Application Security News and Articles


Decoding Modern Authentication Protocols Navigating OIDC, SAML, and OAuth 2.0

Explore OIDC, SAML, and OAuth 2.0 in depth. Learn how these modern authentication protocols streamline SSO, enhance security, and improve user access management in enterprise environments. The post Decoding Modern Authentication Protocols ...

Unlock Enterprise SSO with OpenID Connect Discovery Mastering Metadata

A comprehensive guide to OpenID Connect Discovery and Metadata for Enterprise SSO, covering discovery process, metadata, and security for CTOs and VPs of Engineering. The post Unlock Enterprise SSO with OpenID Connect Discovery Mastering Metadata ...

Decoding SAML Assertion Attributes Unleashing Enterprise SSO Power

Explore SAML assertion attributes and profiles in depth. Learn how they enhance enterprise SSO, identity federation, and security. Ideal for CTOs and VPs of Engineering. The post Decoding SAML Assertion Attributes Unleashing Enterprise SSO Power ...

Mastering OAuth 2.0 Grant Types A Guide for Enterprise SSO

Explore OAuth 2.0 grant types and flows for Enterprise SSO. Learn about authorization code, client credentials, and other flows to secure your enterprise applications. The post Mastering OAuth 2.0 Grant Types A Guide for Enterprise SSO appeared ...

Mastering Federated Identity Management for Secure Enterprise Access

Learn how Federated Identity Management (FIdM) enhances enterprise security and simplifies user access with SSO. Explore SAML, OIDC, and best practices for implementation. The post Mastering Federated Identity Management for Secure Enterprise ...

Beyond Passwords A CTO’s Guide to Next-Gen Authentication Methods

A comprehensive guide for CTOs and VPs of Engineering on implementing passwordless authentication methods in Enterprise SSO and CIAM environments to enhance security and user experience. The post Beyond Passwords A CTO’s Guide to Next-Gen ...

Sometimes Bigger Isn’t Better: Macro vs. Microsegmentation

In my years as a network security engineer, I was often asked the question: “What is the difference between macrosegmentation and microsegmentation?” Both are components of a robust cyber defense strategy, but they serve distinct purposes ...

Scams Using Malicious Smart Contracts, YouTube videos to Steal Crypto

SentinelOne researchers found multiple ongoing crypto scams that use AI-generated videos on aged YouTube accounts to market trading bots that hide malicious smart contracts that are designed to empty victim crypto wallets of Ethereum. The post ...

Imperva Detects and Mitigates Rejetto HFS Spray-and-Pray Ransomware/Trojan Campaign

On July 19th, Imperva Threat Research team detected a sudden surge in HTTP probes targeting Rejetto HTTP File Server (HFS) 2.x instances. What looked like routine internet noise quickly revealed itself as a coordinated attempt to exploit a ...

Project Ire: Microsoft’s autonomous malware detection AI agent

Microsoft is working on a AI agent whose main goal is autonomous malware detection and the prototype – dubbed Project Ire – is showing great potential, the company has announced on Tuesday. Tested on a dataset of known malicious and ...

Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware

Microsoft has unveiled Project Ire, a prototype autonomous AI agent that can analyze any software file to determine if it’s malicious. The post Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware appeared first ...

Tidal Cyber Launches Threat-Led Defense, Redefining Detection and Defense

Tidal Cyber’s Threat-Led Defense approach is empowering cybersecurity teams to align detection and defense strategies directly to real-world adversary behavior. The post Tidal Cyber Launches Threat-Led Defense, Redefining Detection and Defense ...

ExtraHop helps SOCs connect the dots with identity-driven detection

ExtraHop unveiled new innovations to accelerate incident response, offering an understanding of cyberattacks by linking disparate detections to compromised identities. As threat actors increasingly weaponize user identities to carry out their ...

Cymulate’s new platform turns threat validation into smarter defense

Cymulate announced the new Cymulate Exposure Management Platform, which validates, prioritizes and optimizes the entire security ecosystem – continuously. The new Cymulate platform unifies exposure data and integrates threat validation results ...

Manifest AI Risk turns weeks of model vetting into two clicks

Manifest Cyber introduced Manifest AI Risk, the latest module part of the Manifest Platform, designed to help security and compliance teams secure their AI supply chains. The Manifest Platform is already used by Fortune 500 companies and critical ...

Riverbed rolls out AI-powered tools to find and fix network issues faster

Riverbed launched its new AI-powered intelligent network observability solutions, enhancing network visibility for enterprise IT teams and enabling them to proactively identify and resolve problems in real-time before they escalate into business ...

BSidesSF 2025: Fireproof Your Castle With Risk-First GRC

Creators/Authors/Presenters: Aakash Yadav, Lindsey Pilver Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

New Reveal platform shines a light on post-login identity behavior

Reveal Security released the Reveal Platform, a solution to deliver preemptive identity security across SaaS, cloud, and custom applications. Designed for modern hybrid enterprises, the platform provides end-to-end visibility into both human and ...

Cisco Says User Data Stolen in CRM Hack

Cisco has disclosed a data breach affecting Cisco.com user accounts, including names, email address, and phone numbers. The post Cisco Says User Data Stolen in CRM Hack appeared first on SecurityWeek.

Java24: Go deeper on parsing Java class files and broader with Stream gatherers

Version 24 version introduces several new language features which collectively simplify code, and provide powerful tools for bytecode manipulation and advanced stream processing. The post Java24: Go deeper on parsing Java class files and broader ...