Application Security News and Articles


OffensiveCon25 – Frame By Frame, Kernel Streaming Keeps Giving Vulnerabilities

Authors/Presenters: Angelboy Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton ...

MY TAKE: Are we ‘Super f**ked’ by agentic AI — or finally able to take charge of what comes next?

When VC mogul Chris Sacca declared AI is the death knell for professional services, I flinched. Not because he’s wrong — but because it’s only half the story. Related:  GenAI grows up – at RSAC 2025 As a journalist who’s … (more…) ...

How to Conduct a Cybersecurity Compliance Audit in 6 Steps

The post How to Conduct a Cybersecurity Compliance Audit in 6 Steps appeared first on AI Security Automation. The post How to Conduct a Cybersecurity Compliance Audit in 6 Steps appeared first on Security Boulevard.

How DataDome Protected a Global Fintech Platform From a Week-Long Credential Stuffing Attack

DataDome blocked over 6.2 million credential stuffing attempts targeting a global fintech login, stopping a week-long attack without disruption or user impact. The post How DataDome Protected a Global Fintech Platform From a Week-Long Credential ...

The UK Brings Cyberwarfare Out of the Closet

The UK’s 2025 Strategic Defence Review outlines a unified approach to modern warfare, integrating cyber, AI, and electromagnetic capabilities across military domains. The post The UK Brings Cyberwarfare Out of the Closet appeared first on ...

Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities

Microsoft and CrowdStrike are partnering to bring better clarity to the information about threat groups, including their names and other attributes. They are creating ways for vendors to share and display such information so that they and ...

Customer Identity and Access Management: A Complete Guide to Fundamentals, Implementation, and Security

Customer Identity and Access Management represents a critical capability for organizations seeking to build trusted, long-term relationships with their customers in an increasingly digital world. Success requires understanding CIAM as more than ...

The growing chaos of AI agents: Why your identity architecture is headed for trouble

AI agents are becoming central to how work gets done — from handling customer service chats to triggering infrastructure automation. But while the hype around agentic AI is reaching a fever pitch, most enterprises are already encountering a ...

What Tackling the SaaS Security Problem Means to Me

By Kevin Hanes, CEO of Reveal Security When I reflect on the years I spent leading one of the world’s largest Security Operations Centers (SOCs) and incident response teams, the lessons learned aren’t just war stories…they’re a playbook ...

Growth Hacking 2.0: From Traditional SEO to AI-Powered Answer Engine Optimization

Growth hacking has evolved from viral loops and cold outreach to AI-powered Answer Engine Optimization (AEO). As Google launches AI search and businesses shift from traditional SEO to AEO, B2B SaaS must adapt their strategies to thrive in this ...

OffensiveCon25 – Chainspotting 2: The Unofficial Sequel to the 2018 Talk “Chainspotting”

Author/Presenter: Ken Gannon Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton ...

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones

Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer after three decades of fighting malware. The post Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones appeared first on SecurityWeek.

News alert: Aembit brings ‘Workload IAM’ to Microsoft stack, secures hybrid AI and app access

Silver Spring, MD, June 3, 2025, CyberNewswire — Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft environments. With this launch, enterprises can now ...

Why Scamming Can’t Be Stopped—But It Can Be Managed

With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale. The post Why Scamming Can’t Be Stopped—But It Can Be ...

1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking

A critical command execution vulnerability has been found by a researcher in Instantel Micromate monitoring units.  The post 1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking appeared first on SecurityWeek.

Malwarebytes Scam Guard spots and avoids potential scams

Malwarebytes launched Scam Guard, an AI-powered digital safety companion that provides real-time feedback on scams, threats and malware alongside digital safety recommendations. Whether it’s a suspicious text, DM, email, image or link, Scam ...

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities

Silver Spring, Maryland, 3rd June 2025, CyberNewsWire The post Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities appeared first on Security Boulevard.

HYPR and HID: Converge Physical and Digital Access Control

Streamlining Security: HYPR and HID Merge Physical and Digital Access The notion of “access” no longer coincides with a single connotation. Within a sprawling landscape of digital identities and physical spaces, modern enterprises are ...

AttackIQ Ready3 identifies which vulnerabilities are truly exposed

AttackIQ releaseed AttackIQ Ready3. With expanded discovery capabilities, Ready3 maps both internal and external attack surfaces. By correlating asset discovery with vulnerability context, attack paths and compensating controls, the platform ...

Introducing Comprehensive Workload Identity and Access Management Across Microsoft Environments

5 min readWith Aembit, you can secure Microsoft workloads – wherever they run – using short-lived credentials, posture-aware policies, and no-code credential injection. The post Introducing Comprehensive Workload Identity and Access ...