Application Security News and Articles


Salvador Tech releases Edge-Recovery Platform

Salvador Tech introduced a Edge-Recovery Platform, a leap forward in comprehensive cyber resilience in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape. This new platform will deliver a solution that enables instant ...

Grip SSPM: Next Evolution in SaaS Identity Risk Management

Grip SSPM enhances SaaS security by automating misconfiguration fixes, engaging app owners, and unifying risk management for a smarter, proactive defense. The post Grip SSPM: Next Evolution in SaaS Identity Risk Management appeared first on ...

SaaS Security: Connecting Posture Management & Identity Risk

SaaS security posture management and identity risk are deeply connected. Learn how to unify visibility, automation, and control to protect your SaaS ecosystem. The post SaaS Security: Connecting Posture Management & Identity Risk appeared ...

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance

The United Kingdom government has secretly requested that Apple build a backdoor into its iCloud service, granting the government unrestricted access to users’ private data. This revelation deeply concerns me – it is a blatant overreach that ...

Lines Between Nation-State and Cybercrime Groups Disappearing: Google

Threat researchers with Google are saying that the lines between nation-state actors and cybercrime groups are blurring, noting that gangs backed by China, Russia, and others are using financially motivated hackers and their tools while attacks ...

Over 3 million Fortune 500 employee accounts compromised since 2022

More than three million employee-linked corporate accounts were compromised between 2022 and 2024 across Fortune 500 companies, according to Enzoic. This surge is fueled by the widespread use of corporate email addresses for personal accounts and ...

The Rise of Non-Ransomware Attacks on AWS S3 Data

The Rise of Non-Ransomware Attacks on AWS S3 Data madhav Thu, 02/13/2025 - 04:39 A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. ...

CISOs and boards see things differently

Splunk’s latest CISO Report reveals critical insights into cybersecurity priorities, threat trends, and strategies for resilience. In this Help Net Security video, Kirsty Paine, Field CTO & Strategic Advisor at Splunk, discusses the key ...

Making sense of database complexity

IT leaders are grappling with increasingly complex database environments. According to a new survey from Redgate, key concerns include protecting sensitive data, navigating regulatory compliance, and managing the rise of multi-database platforms. ...

Innovations in Machine Identity Management

Are You Ready to Revolutionize Your Approach to Machine Identity Management? We understand the challenges you face in streamlining the complexities of managing Non-Human Identities (NHIs) and their secrets. These machine identities are the unsung ...

Harnessing Powerful Tools for Identity Protection

Can We Truly Secure Our Digital Universe? More businesses are realizing the importance of boosting their cybersecurity measures. One such measure that has gained considerable attention due to its efficiency and effectiveness is Non-Human ...

Integrating Proactive Defense in Cloud Operations

Does Your Cybersecurity Strategy Include Proactive Defense? Threats don’t discriminate – they affect corporations and small businesses alike. So, where does an effective cybersecurity strategy begin? For organizations operating in the cloud, ...

How to Bypass DataDome (And Why It’s Not That Simple)

Hackers and bot operators are often looking for ways to bypass DataDome's protection, but bypassing DataDome isn’t easy. Learn how we ensure DataDome lets in real users while blocking bots and fraud. The post How to Bypass DataDome (And Why ...

What We Learned From Infiltrating 22 Credential Stuffing Crews

Credential stuffing is now a full-scale fraud ecosystem. See what Kasada uncovered from infiltrating 22 groups – and how to stop ATO before it reaches your login page. The post What We Learned From Infiltrating 22 Credential Stuffing Crews ...

DEF CON 32 – ICS 101

Authors/Presenters: Bryson Bort, Tom VanNorman - Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention ...

Italian Government Denies It spied on Journalists and Migrant Activists Using Paragon Spyware

The Italian government denied it hacked seven cellphones with military-grade surveillance technology from Paragon Solutions. The post Italian Government Denies It spied on Journalists and Migrant Activists Using Paragon Spyware appeared first on ...

QuSecure Banks $28M Series A for Post-Quantum Cryptography Tech

QuSecure is pitching a software-based security architecture that overlays onto current networks to help businesses with PQC migration. The post QuSecure Banks $28M Series A for Post-Quantum Cryptography Tech appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Incoming Asteroid’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Incoming Asteroid’ appeared first on Security Boulevard.

Cybercriminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks

As Valentine’s Day approaches, cybercriminals are ramping up their efforts to exploit consumers through romance scams, phishing campaigns and fraudulent e-commerce offers. The post Cybercriminals Exploit Valentine’s Day with Romance Scams, ...

Check Point, Wiz Partner on Enterprise Cloud Security

Check Point Software Technologies and cloud security provider Wiz are teaming up to enhance cloud security for enterprises by integrating cloud network protection with Cloud Native Application Protection (CNAPP). The post Check Point, Wiz Partner ...