Application Security News and Articles
In a world where organizations’ digital footprint is constantly changing and attackers regularly capitalize on security failings in exposed IT assets, making the effort to minimize your external attack surface is a no-brainer. The goal is ...
Explore industry moves and significant changes in the industry for the week of April 28, 2025. Stay updated with the latest industry trends and shifts.
Discover the Blue Shield of California data breach affecting 4.7M members. Learn about the risks and essential security measures to protect your data.
The post Blue Shield of California Data Breach Exposes 4.7M Members’ Info appeared first on ...
Discover Google's Firestore with MongoDB compatibility, enhancing cloud database functionality with serverless architecture. Explore the future of data storage.
The post Google Cloud Enhances Databases with Firestore and MongoDB Features appeared ...
GoSearch is an open-source OSINT tool built to uncover digital footprints linked to specific usernames. Designed for speed and accuracy, it lets users quickly track someone’s online presence across multiple platforms. GoSearch incorporates ...
Ransomware attacks are becoming more refined and pervasive, posing significant challenges to organizations globally. A Veeam report reveals that while the percentage of companies impacted by ransomware attacks has slightly declined from 75% to ...
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE ...
Web applications face a wide range of risks, including known-exploitable vulnerabilities, supply chain attacks, and insecure identity configurations in CI/CD, according to the Datadog State of DevSecOps 2025 report. 14% of Java services still ...
Santa Clara, Calif. April 27, 2024 – Recently, NSFOCUS Intelligent Security Operations Platform (NSFOCUS ISOP) was once again recognized by the internationally renowned consulting firm Frost & Sullivan and won the 2024 “Global Modern ...
As generative artificial intelligence develops, new terms and emerging threats are grabbing headlines regarding cyber threats to enterprises.
The post ‘Slopsquatting’ and Other New GenAI Cybersecurity Threats appeared first on ...
Are Your Cloud Compliance Practices Truly Impenetrable? Non-Human Identities (NHIs) and Secrets Management have emerged as critical components of an effective cybersecurity strategy. These effectively address the security gaps that often exist ...
Why is Advanced Identity and Access Management Necessary? Have you ever imagined the chaos that would ensue if all the people in a bustling city, for instance, Los Angeles or New York, swapped their identities suddenly? A similar scenario might ...
Why should Cybersecurity Strategy Spark Optimism? Why is there a growing wave of optimism surrounding cybersecurity strategies, especially with the increasing incidence of cyber threats? The answer lies in the revolutionary approach of Non-Human ...
Are You Understanding the Complexities of Managing NHIDs? When it comes to reinforcing cybersecurity, how confident are you in providing adequate protection for your Non-Human Identities (NHIs)? Are you familiar with the mechanisms that drive ...
ONYPHE has made available a free API and free MMDB download of their new Geolocus database. It provided IP address metadata in the form of: { "abuse": [ "amzn-noc-contact@amazon.com", "aws-routing-poc@amazon.com", ...
Authors/Presenters: Douglas McKee
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...
Discover how SecOps is evolving from reactive alert handling to proactive, identity-driven security operations, and how Grip helps teams stay ahead of threats.
The post Grip Security Defines the Identity-Driven Future of SecOps appeared first on ...
The New Dawn Returns – Horizon Shifts in Cyberattack Trends Following our in-depth analysis of IBM’s 2025 Threat Intelligence Index, CybeReady’s research team has identified a significant “Back to the Future” moment in cyberattack ...
Regional APT Threat Situation Overview In March 2025, the global threat hunting system of NSFOCUS Fuying Laboratory discovered a total of 19 APT attack activities. These activities were mainly distributed in South Asia, East Asia, Eastern Europe, ...
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs MITRE has released the latest version of its ATT&CK framework, which now also ...