Application Security News and Articles


Industry Moves for the week of April 21, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of April 21, 2025. Stay updated with the latest industry trends and shifts.

Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking

Lantronix’s XPort device is affected by a critical vulnerability that can be used for takeover and disruption, including in the energy sector. The post Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking appeared ...

RSAC 2025 Innovation Sandbox | Command Zero: The Human-Machine Collaboration Engine Redefining Security Investigations

Company Profile Command Zero was founded in 2022 and is headquartered in Austin, Texas, USA[1]. The company was co-founded by three seasoned cybersecurity experts—Dov Yoran, Dean De Beer, and Alfred Huger—who have held senior technical ...

Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification 

Exploring the implementation of a data classification model in order to enable a data-driven approach to managing risk and cost. The post Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification  appeared first ...

FISMA Compliance: A Guide for Enterprises

The Federal Information Security Management Act (FISMA) provides a structured approach to safeguarding government information and assets against security threats. This guide breaks down the key aspects of FISMA compliance,... The post FISMA ...

Security Tools: First, They’re Good, Then They’re Bad

Security tools can also be vulnerable and so cybersecurity teams must put a premium on ensuring tools are used as intended for defense.  The post Security Tools: First, They’re Good, Then They’re Bad appeared first on Security Boulevard.

Enhancing GitHub Issue Management with Sub-Issues Feature

Discover GitHub's new sub-issues feature, enhancing task management by breaking down projects into manageable components. Start organizing today! The post Enhancing GitHub Issue Management with Sub-Issues Feature appeared first on Security Boulevard.

OpenJDK News: Source Compacting, Module Declarations, and More

Discover the latest OpenJDK updates, including new JEPs and features that enhance the Java programming experience. Stay informed and improve your coding skills! The post OpenJDK News: Source Compacting, Module Declarations, and More appeared ...

Product Innovation Begins with a Mindset

At ISHIR, we believe that the foundation of every transformative digital product is not just a brilliant idea, but a mindset — an innovation mindset....Read More The post Product Innovation Begins with a Mindset appeared first on ISHIR | ...

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)

Oracle has released version 8 of its Unbreakable Enterprise Kernel (UEK), a custom Linux kernel built for Oracle Linux. UEK 8 includes updates to memory management, better file system support, faster networking, and improvements for specific ...

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line and checks many types of storage for PII and secrets: passwords, API keys, and personal information. “Unlike most open-source ...

Cybercriminals blend AI and social engineering to bypass detection

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense. Researchers analyzed thousands of alerts, mapping them ...

Cyber threats now a daily reality for one in three businesses

Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory hurdles and operational inefficiencies, according to research from FIS and Oxford Economics. The cost of disharmony is highest ...

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities

Welcome to part three of our series with PlexTrac where we address data overload in vulnerability remediation. Join us as we preview the latest PlexTrac capabilities, including new ways to centralize asset and findings data, smarter workflow ...

Why CISOs are watching the GenAI supply chain shift closely

In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders remain uneasy about what that means for data protection, legacy tech, and trust in automation. The ...

Protected NHIs: Key to Cyber Resilience

Why is Management of Protected NHIs Essential? Protected Non-Human Identities (NHIs) have become a crucial factor for organizations looking to strengthen their cybersecurity framework. Given the surge in hacking attempts and data breaches, it is ...

Ensuring a Safe Environment with Least Privilege

Why Is Least Privilege Fundamental to Creating Safe Environments? Data is the new gold. If data volumes surge, so do cyber threats, making data protection a top priority. The principle of least privilege (POLP) crucially comes to play here. But ...

BSidesLV24 – Common Ground – Free Your Mind: Battling Our Biases

Author/Presenter: dade Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the ...

AI-Powered Cybersecurity Content Strategy: Dominating B2B Search Rankings in 2025

AI has revolutionized search engine understanding of cybersecurity content. Industry leaders dominate rankings with expertise-driven content clusters, proprietary threat research, and technical depth that AI recognizes as authoritative. Discover ...

Week in review: LLM package hallucinations harm supply chains, Nagios Log Server flaws fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple plugs zero-day holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201) Apple has released emergency security updates for ...