Application Security News and Articles


Mozilla’s Data Practices and Privacy Evolution: Recent Developments

Dive into Mozilla's controversial 2025 privacy changes, including removed 'no data sale' guarantees and Git repository security upgrades. Understand the balance between legal compliance, AI integration, and user trust in Firefox's evolving ...

SLED Cybersecurity Threats in 2025: What You Need to Know to Stay Ahead

While digital transformations have given state, local, and education (SLED) organizations unprecedented operational flexibility, threat actors are looking to exploit their new vulnerabilities. A virtual frontline has formed, and cybersecurity ...

CMMC vs FedRAMP: Do They Share Reciprocity?

Throughout this blog, we often write about both FedRAMP and CMMC as cybersecurity frameworks applied to the federal government and its contractors. These frameworks share a lot of the same DNA stemming from the same resources, and they share the ...

DMARC Adoption among Europe’s Higher Education Sector

This installment of DMARC adoption initiates a series on DMARC adoption, focusing on policy levels and best practices, in the higher education sector. We'll begin with Europe. The post DMARC Adoption among Europe’s Higher Education Sector ...

How to Prove to Auditors that You’ve Remediated CVEs in Kubernetes

Today, the cybersecurity landscape is changing quickly with the increase of AI capabilities used by attackers and defenders alike. In this environment, effectively managing and remediating Common Vulnerabilities and Exposures (CVEs) remains ...

Cisco Infuses Security into Networking with New Nexus Smart Switch and Hypershield Integration

At Cisco Live EMEA 2025 in Amsterdam this month, Cisco unveiled the Nexus Smart Switch and Hypershield integration, a two-in-one solution that it says addresses the mounting security management pains amid sweeping artificial intelligence (AI) ...

When Chaos Meets Its Match: With Swimlane You’re Always in Control

The post When Chaos Meets Its Match: With Swimlane You’re Always in Control appeared first on AI Security Automation. The post When Chaos Meets Its Match: With Swimlane You’re Always in Control appeared first on Security Boulevard.

Guide to Website Security & Compliance for Enterprises with AlphaPrivacy AI

The post Guide to Website Security & Compliance for Enterprises with AlphaPrivacy AI appeared first on Feroot Security. The post Guide to Website Security & Compliance for Enterprises with AlphaPrivacy AI appeared first on Security Boulevard.

Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto

Dumb Design + Crud Code = Privacy Panic: It’s been SEVEN MONTHS, but Tim’s crew is yet to fix the bugs. The post Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto appeared first on Security Boulevard.

Single Sign-On (SSO) Differentiation Between Human and Autonomous Non-Human Identities

This in-depth research investigates Single Sign-On (SSO) and its application to both human users and non-human identities. Learn about the necessary differentiations for robust security and effective access management in diverse digital ...

When DoD SAFE is Down: Secure File Sharing Options for Defense Contractors

With the recent passage of the CMMC Final Rule, many defense contractors have been reminded of the requirement to ensure the secure exchange of their files containing Controlled Unclassified Information (CUI). One popular solution used by the ...

DEF CON 32 – Top 10 Cybersecurity Trends In Critical Infrastructure For 2024

Author/Presenter: Mars Cheng Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

OT/ICS cyber threats escalate as geopolitical conflicts intensify

Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming ...

Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data

The Director of National Intelligence said such a demand would violate Americans’ rights and raise concerns about a foreign government pressuring a U.S.-based technology company. The post Gabbard Decries Britain’s Reported Demand for Apple to ...

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)

Users of the MITRE Caldera cyber security platform have been urged to plug a critical hole (CVE-2025–27364) that may allow unauthenticated attackers to achieve remote code execution. About MITRE Caldera MITRE Caldera is a platform built on the ...

API Armor: How Bybit’s Real-Time Blacklisting Is Thwarting a $1.5B Crypto Heist

APIs present a security risk—that much is a given. Attacks on APIs have caused some of the most significant security incidents of the past decades. But the question now is: How can we flip the script and leverage their power to enhance ...

Senator Susan Collins’ Betrayal of Maine Demands Accountability

I sent this as an op-ed to the Portland Press Herald but have no delusion they will ACK it or post even a small part of it. As a longtime Mainer and independent voter, I have watched Senator Susan Collins’ career with cautious optimism, hoping ...

How to Avoid Costly Technical Debt and Get Your Software Project Back on Track

Software projects don’t always go as planned. Deadlines slip, budgets overrun, and technical challenges mount. What starts as a minor issue can quickly snowball into...Read More The post How to Avoid Costly Technical Debt and Get Your Software ...

In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story

Noteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack. The post In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story ...

OSPS Baseline: Practical security best practices for open source software projects

The Open Source Security Foundation (OpenSSF), a cross-industry initiative by the Linux Foundation, has announced the initial release of the Open Source Project Security Baseline (OSPS Baseline), a tiered framework of security practices that ...