Application Security News and Articles


BSidesLV24 – Common Ground – Introduction to Software Defined Radio For Offensive and Defensive Operations

Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube ...

Shadow downloads – How developers have become the new perimeter

With great power comes great responsibility. The post Shadow downloads – How developers have become the new perimeter appeared first on Security Boulevard.

Exaforce Banks Hefty $75 Million for AI-Powered SOC Remake

San Francisco startup closes a hefty $75 million Series A funding round led by Khosla Ventures and Mayfield. The post Exaforce Banks Hefty $75 Million for AI-Powered SOC Remake appeared first on SecurityWeek.

Turn to Exposure Management to Prioritize Risks Based on Business Impact

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CSO Robert Huber shares practical advice on using an ...

Kenzo Security Raises $4.5 Million for Agentic AI Security Operations Platform

Kenzo Security has emerged from stealth mode after 18 months of developing its agentic AI security platform. The post Kenzo Security Raises $4.5 Million for Agentic AI Security Operations Platform appeared first on SecurityWeek.

Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation

With 51% of internet traffic now bot-driven and a growing share of it malicious, organizations must prepare for an era of more evasive, AI-assisted automation. The post Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation ...

Cloud Monitor Gives Burlington School District a Big Cybersecurity and Safety Boost

Early Cloud Monitor adopter uses real-time insights to stop VPN abuse, detect threats, and protect learning As the Technology Director for Burlington School District RE-6J in rural eastern Colorado, Russell Lindenschmidt is responsible for ...

Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare

Countries around the world are preparing for greater digital conflict as increasing global tensions and a looming trade war have raised the stakes. The post Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of ...

Implementing Exposure Management in Legacy Enterprise Environments

The successful implementation of CTEM for Exposure Management in Legacy Enterprise Environments in legacy systems is crucial, as these systems are the hidden backbone of many large enterprises, comprising more... The post Implementing Exposure ...

Industry Moves for the week of April 21, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of April 21, 2025. Stay updated with the latest industry trends and shifts.

Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking

Lantronix’s XPort device is affected by a critical vulnerability that can be used for takeover and disruption, including in the energy sector. The post Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking appeared ...

RSAC 2025 Innovation Sandbox | Command Zero: The Human-Machine Collaboration Engine Redefining Security Investigations

Company Profile Command Zero was founded in 2022 and is headquartered in Austin, Texas, USA[1]. The company was co-founded by three seasoned cybersecurity experts—Dov Yoran, Dean De Beer, and Alfred Huger—who have held senior technical ...

Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification 

Exploring the implementation of a data classification model in order to enable a data-driven approach to managing risk and cost. The post Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification  appeared first ...

FISMA Compliance: A Guide for Enterprises

The Federal Information Security Management Act (FISMA) provides a structured approach to safeguarding government information and assets against security threats. This guide breaks down the key aspects of FISMA compliance,... The post FISMA ...

Security Tools: First, They’re Good, Then They’re Bad

Security tools can also be vulnerable and so cybersecurity teams must put a premium on ensuring tools are used as intended for defense.  The post Security Tools: First, They’re Good, Then They’re Bad appeared first on Security Boulevard.

Enhancing GitHub Issue Management with Sub-Issues Feature

Discover GitHub's new sub-issues feature, enhancing task management by breaking down projects into manageable components. Start organizing today! The post Enhancing GitHub Issue Management with Sub-Issues Feature appeared first on Security Boulevard.

OpenJDK News: Source Compacting, Module Declarations, and More

Discover the latest OpenJDK updates, including new JEPs and features that enhance the Java programming experience. Stay informed and improve your coding skills! The post OpenJDK News: Source Compacting, Module Declarations, and More appeared ...

Product Innovation Begins with a Mindset

At ISHIR, we believe that the foundation of every transformative digital product is not just a brilliant idea, but a mindset — an innovation mindset....Read More The post Product Innovation Begins with a Mindset appeared first on ISHIR | ...

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)

Oracle has released version 8 of its Unbreakable Enterprise Kernel (UEK), a custom Linux kernel built for Oracle Linux. UEK 8 includes updates to memory management, better file system support, faster networking, and improvements for specific ...

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line and checks many types of storage for PII and secrets: passwords, API keys, and personal information. “Unlike most open-source ...