Application Security News and Articles


AIBOMs are the new SBOMs: The missing link in AI risk management

In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to security issues that conventional tools fail to detect. He explains how ...

Average global data breach cost now $4.44 million

IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organizations experiencing an AI-related breach is a small representation of the researched ...

NHIs Continue to Outpace Human Identities and Bump Up Security Risk 

Unmanaged machine identities have continued to tick up at a rapid clip, furthering a trend that finds non-human identities (NHIs) outpacing human accounts — and, to the chagrin of security experts, exposing credentials, new research on the ...

Open-source password recovery utility Hashcat 7.0.0 released

Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators across Linux, Windows, and macOS, and includes features ...

The surprising truth about identity security confidence

Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The study reveals a troubling gap between what organizations believe about their identity security programs and how ...

What’s keeping risk leaders up at night? AI, tariffs, and cost cuts

Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according to a new report from Gartner. The firm’s second-quarter Emerging Risk Report, based on a survey of 223 senior ...

Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis

This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the ...

Stay Proactive: Secure Your Cloud Identities

Does Your Cloud Security Truly Address Non-Human Identities? Every organization wishes for a robust cybersecurity strategy, but have you ever wondered if yours truly addresses non-human identities (NHIs)? This essential, often overlooked element ...

Controlling NHIs: Strategy for Modern Security

Why is NHI Management so Crucial in Modern Security Strategies? Where the utilization of machine identities is becoming increasingly commonplace, it’s essential to ask: How prominent is NHI management in shaping modern security strategies? ...

Are Your Security Measures Capable Enough?

How Effective are Your Cybersecurity Measures? Is your organization taking the adequate security measures to protect itself from digital threats? With digital becomes increasingly sophisticated, so too does cybersecurity. For businesses operating ...

BSidesSF 2025: Service Mesh Security: Shifting Focus To The Application Layer

Creator/Author/Presenter: Daniel Popescu Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held ...

Week in review: Food sector cybersecurity risks, cyber threats to space infrastructure

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s Handbook For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. ...

How Secure Are Your Non-Human Identities?

Just How Safe are Your Machine Identities? Ever wondered just how secure your Non-Human Identities (NHIs) are where data breaches are increasingly common? This question should be at the forefront of your mind. Why the Focus on NHIs? NHIs form an ...

BSidesSF 2025: Mapping The SaaS Attack Surface

Creator/Author/Presenter: Jaime Blasco Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at ...

OT Security: Guide For Critical Infrastructure

Operational Technology (OT) security encompasses a set of practices and procedures aimed at protecting cyber-physical systems and industrial control systems (ICS) from cyber threats and exploitation. ICS are essential OT components widely used ...

SAST & DAST 程式碼分析介紹

程式碼分析是指對軟體原始碼進行安全性檢查,以找出潛在的安全問題以及漏洞。Continue ...

STRATEGIC REEL: Proactive by design: Fortinet retools network defense for real-time threats

Security teams can no longer afford to wait for alerts — not when cyberattacks unfold in milliseconds. That’s the core warning from Fortinet’s Derek Manky in a new Last Watchdog Strategic Reel recorded at RSAC 2025. As adversaries adopt ...

CMMC Assessor FAQ: What Can You Expect From Them?

Part of the process of achieving certification with CMMC is undergoing an audit to validate your security posture across all of the relevant security controls. This can’t be done internally; part of maintaining a valid security framework is ...

15+ Vegas Gems for Black Hat 2025

Stop drowning in security alerts. See Morpheus autonomous SOC platform live at booth #1851and discover why analysts are smiling again. The post 15+ Vegas Gems for Black Hat 2025 appeared first on D3 Security. The post 15+ Vegas Gems for Black Hat ...

Adaptable Security in an Evolving Cloud Landscape

How Crucial is Adaptable Security for Non-Human Identities in Today’s Cloud Landscape? Where cloud environments are becoming increasingly complex, ensuring adaptable security is a paramount consideration. Rather than just focusing on human ...