Application Security News and Articles


Cybersecurity jobs available right now: April 1, 2025

Cloud Security Engineer Fexco | Ireland | Hybrid – View job details As a Cloud Security Engineer, you will design and implement security frameworks for cloud environments. Enforce secure access policies, MFA, and least privilege ...

Top Passwordless Identity Assurance Trends for 2025

“The Renaissance Man” was attributed to Leonardo da Vinci because he symbolized the focus of the Renaissance era: boundless human potential. The 2025 State of Passwordless Identity Assurance Report revolves around the Identity Renaissance: ...

Does Your Cybersecurity Solution Deliver Value?

Is Your Cybersecurity Strategy Delivering Value? One pivotal question hovers in every professional’s mind: ‘Is my cybersecurity strategy delivering value?’ The answer lies deep within the nuances of Non-Human Identities (NHIs) and Secrets ...

Adaptable Strategies for NHI Lifecycle Management?

Why Are Adaptable NHI Strategies Essential in Today’s Cybersecurity Landscape? Where cyber threats are increasingly complex and pervasive, businesses need robust and flexible strategies to safeguard their data assets. One such strategy is the ...

How Secure Are Your NHIs Across the Cloud?

Are Your Machine Identities Trapped in a Security Blindspot? A critical question persists: How secure are your Non-Human Identities (NHIs) across the cloud? While businesses invest heavily in human-centric cybersecurity solutions, they often ...

Excited About New Trends in Secrets Security?

Are You Ready to Embrace the Latest Secrets Security Trends? Isn’t it fascinating to consider how cybersecurity has evolved over the past few years? It’s become essential to focus on securing machine identities and secrets. This is where ...

Is Your Secrets Vault Truly Impenetrable?

Is Your Secrets Vault Really Equipped for the Task? Non-Human Identities (NHIs) and their secrets management have become the cornerstone of an effective cybersecurity strategy. The question is, is your secrets vault truly impenetrable? Or are ...

BSidesLV24 – Keynotes – Day One: Opening Remarks

Authors/Presenters: Daemon Tamer Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Gen Z’s Rising Susceptibility to Social Engineering Attacks

Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation. The post Gen Z’s Rising Susceptibility to Social Engineering Attacks ...

Randall Munroe’s XKCD ‘Cosmic Distance Calibration’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Cosmic Distance Calibration’ appeared first on Security Boulevard.

Privacy Roundup: Week 13 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 23 MAR 2025 - 29 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due ...

Online Scams in the Age of AI

The question is no longer whether AI-driven scams will target your business, but how prepared you are to counter them. The post Online Scams in the Age of AI appeared first on Security Boulevard.

Analyzing New HijackLoader Evasion Tactics

IntroductionHijackLoader (also known as IDAT Loader and GHOSTPULSE) is a malware loader initially discovered in 2023. The loader is not only capable of delivering second-stage payloads, but also offers a variety of modules to expand the ...

Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory

Sucuri has discovered multiple malware families deployed in the WordPress mu-plugins directory to evade routine security checks. The post Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory appeared first on SecurityWeek.

Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program

A strong security program will sometimes require substantial organizational and cultural changes around security practices, and inevitably, a higher cost. The post Zero to Hero – A “Measured” Approach to Building a World-Class ...

The Hidden Breach: Secrets Leaked Outside the Codebase Pose a Serious Threat

Secrets aren't just in code. GitGuardian’s 2025 report shows major leaks in collaboration tools like Slack, Jira, and Confluence. Here’s what security teams need to know. The post The Hidden Breach: Secrets Leaked Outside the Codebase Pose a ...

CISA reveals new malware variant used on compromised Ivanti Connect Secure devices

CISA has released indicators of compromise, detection signatures, and updated mitigation advice for rooting out a newly identified malware variant used by the attackers who breached Ivanti Connect Secure VPN appliances in December 2024 by ...

Cybersecurity Leaders Share Three Challenges Exposure Management Helps Them Solve

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this blog, we share three challenges cybersecurity leaders say exposure ...

Hacker Leaks Samsung Customer Data

Hacker leaks 270,000 customer tickets allegedly stolen from Samsung Germany using long-compromised credentials. The post Hacker Leaks Samsung Customer Data appeared first on SecurityWeek.

EU invests €1.3 billion in AI and cybersecurity

The European Commission has approved the 2025-2027 Digital Europe Programme (DIGITAL) work program, allocating €1.3 billion to advance key technologies essential for the EU’s future and technological sovereignty. DIGITAL is an EU funding ...