Application Security News and Articles


SCIM Best Practices: Building Secure and Extensible User Provisioning

It's worth thinking about how schema design and security considerations interact with each other. The decisions you make about schema extensions can have significant security implications, and your security requirements might influence how you ...

ADR Virtual Patching Use Rising as Retail Application Layer Attacks Spike | May Attack Data | Contrast Security

One important Application Detection and Response feature is helping customers intercept real threats in real time, shielding apps while developers patch the underlying flaws. The post ADR Virtual Patching Use Rising as Retail Application Layer ...

Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware

IntroductionZscaler ThreatLabz researchers recently uncovered AI-themed websites designed to spread malware. The threat actors behind these attacks are exploiting the popularity of AI tools like ChatGPT and Luma AI. These websites are utilizing ...

WhatsApp BANNED by House Security Goons — But Why?

New phone—who dis? Office of the Chief Administrative Officer (CAO) offers hazy reasoning. The post WhatsApp BANNED by House Security Goons — But Why? appeared first on Security Boulevard.

Anton’s Security Blog Quarterly Q2 2025

Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Top 10 posts with the most ...

How Sonatype leads in AI component analysis for supply chain security

From generative AI tools to pre-trained machine learning models, AI is rapidly transforming how software is developed. The post How Sonatype leads in AI component analysis for supply chain security appeared first on Security Boulevard.

Linux Foundation launches Agent2Agent, a protocol that enables agentic AI interoperability

The Linux Foundation launched the Agent2Agent (A2A) project, an open protocol for secure agent-to-agent communication and collaboration. The A2A protocol is a collaborative effort launched by Google in April and with growing support from more ...

Maximize ROI from Your CrowdStrike Deployment

At ColorTokens, we’ve always been about breach readiness by stopping lateral movement through microsegmentation. Our mission is simple. Contain the spread of threats and keep operations running, even during an attack. That’s how we help ...

LinuxFest Northwest: Maximizing AI Potential Optimization Techniques for Smarter Faster Systems

Author/Presenter: Dmitry Shmulevich (Software Engineer, NVIDIA) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their ...

Barracuda Managed Vulnerability Security identifies and prioritizes vulnerabilities

Barracuda Networks launched Barracuda Managed Vulnerability Security. This fully managed service, powered by Barracuda’s global Security Operations Center (SOC), extends the BarracudaONE platform to help organizations proactively identify, ...

ManageEngine helps MSPs manage day-to-day operations

ManageEngine launched a MSP Central, a unified platform designed to help MSPs streamline service delivery, device management, threat protection, and infrastructure monitoring from a single interface. ManageEngine focuses on addressing specific ...

Siemens Notifies Customers of Microsoft Defender Antivirus Issue

Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions. The post Siemens Notifies Customers of Microsoft Defender Antivirus Issue appeared first on SecurityWeek.

Application and API Security Can’t Rely Solely on Perimeter Defenses or Scanners | Notes on Gartner AppSec Research | Contrast Security

Contrast Security launched Application Detection and Response (ADR) in August of 2024, and now, in a new Gartner research note, ADR is a topic. The 2025 Gartner® Implement Effective Application and API Security Controls (accessible to Gartner ...

The Security Fallout of Cyberattacks on Government Agencies

Cyberattacks against government agencies are escalating at an alarming pace. From state departments to small municipal offices, public sector organizations have become prime targets for ransomware, credential theft, and increasingly sophisticated ...

DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs

DataKrypto and Tumeryk join forces to deliver world’s first secure encrypted guardrails for AI LLMs and SLMs. The post DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs appeared first ...

Trojanized SonicWall NetExtender app exfiltrates VPN credentials

Unknown attackers have trojanized SonicWall’s SSL-VPN NetExtender application, the company has warned on Monday, and have been tricking users into downloading it from a lookalike site(s?). The trojanized SonicWall NetExtender installer ...

Fortifying Retail Security: Practical Steps to Prevent Cyberattacks 

Threats to retailers will intensify with more ransomware attacks, combined with the security implications of new technologies. The post Fortifying Retail Security: Practical Steps to Prevent Cyberattacks  appeared first on Security Boulevard.

Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives

The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk. The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek.

Prometei Botnet Activity Spikes

Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet. The post Prometei Botnet Activity Spikes appeared first on SecurityWeek.

Chinese APT Hacking Routers to Build Espionage Infrastructure

A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure. The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek.