Application Security News and Articles


From fake CAPTCHAs to RATs: Inside 2025’s cyber deception threat trends

Cybercriminals are getting better at lying. That’s the takeaway from a new LevelBlue report, which outlines how attackers are using social engineering and legitimate tools to quietly move through environments before they’re caught. Data ...

Decoding OTP A Deep Dive into HOTP and TOTP Algorithms

Explore OTP generation algorithms like HOTP and TOTP. Understand their differences, security, and implementation for robust authentication in CIAM and passwordless systems. The post Decoding OTP A Deep Dive into HOTP and TOTP Algorithms appeared ...

Fraud controls don’t guarantee consumer trust

Over a third of companies say they are using AI, including generative AI, to fight fraud, according to Experian. As fraud threats become more complex, companies are accelerating their investments with over half adopting new analytics and building ...

New infosec products of the week: August 8, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Descope, Elastic, ExtraHop, LastPass, and Riverbed. Elastic AI SOC Engine helps SOC teams expose hidden threats Elastic AI SOC Engine (EASE) ...

CMMC Final Rule: Clear Steps for DoD Contractors

Key Takeaways Understanding the CMMC Final Rule: Why It Matters Now For years, the Cybersecurity Maturity Model Certification (CMMC) has been discussed as a future requirement for defense contractors. But until recently, it served as a framework ...

Reveal Security Unveils Preemptive Approach to Securing Applications and Cloud Services

Reveal Security this week unfurled a platform designed to enable cybersecurity teams to preemptively manage access to multiple applications and cloud infrastructure resources both before and after end users have logged in. Company CEO Kevin Hanes ...

How to Build an Incident Response Playbook in 9 Steps 

The post How to Build an Incident Response Playbook in 9 Steps  appeared first on AI Security Automation. The post How to Build an Incident Response Playbook in 9 Steps  appeared first on Security Boulevard.

Data Center Security

In an era where data is the lifeblood of every enterprise, safeguarding the core of your digital operations—the data center—is absolutely non-negotiable. With cyber threats evolving, regulations tightening, and infrastructure growing more ...

Inside Kasada: An Intern’s Dive into Bots, Data, and Company Culture

Meet Max and Kasey, two interns at Kasada who tackled real-world challenges from two very different angles—machine learning and sales operations—and came away with sharper skills, meaningful impact, and a clear sense of where they’re headed ...

Cloud Network Security

Cloud Network Security refers to the set of policies, technologies, tools, and best practices designed to protect data, applications, and systems that are hosted in the cloud from unauthorized access, cyberattacks, and data breaches. As ...

Survey: Many Organizations Hit by Ransomware Fall Victim Multiple Times

A global survey of 2,000 senior security decision-makers in organizations with between 50 and 2,000 employees finds well over a third (38%) of those who were impacted by a data breach caused by a ransomware attack were victimized multiple times ...

BSidesSF 2025: Effective Handling of Third-Party Supplier Incidents

Creator/Author/Presenter: Kasturi Puramwar Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held ...

SAST vs. DAST: Decoding the Two Pillars of Application Security

In the world of software development, speed is king. But shipping code fast without shipping it securely is like building a…Continue reading on Medium »

What GPT‑5 means for IT teams, devs, and the future of AI at work

OpenAI has released GPT‑5, the newest version of its large language model. It’s now available to developers and ChatGPT users, and it brings some real changes to how AI can be used in business and IT environments. GPT‑5 (with thinking) ...

SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

SonicWall has been investigating reports about a zero-day potentially being exploited in ransomware attacks, but found no evidence of a new vulnerability.  The post SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability ...

Google Breached — What We Know, What They’re Saying

GOOG CRM PII AWOL: ‘ShinyHunters’ group hacked big-G and stole a load of customer data from a Salesforce cloud instance. The post Google Breached — What We Know, What They’re Saying appeared first on Security Boulevard.

AI Personas, Deepfakes, and the Collapse of Trust (Part 2)

This is my second in a three-part series unpacking OpenAI’s June 2025 threat intelligence report and what it signals for enterprise communication security. The post AI Personas, Deepfakes, and the Collapse of Trust (Part 2) appeared first on ...

VMware Cracks the Code: VCF 9.0 Delivers Enterprise Security Without Operational Sacrifice

The enterprise infrastructure landscape is about to experience a fundamental shift. VMware Cloud Foundation (VCF) 9.0 isn’t just another incremental update, it’s a fundamental reimagining of how organizations approach infrastructure ...

Protecting your web applications against the OWASP Top 10 

Web application security is a critical concern for businesses of all sizes. As more companies rely on web applications to manage their operations, store sensitive data and interact with customers, their associated risks continue to grow. The Open ...

BSidesSF 2025: Is Vulnerability Management Dead? A Security Architect’s Survival Guide

Creator/Author/Presenter: Snir Ben Shimol Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held ...