in the 2025 Gartner Guidance for Workforce Access Management report by Paul Rabinovich. As noted in the report, “this ...

Is AI Use in the Workplace Out of Control?

Trying to block AI tools outright is a losing strategy. SaaS and AI are increasingly inseparable, and AI isn’t limited to tools like ChatGPT or Copilot anymore. The post Is AI Use in the Workplace Out of Control? appeared first on SecurityWeek.

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks

Intel, AMD and Arm each published security advisories on Patch Tuesday, including for newly disclosed CPU attacks. The post Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks appeared first on SecurityWeek.

TransUnion 2025 State of Omnichannel Fraud Report Insights

How Weak Identity Security Posture Affects Organizations  The report paints a clear picture: fraudsters are refining their strategies, targeting high-value credentials and exploiting vulnerabilities across all channels. Several statistics stand ...

Foxit Smart Redact Server automates the redaction of sensitive data

Foxit launched Smart Redact Server, a new AI-driven platform built to automate the redaction of sensitive data at scale across enterprise environments. Designed for organizations that manage large volumes of regulated content, the solution ...

McAfee’s Scam Detector identifies scams across text, email, and video

McAfee is introducing McAfee’s Scam Detector, a new feature that automatically identifies scams across text, email, and video. Available now in all core McAfee plans at no extra cost, it arrives at a critical moment: nearly 1 in 3 Americans say ...

Mail relays – Part 2 | Problems with forwarded mail?

Forwarded mail can be more trouble than it’s worth - especially when it’s done without checks, validation, or spam filtering. Typos, spamtraps, and forged senders can quickly snowball into blocklistings and delivery failures. In this second ...

Obsidian’s browser extension manages shadow SaaS and AI tools

Obsidian Security has launched a new browser extension to help businesses safely use SaaS and AI apps online. The extension automatically finds and manages shadow SaaS and AI tools, blocks advanced spear-phishing attacks targeting access tokens, ...