Application Security News and Articles


Industry Moves for the week of February 17, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of February 17, 2025. Stay updated with the latest industry trends and shifts.

How CISOs can balance security and business agility in the cloud

In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between protection and business agility, and overlooked risks that CISOs should prioritize. Belaya also ...

Orbit: Open-source Nuclei security scanning and automation platform

Orbit is an open-source platform built to streamline large-scale Nuclei scans, enabling teams to manage, analyze, and collaborate on security findings. It features a SvelteKit-based web frontend and a Go-powered backend, with Terraform and ...

The hidden risks of a broken data provisioning system

In this Help Net Security video, Bart Koek, Field CTO at Immuta, discusses their 2025 State of Data Security Report, highlighting emerging challenges for IT and data security leaders. Key takeaways from the report: GenAI is causing significant ...

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking

In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy. We also discuss the first ...

Why is DMARC Important? [2025 Updated]

Learn why DMARC is important for blocking phishing, securing your domain, and ensuring email deliverability in 2025. Stay compliant and protected. The post Why is DMARC Important? [2025 Updated] appeared first on Security Boulevard.

DEF CON 32 – I Am Still The Captain Now!

Authors/Presenters: Paul Brownridge Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via ...

PCI DSS 4: Compliance Guide for SAQ A-EP Merchants to comply with Requirements 6.4.3 and 11.6.1

The post PCI DSS 4: Compliance Guide for SAQ A-EP Merchants to comply with Requirements 6.4.3 and 11.6.1 appeared first on Feroot Security. The post PCI DSS 4: Compliance Guide for SAQ A-EP Merchants to comply with Requirements 6.4.3 and 11.6.1 ...

DMARC vs DKIM: Key Differences & How They Work Together

DMARC Vs DKIM: key differences between DMARC and DKIM, how they work together, and why combining both is essential for email security and deliverability. The post DMARC vs DKIM: Key Differences & How They Work Together appeared first on ...

Week in review: Microsoft fixes two actively exploited 0-days, PAN-OS auth bypass hole plugged

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391) February 2025 Patch Tuesday is here, and Microsoft has ...

Keeping Your Cloud Data Safe: What You Need to Know

Why is Cloud Data Safety a Paramount Concern? With the increasing movement of organizations to the cloud, ensuring data security has become a top priority. It’s a well-known fact that organizations thrive on data. But what if this data falls ...

A Deadly Unserious 419?

Over a decade ago, I was more than a little amused at a 419 message of the “I’ve been hired to assassinate you” sub-category to which my  friend and colleague Urban Schrott, then at ESET Ireland, drew my attention, so I wrote it up in a ...

DEF CON 32 – Fitness of Physical Red Teamers

Authors/Presenters: Lucas Rooyakkers & Billy Graydon Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...

The Hidden Cybersecurity Crisis: How GenAI is Fueling the Growth of Unchecked Non-Human Identities

Proper GenAI governance will control and manage the risks associated with NHI growth, bringing equilibrium and balance between security and AI innovation to IT ecosystems. The post The Hidden Cybersecurity Crisis: How GenAI is Fueling the Growth ...

Law Enforcement Can’t Save You From Romance Scams 

Once a conversation starts and a personal connection is established, scammers behind a screen can lure their targets into video call scams utilizing high-quality deepfake technology The post Law Enforcement Can’t Save You From Romance Scams  ...

DOGE.gov Debacle: How a Government Website Went to the Dogs and What It Means for Cybersecurity

The Department of Government Efficiency (DOGE) website was left vulnerable to unauthorized edits. This breach exposes critical flaws in government digital infrastructure and highlights the importance of robust security measures, even for ...

Achieving Independent Control Over Cloud Data

Why is Independent Control Over Cloud Data Necessary? Can organizations truly claim to have complete, independent control over their cloud data? Surprisingly, the answer is often ‘no’. It’s an undeniable fact that the digital transformation ...

Adaptable Security Measures for Dynamic Clouds

Is Adaptable Security the Future of Cybersecurity in Dynamic Cloud Environments? The need for adaptive and responsive measures in cybersecurity becomes increasingly paramount. Within these shifting terrains, Non-Human Identities (NHIs) are ...

Delinea Extends Scope of Identity Management Platform

Delinea this week updated its platform for managing identities to add a vault for storing managing credentials, analytic tools for tracking user behavior and a framework for automating the management of the lifecycle of an identity from ...

SailPoint IPO Signals Bright Spot for Cybersecurity

In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets. The post SailPoint IPO Signals Bright Spot for Cybersecurity appeared first on SecurityWeek.