Application Security News and Articles


Common SSO Vulnerabilities and Mitigations: Protecting Your Authentication Flow

Implement comprehensive monitoring for your SSO systems that can detect both successful attacks and attempted attacks. Look for patterns like unusual geographic distribution of login attempts, high numbers of authentication failures, or ...

Threat actor Banana Squad exploits GitHub repos in new campaign

Trends in open-source software supply chain attacks – ones that exploit the public platforms developers rely on for software development – have changed quite a bit in recent years. While the number of malicious packages uploaded to ...

AWS Extends Scope of Cybersecurity Alliance with CrowdStrike

Amazon Web Services (AWS) and CrowdStrike this week expanded their alliance to include an incident response that is now available on the Amazon Web Services (AWS) marketplace. Announced at the AWS re:Inforce 2025 conference, the Falcon for AWS ...

Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection

Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects. The post Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection appeared ...

Halo Security Honored with 2025 MSP Today Product of the Year Award

Miami, Florida, 18th June 2025, CyberNewsWire The post Halo Security Honored with 2025 MSP Today Product of the Year Award appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Good Science’

Permalink The post Randall Munroe’s XKCD ‘Good Science’ appeared first on Security Boulevard.

The Hidden Threat to Retention: Slow File Security

The post The Hidden Threat to Retention: Slow File Security appeared first on Votiro. The post The Hidden Threat to Retention: Slow File Security appeared first on Security Boulevard.

Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road

PAFACA Pause Persists: Won’t somebody PLEASE think of the children? The post Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road appeared first on Security Boulevard.

Identity Intelligence: The Front Line of Cyber Defense

Identity is the connective tissue of today’s enterprise. But with identity comes exposure. Credentials are being stolen, resold, and reused across the cybercriminal underground at a scale that far outpaces traditional defenses. Identity ...

Eliminate Your AWS API Blind Spots in Minutes

Highlights: Discover every API and API Gateway across your entire AWS environment. Achieve a complete, accurate inventory in minutes, not weeks or months. Deploy instantly with a simple, agentless connection. Traditionally, securing APIs in AWS ...

LinuxFest Northwest: Blender For Beginners

Author/Presenter: Oscar Baechler, MA (Author @ Packt Publishing, Professor, Lake Washington Institute of Technology) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), ...

AWS launches new cloud security features

Amazon Web Services has announced new and improved security features at its annual AWS re:Inforce cloud security conference. The company has also introduced features aimed at speeding up backup recovery, and has announced the completion of its ...

The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

The speakers at ShowMeCon 2025 explored why policy isn't protection without validation. AI, identity, and threat detection must align to reduce operational risk. The post The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025 ...

Cloudflare Log Explorer detects security and performance issues

Cloudflare announced Cloudflare Log Explorer to help give businesses instant access to critical security and performance insights across their IT environments. Now, customers can analyze, investigate, and monitor for security attacks with log ...

Bitdefender acquires Mesh to boost email protection for businesses and MSPs

Bitdefender announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended ...

AWS Makes Bevy of Updates to Simplify Cloud Security

Amazon Web Services (AWS) added a bevy of additional cybersecurity tools and services to its portfolio that collectively make securing its cloud computing platform simpler. Announced at the AWS re:Inforce 2025 conference, the additions include a ...

Critical Vulnerability Patched in Citrix NetScaler

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows. The post Critical Vulnerability Patched in Citrix NetScaler appeared first on SecurityWeek.

Secrets in the Open: Cloud Data Exposures That Put Your Business at Risk

Sensitive data and secrets are leaking. How cloud security leaders can shut them down. Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats persists: sensitive data and credentials ...

Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation

Qualys has disclosed two Linux vulnerabilities that can be chained for full root access, and CISA added a flaw to its KEV catalog. The post Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation appeared first on ...

TPSRM: What It Is — And Why It Matters

Third-party risk management TPRM is a well-established pillar of enterprise security programs. Its focus is on evaluating vendors for financial health, operational resilience, and compliance. As digital ecosystems expanded, so did the attack ...