Application Security News and Articles


The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t stop phishing or credential stuffing. ...

Browser extensions make nearly every employee a potential attack vector

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according to LayerX. Most extensions have access to sensitive data 99% of enterprise users have at least one ...

MITRE CVE Program Funding Set To Expire

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be ...

Introducing Wyo Support – ADAMnetworks LTP

ADAMnetworks is excited to announce Wyo Support to the family of Licensed Technology Partners. “After working with the various systems and technologies, there are few that compare with the protection that ADAMnetworks provides. It reduces ...

How Safe Are Your Non-Human Identities?

Are Your Non-Human Identities Secure? Where interactions between software, applications, and API components are crucial for seamless processes, Non-Human Identifies (NHIs) and their security cannot be overlooked. NHIs are machine identities that ...

How to Feel Reassured with Cloud Data Security

Why is Cloud Data Security vital for Modern Businesses? Cloud data security has grown to be an inherent part of businesses across various industries today, ranging from financial services and healthcare to travel and DevOps. But, amidst this ...

MITRE Warns CVE Program Faces Disruption Amid US Funding Uncertainty

MITRE warns of a deterioration of national vulnerability databases and advisories, slowed vendor reaction and limited response operations. The post MITRE Warns CVE Program Faces Disruption Amid US Funding Uncertainty appeared first on SecurityWeek.

Virtue AI Attracts $30M Investment to Address Critical AI Deployment Risks

San Francisco startup banks $30 million in Seed and Series A funding led by Lightspeed Venture Partners and Walden Catalyst Ventures. The post Virtue AI Attracts $30M Investment to Address Critical AI Deployment Risks appeared first on SecurityWeek.

BSidesLV24 – Breaking Ground – Insights On Using A Cloud Telescope To Observe Internet-Wide Botnet Propagation Activity

Author/Presenter: Fabricio Bortoluzzi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

The Hidden Risks in AI Training Data—And How to Eliminate Them

The post The Hidden Risks in AI Training Data—And How to Eliminate Them appeared first on Votiro. The post The Hidden Risks in AI Training Data—And How to Eliminate Them appeared first on Security Boulevard.

ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance

The recent ransomware breach tied to ICICI Bank—claimed by the LockBit group—has raised fresh concerns about the fragility of digital ecosystems and third-party risk. While official confirmations remain limited, leaked files and dark web ...

The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime

The cryptocurrency sector has always been a magnet for cybercriminals, but the TraderTraitor campaign marks a different kind of threat—one backed by state-sponsored actors with long-term goals and surgical precision. Allegedly linked to North ...

The Smishing Triad Surge: Text-Based Threats Are Getting Smarter, Not Simpler

What began as a trickle of spammy messages has evolved into a sophisticated and dangerous phishing campaign. The Smishing Triad, an active cybercriminal group, is behind a surge of SMS-based phishing attacks (smishing) targeting organizations ...

The Salt Typhoon Telecom Breach: When Network Access Becomes National Exposure

The recent Salt Typhoon breach targeting telecom infrastructure isn’t just another headline—it’s a warning shot to every service provider that uptime and connectivity aren’t enough. This sophisticated campaign, attributed to Chinese ...

Randall Munroe’s XKCD ‘Push Notifications’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Push Notifications’ appeared first on Security Boulevard.

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Lemonade says the incident is not material and that its operations were not compromised, nor was its customer data targeted. The post Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers appeared first on SecurityWeek.

15 Timeless Truths of SaaS Business in the Age of AI

The world is changing fast — AI is reshaping what’s possible in software. Tools are evolving, business models are shifting, and the speed of iteration...Read More The post 15 Timeless Truths of SaaS Business in the Age of AI appeared first on ...

Public Support Emerges for Chris Krebs, SentinelOne After Trump Memo

The cybersecurity industry has been conspicuously quiet after President Trump targeted ex-CISA director Chris Krebs and SentinelOne for retribution. However, some voices have risen above the silence to urge support and the need for public ...

MISRA C++:2023 Compliance for Auto Safety and Reliability

MISRA coding guidelines are a standard for automotive and other safety critical systems. SonarQube helps C++ developers deliver MISRA C++:2023 compliant apps with MISRA Compliance Early Access available in SonarQube Server Enterprise and Data ...

BSidesLV24 – Breaking Ground – Introducing Serberus – A Multi Headed Serial Hardware Hacking Tool

Author/Presenter: Patrick Kiley Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...