Application Security News and Articles


New AI Models on Amazon Bedrock: Llama 4, Ray2, and More

Latest Llama 4 models on AWS, DeepSeek AI integration, Luma AI's Ray2, and new evaluation capabilities. Transform your AI experience today! The post New AI Models on Amazon Bedrock: Llama 4, Ray2, and More appeared first on Security Boulevard.

Java Development Updates: Key Features, Vulnerabilities & News

OpenJDK updates for JDK 25, including new JEPs, release schedules, and advancements in AI tools for Java development. The post Java Development Updates: Key Features, Vulnerabilities & News appeared first on Security Boulevard.

EU Stakes Out Digital Sovereignty With Vulnerability Database 

Depending on who’s doing the talking, the new European Vulnerability Database (EUVD), set up by the European Union Agency for Cybersecurity (ENISA) and which recently went operational, is a much-needed alternative to EU dependency on MITRE. Or ...

AI hallucinations and their risk to cybersecurity operations

AI systems can sometimes produce outputs that are incorrect or misleading, a phenomenon known as hallucinations. These errors can range from minor inaccuracies to misrepresentations that can misguide decision-making processes. Real world ...

Why EU encryption policy needs technical and civil society input

In this Help Net Security interview, Full Professor at University of Leuven, unpacks the European Commission’s encryption agenda, urging a balanced, technically informed approach to lawful access that safeguards privacy, security, and ...

Hanko: Open-source authentication and user management

Hanko is an open-source, API-first authentication solution purpose-built for the passwordless era. “We focus on helping developers and organizations modernize their authentication flows by migrating users towards passkeys, while still ...

Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic

In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent ...

Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel

In this Help Net Security video, Adam Pennington, MITRE ATT&CK Lead, breaks down what’s new in the ATT&CK v17 release. He highlights the addition of the ESXi platform, new and updated techniques for Linux, refinements to mitigation ...

Achieving Operational Freedom with Advanced IAM

How Can Advanced IAM Empower Operational Freedom? Have you ever wondered how to achieve operational freedom in rising cyber threats and complex cloud environments? The answer lies in adopting an advanced Identity and Access Management (IAM) ...

Smart Strategies for Comprehensive Data Protection

Why Non-Human Identities (NHIs) Management is Key in Data Protection Strategies? With cyber threats escalating at an alarming rate, Non-Human Identities (NHIs) management has become an indispensable part of comprehensive security strategies. But ...

Leveraging Powerful Tools for Risk Management

Why is Risk Management Essential in Cybersecurity? Do you understand the critical role risk management plays in your organization’s cybersecurity framework? It is paramount for organizations to protect their Non-Human Identities (NHIs) and ...

Securing Cloud Infrastructure to Handle Business Needs

Essential Considerations for Securing Cloud Infrastructure Have you ever paused to consider the potential vulnerabilities lurking in your cloud security? With businesses increasingly shift their operations towards cloud-based platforms, the ...

BSidesLV24 – GroundFloor – Discover The Hidden Vulnerability Intelligence Within CISA’s KEV Catalog

Author/Presenter: Glenn Thorpe Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Fairfax County, Va., CISO Michael Dent on Leadership

What’s on the minds of top local government chief information security officers? In this interview, Michael Dent shares current security and technology priorities, career tips and more. The post Fairfax County, Va., CISO Michael Dent on ...

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patch Tuesday: Microsoft fixes 5 actively exploited zero-days On May 2025 Patch Tuesday, Microsoft has released security fixes for 70+ ...

Maximize Your $sAST Passive Income with StakingRewards

Earn More with $sAST by Staking SmartlyContinue reading on Medium »

How to Boost Your Passive Income with AirSwap $sAST

Learn how staking AirSwap $sAST can provide you with consistent passive income.Continue reading on Medium »

Are You Capable of Securing Your Digital Assets?

Is Your Organization Capable of Securing its Digital Assets? Reflect for a moment: are your digital assets comprehensively protected from security threats? With the proliferation of non-human identities (NHIs) and the need for a safe cloud ...

Ensuring Satisfaction in Managing Non-Human Identities

Why is NHI Management Integral to Your Cybersecurity Strategy? If you’ve ever wondered, “How can I make my cybersecurity strategy more robust and reduce the risk of security breaches?” then Non-Human Identity (NHI) management could be the ...

OAuth 2.0 Overview

Ever clicked a “Login with Google” button or granted a new photo app permission to access your Dropbox files? If so, you’ve already experienced OAuth 2.0 — even if you didn’t realize it at the time. Think of it like this: you wouldn’t ...