Application Security News and Articles


Randall Munroe’s XKCD ‘Baker’s Units’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Baker’s Units’ appeared first on Security Boulevard.

Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw

Akamai documents a privilege escalation flaw in Windows Server 2025 after Redmond declines to ship an immediate patch. The post Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw appeared first on SecurityWeek.

Signal Gives Microsoft a Clear Signal: Do NOT Recall This

Black screen of DRM: Privacy-first messenger blocks Microsoft Recall The post Signal Gives Microsoft a Clear Signal: Do NOT Recall This appeared first on Security Boulevard.

Navigating the New Frontiers of Identity: Insights from KuppingerCole EIC Summit 2025

Discover why machine identities are the new security frontier from KuppingerCole EIC 2025. Learn about secrets sprawl, AI agents, and why traditional IAM fails to protect NHIs in this GitGuardian recap. The post Navigating the New Frontiers of ...

Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform

Miami, Florida, 22nd May 2025, CyberNewsWire The post Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform appeared first on Security Boulevard.

Unpatched Windows Server vulnerability allows full domain compromise

A privilege escalation vulnerability in Windows Server 2025 can be used by attackers to compromise any user in Active Directory (AD), including Domain Admins. “The [“BadSuccessor”] attack exploits the delegated Managed Service ...

Law Enforcement, Microsoft Disrupt Operations of Popular Lumma Stealer

International law enforcement agencies and cybersecurity vendors seized thousands of domains used to run the MaaS operations of the widely popular Lumma Stealer malware, which was used to facilitate ransomware, malvertising, and phishing attacks ...

BSidesLV24 – PasswordsCon – Picking A Fight With The Banks

Author/Presenter: Cecilie Wian Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

10 Proven Growth Strategies for B2B SaaS: Lessons from Business Classics & Applications for AI Startups

Transform your B2B SaaS growth trajectory with 10 battle-tested strategies derived from business classics and proven by market leaders. Learn how these frameworks can be specifically adapted for AI startups, with actionable tactics that drive ...

How to prevent data leakage in your AI applications with Tonic Textual and Snowpark Container Services

Tonic Textual provides advanced Named Entity Recognition (NER) and synthetic replacement of sensitive free-text data. Today, we are excited to announce that Tonic Textual is now available on the Snowflake Data Platform via Snowpark Container ...

De-Identifying Your Text Data in Snowflake Using Tonic Textual

Discover how Tonic Textual revolutionizes data privacy in Snowflake. Learn to create and implement a UDF for secure, compliant free-text data use in our latest article. The post De-Identifying Your Text Data in Snowflake Using Tonic Textual ...

StackHawk raises $12 million to help security teams tackle AI-powered dev cycles

StackHawk, the shift-left API security platform, announced it has taken on $12 million in additional funding from Sapphire and Castanoa Ventures to help security teams keep up with the pace of AI-driven development. With this funding, StackHawk ...

Attackers Abuse TikTok and Instagram APIs

It must be the season for API security incidents. Hot on the heels of a developer leaking an API key for private Tesla and SpaceX LLMs, researchers have now discovered a set of tools for validating account information via API abuse, leveraging ...

Contrast Secures AI Applications and Modern Software | Forrester 2025 SAST Report | Contrast Security

A new report from independent research firm Forrester has several major findings.  The post Contrast Secures AI Applications and Modern Software | Forrester 2025 SAST Report | Contrast Security appeared first on Security Boulevard.

How Identity Plays a Part in 5 Stages of a Cyber Attack

While credential abuse is a primary initial access vector, identity compromise plays a key role in most stages of a cyber attack. Here’s what you need to know — and how Tenable can help. Identity compromise plays a pivotal role in how ...

Druva strengthens cyber resilience across Microsoft Azure environments

Druva announced comprehensive protection for Azure SQL and Azure Blob Storage. Building on Druva’s strategic relationship with Microsoft, these enhancements help enterprises reduce risk, control costs, and improve operational agility with ...

Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People

Marlboro-Chesterfield Pathology has been targeted by the SafePay ransomware group, which stole personal information from its systems. The post Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People appeared first on SecurityWeek.

Marks & Spencer Expects Ransomware Attack to Cost $400 Million

UK retailer Marks & Spencer expects the disruptions caused by the recent cyberattack to continue through July.  The post Marks & Spencer Expects Ransomware Attack to Cost $400 Million appeared first on SecurityWeek.

The Voter Experience

Technology and innovation have transformed every part of society, including our electoral experiences. Campaigns are spending and doing more than at any other time in history. Ever-growing war chests fuel billions of voter contacts every cycle. ...

Signal blocks Microsoft Recall from screenshotting conversations

Signal has released a new version of its end-to-end encrypted communication app for Windows that prevents Microsoft Recall and users from screenshotting text-based conversations happening in the app. The new “Screen security” setting is ...