Application Security News and Articles


Two things you need in place to successfully adopt AI

Organizations should not shy away from taking advantage of AI tools, but they need to find the right balance between maximizing efficiency and mitigating organizational risk. They need to put in place: 1. A seamless AI security policy AI may have ...

Exegol: Open-source hacking environment

Exegol is a community-driven hacking environment, which helps users deploy hacking setups quickly and securely. It’s made for penetration testers, CTF players, bug bounty hunters, researchers, defenders, and both new and experienced users. ...

Only 2-5% of application security alerts require immediate action

The large volume of security alerts, many created by automated tools, is overwhelming security and development teams, according to the 2025 Application Security Benchmark report by Ox Security. The report is based on an analysis of over 101 ...

GenAI turning employees into unintentional insider threats

The amount of data being shared by businesses with GenAI apps has exploded, increasing 30x in one year, according to Netskope. The average organization now shares more than 7.7GB of data with AI tools per month, a massive jump from just 250MB a ...

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy

In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, ...

How to recognize and prevent deepfake scams

Deepfakes are a type of synthetic media created using AI and machine learning. In simple terms, they produce videos, images, audio, or text that look and sound real, even though the events depicted never actually happened. These altered clips ...

UK Cybersecurity Weekly News Roundup – 31 March 2025

UK Cybersecurity Weekly News Roundup - 31 March 2025 Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. UK Warned of Inadequate Readiness Against ...

BSidesLV24 – IATC – Introduction To I Am The Cavalry – Day Two – Preparing for 2027

Authors/Presenters: David Batz, Josh Corman Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

Inside Daisy Cloud: 30K Stolen Credentials Exposed 

Veriti research recently analyzed stolen data that was published in a telegram group named “Daisy Cloud” (potentially associated with the RedLine Stealer), exposing the inner workings of a cybercrime marketplace. This group offers thousands ...

Week in review: Chrome sandbox escape 0-day fixed, Microsoft adds new AI agents to Security Copilot

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft’s new AI agents take on phishing, patching, alert fatigue Microsoft is rolling out a new generation of AI agents in Security ...

From checkbox to confidence: Why passing the audit isn’t the endgame

“We passed the audit. No idea how, but we passed.” If that sentence sounds familiar – or worse, relatable – it’s time for a serious look in the mirror. Every year, companies across industries breathe a collective sigh of relief when the ...

Genetic Breach Fallout: 23andMe’s Collapse Raises Security Alarms 

In 2023, a massive data breach at 23andMe shook the foundation of the consumer genomics industry. Fast forward to today, the company has filed for bankruptcy. From Veriti’s perspective, this incident highlights the devastating consequences of ...

What are the cost implications of maintaining NHI compliance?

Does Non-Human Identities Compliance Come with a Hefty Price Tag? Foremost among these challenges is securing a cloud environment from potential threats. One of the most significant components of this effort is the effective management of ...

What best practices ensure long-term compliance for NHIs?

What Are the Essential Considerations for Long-Term Compliance of Non-Human Identities? The importance of Non-Human Identities (NHIs) in cybersecurity cannot be overstated. But how do organizations ensure the long-term compliance of these NHIs? ...

How can technology simplify the process of NHI compliance?

How is Technology Revolutionizing Non-Human Identities (NHI) Compliance? How can the integration of advanced technology streamline the process of NHI compliance? A robust cybersecurity strategy is indispensable, especially regarding the ...

BSidesLV24 – IATC – Time Is Up. You Have Three Years, 3 Months, 3 Weeks, To Protect Your Stuff. What Do You Do?

Author/Presenter: Josh Corman, Aanne Isam Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

Babuk Locker 2.0 vs Seceon Platform: MITRE ATT&CK Mapping and Early-Stage Detection & Remediation

Overview of Babuk Locker 2.0 Babuk Locker 2.0 is a ransomware strain that employs double extortion, where attackers encrypt victim files and exfiltrate sensitive data for ransom. It targets organizations by exploiting RDP vulnerabilities, ...

News alert: SquareX discloses nasty browser-native ransomware that’s undetectable by antivirus

Palo Alto, Calif., Mar 28, 2025, CyberNewswire — From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates that corporations spend nearly $1 billion dollars on ...

Executive Perspectives: Pierre Noel on Cybersecurity Leadership, Risk, and Resilience

In this edition of Axio’s Executive Insight Series, Scott Kannry, CEO of Axio, sits down with Pierre Noel, former CISO of Microsoft Asia and Huawei, to discuss the evolution of Read More The post Executive Perspectives: Pierre Noel on ...

PCI DSS 4.0: Achieve Compliance with Feroot Before March 31

The post PCI DSS 4.0: Achieve Compliance with Feroot Before March 31 appeared first on Feroot Security. The post PCI DSS 4.0: Achieve Compliance with Feroot Before March 31 appeared first on Security Boulevard.