Application Security News and Articles


BSidesLV24 – IATC – Health Care Is In Intensive Care

Author/Presenter: Christian Dameff Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

The Password Hygiene Failure That Cost a Job | Grip Security

Actions from a real-life breach raises questions about poor password hygiene accountability and why users, policies, and security controls must work together. The post The Password Hygiene Failure That Cost a Job | Grip Security appeared first on ...

GitGuardian’s Secrets Risk Assessment: Know Your True Exposure For Free

Go beyond GitHub's scope. Understand the full picture of your secret leaks with GitGuardian, covering public and internal exposures. The post GitGuardian’s Secrets Risk Assessment: Know Your True Exposure For Free appeared first on Security ...

Two-Factor Authentication (2FA) vs. Multi-Factor Authentication (MFA)

How authentication works, the difference between 2FA and MFA, and the various types of secondary authentication factors. The post Two-Factor Authentication (2FA) vs. Multi-Factor Authentication (MFA) appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Lungfish’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Lungfish’ appeared first on Security Boulevard.

Ingress-nginx vulnerabilities can lead to Kubernetes cluster takeover

Wiz researchers have unearthed several critical vulnerabilities affecting Ingress NGINX Controller for Kubernetes (ingress-nginx) that may allow attackers to take over Kubernetes clusters. “Based on our analysis, about 43% of cloud ...

Introducing Agentic Risk Scoring | Impart Security

Reimagining Risk Scoring: A Breakthrough in Security Risk Management For years, AppSec and product security teams have been locked in endless debates about the most effective security frameworks and risk scoring methodologies. From CVSS and MITRE ...

ColorTokens’ Gold Rush at Globee Awards

Call it unstoppable momentum or call it yet another powerful validation of our breach-readiness approach. We’re riding high into RSA 2025 with triple Gold medals, and one Silver medal from the Globee Cybersecurity Awards. Claiming top honors ...

The Unseen Battle: How Bots and Automation Threaten the Web 

New research from F5 Labs examined over 200 billion web and API traffic requests from businesses with bot controls in place. The post The Unseen Battle: How Bots and Automation Threaten the Web  appeared first on Security Boulevard.

Review: The Developer’s Playbook for Large Language Model Security

With the adoption of large language models (LLMs) across industries, security teams often play catch-up. Many organizations are integrating GenAI into customer interactions, software development, and enterprise decision-making, often without ...

Microsoft’s new AI agents take on phishing, patching, alert fatigue

Microsoft is rolling out a new generation of AI agents in Security Copilot, built to help with some of the most time-consuming security challenges, such as phishing, data protection, and identity management. Phishing is still one of the most ...

Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection

Alisa Viejo, United States, 25th March 2025, CyberNewsWire The post Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection appeared first on Security Boulevard.

Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots

DrayTek routers around the world are rebooting and the vendor’s statement suggests that it may involve the exploitation of a vulnerability. The post Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots appeared first on ...

VMware Patches Authentication Bypass Flaw in Windows Tools Suite

The authentication bypass vulnerability, tagged as CVE-2025-22230, carries a CVSS severity score of 7.8/10. The post VMware Patches Authentication Bypass Flaw in Windows Tools Suite appeared first on SecurityWeek.

BSidesLV24 – IATC – Blood in the Water: Preparing For the Feeding Frenzy

Author/Presenter: Dean Ford Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via ...

Microsoft Adds AI Agents to Security Copilot

Microsoft has expanded the capabilities of Security Copilot with AI agents tackling data security, phishing, and identity management. The post Microsoft Adds AI Agents to Security Copilot appeared first on SecurityWeek.

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses

By now, it’s no secret—cyber threats are on the rise, and the need for strong cybersecurity is greater than ever. Globally small and medium-sized businesses (SMBs) are prime targets for cyberattacks, yet many can’t afford a full-time Chief ...

Riskonnect boosts healthcare risk management with AI-based features

Riskonnect announces new AI-based features in its Healthcare Risk & Patient Safety solution. The new AI capabilities, which are the latest innovations in the provider’s Intelligent Risk features, enable healthcare organizations to make ...

SailPoint Harbor Pilot automates identity security tasks

SailPoint announced SailPoint Harbor Pilot, a set of AI agents designed to help identity teams work smarter, respond faster and secure their organizations more efficiently. Harbor Pilot automates identity security tasks, simplifies workflow ...

Getting the Most Value Out of the OSCP: The PEN-200 Labs

How to leverage the PEN-200 simulated black-box penetration testing scenarios for maximal self-improvement and career success. Disclaimer: All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance ...