Application Security News and Articles


What innovations are shaping cloud NHI security today?

Is Your Cybersecurity Strategy Adapting to the Latest Innovations in Cloud NHI Security? Cloud security is a paramount concern for every organization employing cloud-based services. It’s no secret that as technology advances, so does the ...

How do I align NHI management with cloud compliance standards?

Is Your Cloud Compliance Strategy Adequately Addressing Non-Human Identities? The need for robust cybersecurity measures for safeguarding valuable data and digital assets has escalated. Incorporating NHI management into your cybersecurity ...

What are the most secure practices for NHI management in the cloud?

Are Non-Human Identities Pivotal in Enhancing Cloud Security? Non-Human Identities (NHIs) have emerged as a vital aspect of modern cybersecurity practices, particularly within cloud computing environments. These machine identities, combined with ...

News alert: SquareX’s “Year of Browser Bugs” project exposes critical cybersecurity blind spots

Palo Alto, Calif., Mar. 18, 2025, CyberNewswire — SquareX, a pioneer in Browser Detection and Response (BDR) space, announced the launch of the “Year of Browser Bugs” (YOBB) project today, a year-long initiative to draw attention to the ...

EPSS is not foolproof: Shift your AppSec beyond vulnerabilities

A new study adds force to the argument that organizations need to look beyond vulnerability remediation when it comes to managing and mitigating software cyber-risk. The post EPSS is not foolproof: Shift your AppSec beyond vulnerabilities ...

HP Launches Printers with Quantum Resilient Cryptography 

Printers can sit in the corner for ten years or more, while quantum decryption is thought by many to be less than 10 years away. The post HP Launches Printers with Quantum Resilient Cryptography  appeared first on SecurityWeek.

AI Is Turbocharging Organized Crime, EU Police Agency Warns

AI and other technologies “are a catalyst for crime, and drive criminal operations’ efficiency by amplifying their speed, reach, and sophistication,” the report said. The post AI Is Turbocharging Organized Crime, EU Police Agency Warns ...

Recon Village – Maltego Community Workshop: OSINT & Custom Transforms

Instructor: Carlos Fragoso Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Breaking Down Risks in Cybersecurity

  Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity – A great conversation on the Cyber Crime Junkies podcast with David Mauro!  We covered so many different topics that the CISOs are struggling with:         ...

What is Infrastructure Intelligence?

Cyber threats are growing in sophistication, and adversaries are continually evolving their methods, targeting businesses, governments, and individuals with precision. For network defenders and fraud prevention teams, understanding this evolving ...

Google’s $32B Wiz Acquisition: A Watershed Moment in Cloud Security M&A

Google acquires cloud security leader Wiz for $32B—the largest cybersecurity deal ever. This historic purchase boosts Google Cloud's security offerings, enhances its multicloud capabilities, and intensifies competition with Microsoft and AWS in ...

Randall Munroe’s XKCD ‘Water Balloons’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Water Balloons’ appeared first on Security Boulevard.

Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover 

A critical vulnerability affecting baseboard management controller (BMC) firmware made by AMI could expose many devices to remote attacks. The post Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover  appeared first on ...

Google Releases Major Update for Open Source Vulnerability Scanner

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers. The post Google Releases Major Update for Open Source Vulnerability Scanner appeared first on SecurityWeek.

The rise of DAST 2.0 in 2025

Static Application Security Testing (SAST) found favor among security teams as an easy way to deploy security testing without really engaging developers. With the ability to analyze source code early in the software delivery lifecycle, SAST ...

How to Stop Expired Secrets from Disrupting Your Operations

5 min readCredential expiration is more than an SSL/TLS certificate problem. The post How to Stop Expired Secrets from Disrupting Your Operations appeared first on Aembit. The post How to Stop Expired Secrets from Disrupting Your Operations ...

DEF CON 32 – Recon Village – The Art Of Pivoting In OSINT Investigations

Instructor: Ram Ganesh Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

CyCognito improves security operations automation and risk visibility

CyCognito announced new capabilities designed to improve both security operations automation and risk visibility. These new features speed security operations by making assets easier to identify and attribute to owners, as well as compare attack ...

Veriti Recognized in Forrester’s 2025 UVM Landscape Report 

We’re excited to announce that Veriti has been recognized in Forrester’s The Unified Vulnerability Management Solutions Landscape, Q1 2025. We believe this recognition highlights our commitment to enabling proactive security through exposure ...

Google Agrees to Acquire Wiz in $30B Deal

Google today revealed it has acquired Wiz, a provider of a cloud-native application protection platform (CNAPP) for $32 billion cash after initially being rebuffed last year. The post Google Agrees to Acquire Wiz in $30B Deal appeared first on ...