Application Security News and Articles


Nosey Parker: Open-source tool finds sensitive information in textual data and Git history

Nosey Parker is an open-source command-line tool that helps find secrets and sensitive information hidden in text files. It works like a specialized version of grep, focused on spotting things like passwords, API keys, and other confidential ...

Inside Vietnamese Threat Actor Lone None’s Copyright Takedown-Spoofing Campaign

Cofense Intelligence has been tracking a series of Copyright-themed campaigns conducted by the Lone None threat actor group. This Strategic Analysis will look at this campaign’s current TTPs (tactics, techniques, and procedures) and IOCs ...

Building AI responsibly from day one

In this Help Net Security video, David Hardoon, Global Head of AI Enablement at Standard Chartered, discusses the role of ethics and safety in AI development. He explains why principles like fairness, accountability, and transparency must be ...

A look inside 1,000 cyber range events and what they reveal about AppSec

Software powers almost every part of business, which means attackers have more chances than ever to exploit insecure code. A new report from CMD+CTRL Security looks at how teams are building their defenses through cyber range training. Based on ...

Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack

JLR extended the pause in production “to give clarity for the coming week as we build the timeline for the phased restart of our operations and continue our investigation.” The post Jaguar Land Rover Says Shutdown Will Continue Until at Least ...

A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York

More than 300 servers and 100,000 SIM cards designed to mimic cellphones and overwhelm networks. The post A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York appeared first on SecurityWeek.

Feel Relieved with Autonomous Secrets Rotation

How Can Autonomous Secrets Rotation Alleviate Security Concerns? Imagine where security breaches are no longer a looming threat to your organization’s sensitive data. For many cybersecurity professionals, this dream scenario is becoming a ...

Certain Protections Against Identity Thefts

The Strategic Importance of Non-Human Identities in Cybersecurity Are your security measures truly comprehensive, or are there unnoticed gaps that could compromise your organization’s safety? Where machine identities are growing exponentially, ...

Microsegmentation and Zero Trust: Partners in Principle, Different in Practice

Zero Trust has become one of the most talked-about strategies in cybersecurity. At its core, the philosophy is simple: never trust, always verify. Every user, device, and workload is treated... The post Microsegmentation and Zero Trust: Partners ...

Wait, Firewalls Still Matter in a Zero Trust World?

Zero Trust has become the rallying cry of modern cybersecurity. The principle of “never trust, always verify” is baked into government mandates, boardroom conversations, and vendor marketing slides everywhere. But... The post Wait, Firewalls ...

DEF CON 33: 40 Years Of Phrack: Hacking, Zines & Digital Dissent

Creators, Authors and Presenters: Richinseattle, Netspooky, Chompie Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events ...

Cyber Criminals Have A New Best Friend – The University of Oregon

The views and opinions expressed in this blog do not necessarily reflect the views and opinions of SecureIQLab, but probably dovetail nicely with the views and opinions of the majority of cybersecurity professionals. This is painful to write. The ...

7 Ways False Positives Drain the SOC + How to Eliminate Them

The post 7 Ways False Positives Drain the SOC + How to Eliminate Them appeared first on Votiro. The post 7 Ways False Positives Drain the SOC + How to Eliminate Them appeared first on Security Boulevard.

Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack

Binarly researchers have found a way to bypass a patch for a previously disclosed vulnerability.  The post Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack appeared first on SecurityWeek.

News alert: SpyCloud report finds security teams overconfident as identity exposures fuel ransomware

Austin, Texas, September 23rd, 2025, CyberNewsWire — SpyCloud, the leader in identity threat protection, today released the 2025 SpyCloud Identity Threat Report, revealing that while 86% of security leaders report confidence in their ability to ...

SolarWinds Makes Third Attempt at Patching Exploited Vulnerability

CVE-2025-26399 is a patch bypass of CVE-2024-28988, which is a patch bypass of the exploited CVE-2024-28986. The post SolarWinds Makes Third Attempt at Patching Exploited Vulnerability appeared first on SecurityWeek.

DataDome Featured in Gartner® Hype Cycle™ for Application Security, 2025

DataDome is featured as a Sample Vendor of Bot Management in the Gartner Hype Cycle for Application Security, 2025. The post DataDome Featured in Gartner® Hype Cycle™ for Application Security, 2025 appeared first on Security Boulevard.

After Shai-Hulud, GitHub tightens npm publishing security

Attackers are constantly finding ways to take over accounts and push malicious packages to the npm registry, the (GitHub-operated) online repository for JavaScript and Node.js packages. But in this month alone, we witnessed the compromise of ...

GitGuardian Introduces One-Click Secret Revocation to Accelerate Incident Response

Secure your secrets with GitGuardian's new one-click revocation. Instantly neutralize exposed secrets to close the attack window and automate your incident response. The post GitGuardian Introduces One-Click Secret Revocation to Accelerate ...

Service Accounts in Active Directory: These OG NHIs Could Be Your Weakest Link

While non-human identities (NHIs) in cloud and SaaS operations may be getting lots of attention right now, securing your Active Directory service accounts can go a long way in reducing risk. Here are three steps you can take right now. Key ...