Application Security News and Articles


Why security teams cannot rely solely on AI guardrails

In this Help Net Security interview, Dr. Peter Garraghan, CEO of Mindgard, discusses their research around vulnerabilities in the guardrails used to protect large AI models. The findings highlight how even billion-dollar LLMs can be bypassed ...

How to give better cybersecurity presentations (without sounding like a robot)

Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not talent,” he says. “Any skill, be it dancing, football, or ...

SPIRE: Toolchain of APIs for establishing trust between software systems

SPIRE is a graduated project of the Cloud Native Computing Foundation (CNCF). It’s a production-ready implementation of the SPIFFE APIs that handles node and workload attestation to securely issue SVIDs to workloads and verify the SVIDs of ...

Layoffs pose a cybersecurity risk: Here’s why offboarding matters

In this Help Net Security video, Chase Doelling, Principal Strategist at JumpCloud, discusses the overlooked security risks associated with improper offboarding. Though many organizations focus on securely onboarding new employees, they often ...

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009

Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting ...

Despite drop in cyber claims, BEC keeps going strong

Ransomware claims stabilized in 2024 despite remaining the most costly and disruptive type of cyberattack, according to Coalition. 60% of 2024 claims originated from BEC and funds transfer fraud (FTF) incidents, with 29% of BEC events resulting ...

How to Stay Ahead of the Curve with AirSwap $sAST

Stay Ahead of the Game with These Staking Tips for AirSwap $sASTContinue reading on Medium »

Justify Your Investment in Cloud-Native NHIs

Are Your Investments in Cloud-Native NHIs Justified? A new hero has emerged, capable of handling complex security threats to cloud. Meet Non-Human Identities (NHIs), the machine identities that have revolutionized cybersecurity operations. ...

Achieve Stability with Streamlined Secrets Management

Can Streamlined Secrets Management Enhance Stability? Secrets management can be likened to a well-kept vault of confidential data, critical to the security and performance of any system. Where data breaches are prevalent, effective secrets ...

BSidesLV24 – Proving Ground – The Immortal Retrofuturism Of Mainframe Computers And How To Keep Them Safe

Author/Presenter: Michelle Eggers Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

How to Get the Most Out of Your AirSwap $sAST Rewards

Mastering the Art of Maximizing Your $sAST EarningsContinue reading on Medium »

Did LockBit Just Get Locked Out? The Walmart of Ransomware’s Massive Leak

Has the notorious LockBit ransomware gang finally met its end? In a shocking turn of events, LockBit, one of the most notorious ransomware groups, has had its own site defaced and a massive amount of data dumped. LockBit’s own leak site was ...

The Legacy Cyber Threat: Why We Must Prioritize Modernization

Most governments struggle with replacing legacy systems for a variety of reasons. But some people claim legacy mainframes can be just as secure as modern ones. So how big is the legacy cyber threat? The post The Legacy Cyber Threat: Why We Must ...

Week in review: The impact of a CVE-free future on cyber defense, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What a future without CVEs means for cyber defense For many cybersecurity professionals, the CVE program is the foundation for hands-on ...

Driving Innovation with Enhanced NHIDR Capabilities

Taking the Helm: The Essential Elements of Non-Human Identities and Secrets Security Management Are we doing enough to safeguard our digital assets? We cannot overlook the strategic importance of Non-Human Identities (NHIs) and Secrets Security ...

Stay Satisfied with Comprehensive Secrets Vaulting

Is Comprehensive Secrets Vaulting the Key to Optimal Cybersecurity? When we witness a massive digital transformation across many sectors, the need for a robust security system is more pressing than ever before. Machine identities, or Non-Human ...

Feel Relieved with Efficient Secrets Rotation

Is Your Organization Optimally Protecting Its Non-Human Identities? I bring this pertinent issue to light. Non-Human Identities (NHIs) and Secrets Security Management are essential components in maintaining cybersecurity integrity. But without an ...

Building Adaptable NHIs for a Secure Future

Are We Placing Appropriate Importance on Adaptable NHIs? Non-Human Identities (NHIs) are the unsung heroes. Yet, far too often, their crucial role in safeguarding network infrastructure and data is overlooked. However, ignoring the importance of ...

The Key to Earning Consistent Rewards with AirSwap $sAST

How to Achieve Consistent Earnings with AirSwap $sAST StakingContinue reading on Medium »

BSidesLV24 – Proving Ground – Are You Content With Our Current Attacks On Content-Type?

Authors/Presenters: Eiji Mori, Norihide Saito Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites ...