Application Security News and Articles


2025 CrowdStrike Global Threat Report: Cybercriminals Are Shifting Tactics – Are You Ready?

CrowdStrike (Nasdaq: CRWD) today announced the findings of the 2025 CrowdStrike Global Threat Report, revealing a dramatic shift in cyber adversary tactics, with attackers leveraging stolen identity credentials, AI-generated social engineering, ...

Common Examples of HIPAA Violations: Understanding Compliance Challenges

Achieving HIPAA compliance requires significant dedication and meticulous attention to detail. After all, safeguarding Protected Health Information (PHI) is non-negotiable.  Even with extensive resources and a dedicated compliance team, ...

Accelerate Your Security Operations with Fusion’s MITRE ATT&CK Events View

The Netography Fusion platform maps detections from over 300 detection models to the MITRE ATT&CK framework, accelerating your response workflows to malicious activity. The post Accelerate Your Security Operations with Fusion’s MITRE ...

Is Agentic AI too smart for your own good?

Agentic AI, which consists of systems that autonomously take action based on high-level goals, is becoming integral to enterprise security, threat intelligence, and automation. While these systems present significant potential, they also ...

Hook, Line, & Tax Sink: Dodging the Phishing Nets This Tax Season

Tax season has officially arrived, and with it comes an increased need for vigilance when handling emails or documents related to personal tax information. During this time of year, cybercriminals are particularly active, finding new ways to ...

Hottest cybersecurity open-source tools of the month: February 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Kunai: Open-source threat hunting tool for Linux Kunai is an open-source tool that ...

Cybersecurity jobs available right now in Europe: February 27, 2025

The post Cybersecurity jobs available right now in Europe: February 27, 2025 appeared first on Help Net Security.

Debunking 5 myths about network automation

Imagine you’re a network engineer at an enterprise. You already have your hands full with IT priorities, including managing bandwidth related to working from home, the company’s new data center, and, more recently, computing needs to support ...

How cloud sync and other SaaS dark patterns can put your organization at risk

While SaaS features and discounts offer many conveniences, some of the industry's darker patterns can put your organization at risk. The post How cloud sync and other SaaS dark patterns can put your organization at risk appeared first on Security ...

Budget Approved: 13 Cybersecurity KPIs That CISOs Can Present to the Board

When reporting to the board, a CISO must translate risk into identifiable terms to present key findings and ensure that all cybersecurity initiatives are aligned with business objectives.  Cyber risk mitigation expenditures help translate risk ...

Relieved by Advanced Secrets Security?

Why is Advanced Secrets Security Essential in Today’s Cloud-Based Ecosystem? Could advanced secrets security be the key to mitigating these risks and ensuring robust data protection? Understanding Non-Human Identities (NHIs) and Their Role in ...

Proactive Measures in Your NHIDR Plans?

Why is Proactive NHIDR Critical in Security Planning? It’s no longer sufficient to be reactive; the key lies in being proactive, particularly when it comes to Non-Human Identity and Detection Response (NHIDR) plans. With the growing complexity ...

Reassured by Your IAM Processes?

Is Your IAM Process Providing the Security Your Organization Needs? It has become increasingly essential for businesses to rethink and reimagine their Identity and Access Management (IAM) processes. The question arises, is your IAM strategy ...

How to Ensure Workplace Safety for Employees Experiencing Stalking

Learn your role in protecting employees against stalking threats and how to strengthen your workplace violence prevention strategy accordingly An employee is being stalked by someone, either known or unknown to them. Although most of the stalking ...

5 Questions On OPSEC Fundamentals

Surveillance is everywhere and ingrained in our society. While privacy is a human right, we live in an era of Operational Security (OPSEC) and privacy fatigue. The technologies we use everyday collect more and more information, making many people ...

DEF CON 32 – From Theory To Reality Demonstrating The Simplicity Of SPARTA Techniques

Author/Presenter: Randi Tinney Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Hiding in Plain Sight: The Hidden Dangers of Geolocation in Cloud Security

One of the biggest challenges organizations face today is detecting malicious activity in cloud environments. As highlighted in MixMode’s latest Threat Research Report, cybercriminals are increasingly leveraging trusted cloud providers like ...

Emulating the Deceptive Akira Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by Akira ransomware since its emergence in March 2023. Akira operators provide victims the option to pay for either file decryption or data deletion rather than being ...

Aembit Earns SOC 2 Type II Recertification for Ongoing Security and Compliance

2 min readThis certification validates our ongoing commitment to protecting customer data and maintaining rigorous security controls. The post Aembit Earns SOC 2 Type II Recertification for Ongoing Security and Compliance appeared first on ...

Randall Munroe’s XKCD ‘Scream Cipher’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Scream Cipher’ appeared first on Security Boulevard.