Application Security News and Articles


The Future of Auditing: What to Look for in 2025

The 2025 audit landscape is shaped by new regulations and changes in enforcement of existing regulations. In the United States, both changes to longstanding administrative law and the Public Company Accounting Oversight Board (PCAOB) will shape ...

26 New Threat Groups Spotted in 2024: CrowdStrike

CrowdStrike has published its 2025 Global
Threat Report, which warns of faster breakout time and an increase in Chinese activity.  The post 26 New Threat Groups Spotted in 2024: CrowdStrike appeared first on SecurityWeek.

Executive Perspectives, Episode 5, Meagan Fitzsimmons

In the latest episode of Axio’s Executive Insight Series, CEO Scott Kannry spoke with Meagan Fitzsimmons, Chief Compliance and ESG Officer of a Fortune 500 logistics company. Their conversation offered Read More The post Executive Perspectives, ...

“Emergent Misalignment” in LLMs

Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“: Abstract: We present a surprising result regarding LLMs and alignment. In our experiment, a model is finetuned to output insecure code ...

How to build a strong business case for replacing legacy DAST with a modern solution —a practical guide

Learn how to build a strong business case for replacing legacy DAST with a modern solution. This step-by-step guide helps AppSec leaders. The post How to build a strong business case for replacing legacy DAST with a modern solution —a practical ...

Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #327 – Including QA Tasks At Sprint Planning

via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink The post Comic Agilé – Luxshan ...

What is a Cloud HSM? Understanding Cloud Hardware Security Module (HSM) Advantages Compared with On-Premises HSMs

Protecting cryptographic keys is a core security necessity. Hardware Security Modules (HSMs) are specialized, tamper-resistant devices that secure cryptographic processes. They generate, protect, and manage keys used for encrypting and decrypting ...

Hacker Behind Over 90 Data Leaks Arrested in Thailand

A Singaporean man accused of being a hacker responsible for over 90 data leaks has been arrested in Thailand.  The post Hacker Behind Over 90 Data Leaks Arrested in Thailand appeared first on SecurityWeek.

Prevent Lockouts & Security Gaps with HYPR Policy Simulation

Authentication policies in Identity and Access Management (IAM) are the bedrock of modern enterprise security. They control who accesses what, safeguarding your organization's crown jewels — its data and systems. But deploying new (or even ...

Survey: Nearly Half of Data Breaches Involved Third-Party Remote Access

A survey of 1,942 IT and IT security practitioners finds nearly half (47%) work for organizations that have experienced a data breach or cyberattack in the past 12 months that involved a third-party that has access to their network. The post ...

Turning 56 Billion Attacks into a Proactive Defense Strategy: A CISO’s Guide to HYAS Insight

In today’s rapidly evolving threat landscape, the sheer volume of malicious activity can be overwhelming. One client recently shared with me a startling statistic: on average, they observed 56 billion unique attacks every quarter.  Yes, that ...

DEF CON 32 – Fool Us Once, Fool Us Twice: Hacking Norwegian Banks

Author/Presenter: Per Thorsheim Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Mounting Threats to Cyber-Physical Systems

Over the past few years, cyber adversaries have increasingly set their sights on systems that bridge digital and physical operations. These targets include vital infrastructure in sectors such as oil, gas, and water, where breaches can have ...

For Unbiased Evaluation, Take on Real-World Security Testing

For organizations that are evaluating security controls, independent testing offers an unvarnished assessment of integrity and performance, of effectiveness. The post For Unbiased Evaluation, Take on Real-World Security Testing appeared first on ...

Reducing Third-Party Risk: How Enterprises Can Secure Payment and Vendor Data

Supply chain risk is worrying regulators everywhere. That’s why it’s a critical part of both the new EU Digital Operational Resilience Act (DORA) and NIS 2. It’s also a growing concern for the Payment Card Industry Secure Standards Council ...

Information Security Architecture: 4 Key Elements to Review Today

Business information is seemingly at a constant state of risk. The steady increase in cyberattacks worldwide proves just how vulnerable many organizations are. In the wake of security events, there’s no shortage of reactive measures—people ...

A Comprehensive Look at OSINT

Leveraging Publicly Available Data for Better Security  Open Source Intelligence (OSINT) is a term you’ve likely encountered in conversations about cybersecurity, intelligence gathering, and investigative journalism. As our personal and ...

Grok 3 vs. DeepSeek vs. ChatGPT: The Best AI Model for Developers and Businesses

Just like in a Formula 1 race, the world’s fastest AI models—Grok 3, DeepSeek, and ChatGPT—are pushing the limits, each vying for dominance. Who possesses...Read More The post Grok 3 vs. DeepSeek vs. ChatGPT: The Best AI Model for ...

Overview of anti-detect browsers

This is the first article of a series about anti-detect browsers. In this article, we provide an overview of anti-detect browsers and their main features. We also present the most common fraudulent use cases of these browsers. In the next ...

Stopping CovertCatch – Securing Against Weaponized Job Offers

The post Stopping CovertCatch – Securing Against Weaponized Job Offers appeared first on Votiro. The post Stopping CovertCatch – Securing Against Weaponized Job Offers appeared first on Security Boulevard.