Application Security News and Articles


OffensiveCon25 – Pwn20wn Winners Announcement

Author/Presenter: Brian Gore and Dustin Childs Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events ...

Addressing Our ‘Age of Insecurity’ — in Cyber Too

Recent cyber attacks have given a new urgency to business resiliency in the public and private sectors. Let’s explore the problem and some workable answers. The post Addressing Our ‘Age of Insecurity’ — in Cyber Too appeared first on ...

Week in review: NIST proposes new vulnerabilities metric, flaws in NASA’s open source software

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerabilities found in NASA’s open source software Vulnerabilities in open source software developed and used in-house by NASA could be ...

Scalable Strategies for Managing Cloud Machine Identities

Are We Doing Enough to Safeguard Our Machine Identities? Securing human identities and their access permissions has been a focal point for most organizations. But, have we addressed a largely overlooked and equally crucial aspect – the ...

Ensuring Safety in Your Secrets Vaulting Techniques

Is Your Organization Unlocking Optimum Secrets Vaulting Possibilities? A particularly striking component is Non-Human Identities (NHIs). They have become a vital aspect of many businesses’ strategies, especially those that operate. This article ...

Is Innovation Driving Better NHI Management?

How is Innovation Paving the Way for Improved NHI Management? Innovation stands as the lighthouse amidst the tumultuous sea of evolving threats. But how does this innovation affect Non-Human Identities (NHIs) management, a cornerstone of modern ...

How Secrets Scanning is Evolving for Better Security

Why is Secrets Scanning Important in Cybersecurity? Secrets scanning is paramount in cybersecurity. It involves identifying and mitigating risks associated with sensitive data like passwords, tokens, or keys, collectively known as “secrets”. ...

Run SCA and SAST scans on your project

Looking to get your CASA assessment done? Scan your project for vulnerabilities using Fluid AttacksContinue reading on Medium »

BSidesLV24 – Keynotes: Closing Ceremony

Author/Presenter: Daemon Tamer Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

New Relic Enhances Software Reliability with GitHub Copilot Integration

New Relic's integration with GitHub Copilot to boost productivity and enhance software reliability. Discover more now! The post New Relic Enhances Software Reliability with GitHub Copilot Integration appeared first on Security Boulevard.

Cybersecurity Alert: Major Breaches at TikTok and Ticketmaster

A major TikTok breach claims 428M user records are for sale, raising security alarms. Stay informed & secure your data today! The post Cybersecurity Alert: Major Breaches at TikTok and Ticketmaster appeared first on Security Boulevard.

DoD Cyber Clause Flowdown: What Suppliers Must Do

The Department of Defense DFARS Cybersecurity Clause, more commonly known as the DoD Cyber Clause (or just DFARS 7012), is the long-standing set of rules the DoD has put in place for all members of the DoD supply chain and defense industrial ...

Scaling Your Crypto Returns with AirSwap

Make the most of staking with AirSwapContinue reading on Medium »

Are You Anticipating NHIDR Threats Effectively?

Are You Effectively Managing Your NHIDR Threats? Have you ever wondered why seemingly robust cybersecurity systems sometimes fall prey to breaches? Despite incorporating multiple protection layers, companies often overlook the security management ...

Empowering Your Team with Strong IAM Practices

Can Your Team Truly Benefit from Robust IAM Practices? I’ve had the chance to observe how different teams tackle their security issues. That brings me to the question at hand: Can adopting robust IAM practices empower your team to improve their ...

Can We Rely on Current Secrets Management Solutions?

Can Secrets Management Really Secure our Digital Assets? How effective are current secrets management solutions? Are they adequate to safeguard our data in the highly volatile environment of the internet? With data management experts and ...

How Secure Are Your Non-Human Identities in the Cloud?

Are Your Non-Human Identities As Secure As They Should Be? Cloud security is a pressing concern, particularly when it comes to the management of Non-Human Identities (NHIs) and Secrets. These unique identifiers, akin to passports in ...

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

Six New York residents were charged with running a complex scheme that involved fraudulent documentation and unauthorized payment systems to steal as much as $30 million from the country's food stamp program that tens of millions of Americans ...

SentinelOne Outage Leaves Security Teams Hanging for Six Hours

SentinelOne's commercial customers consoles went down for about six hours May 29 in what the company says wasn't a "security incident," but it still faces questions from a customer based that wants to know what happened and why communication from ...

BSidesLV24 – PasswordsCon – All Your Badge Are Belong To Me

Author/Presenter: John-André Bjørkhaug Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...