Application Security News and Articles


Your heartbeat could reveal your identity, even in anonymized datasets

A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to individuals. Researchers were able to re-identify people in anonymous datasets with surprising accuracy, raising ...

CISOs brace for a new kind of AI chaos

AI is being added to business processes faster than it is being secured, creating a wide gap that attackers are already exploiting, according to the SANS Institute. The scale of the problem Attackers are using AI to work at speeds that humans ...

Attackers are coming for drug formulas and patient data

In the pharmaceutical industry, clinical trial data, patient records, and proprietary drug formulas are prime targets for cybercriminals. These high-value assets make the sector a constant focus for attacks. Disruptions to research or medicine ...

Ransomware, vendor outages, and AI attacks are hitting harder in 2025

Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these forces are playing out in real-world incidents and how they are ...

New infosec products of the week: September 12, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Cynomi, DataLocker, Gigamon, Lookout, and Relyance AI. Cynomi simplifies vendor risk management Cynomi’s TPRM provides MSPs and MSSPs with a scalable ...

Securing Your GitHub Codebase: 6 Essential Tools Every Developer Must Know

Why Repository Security Is Critical in 2025Continue reading on AWS in Plain English »

Boost Your Confidence With Robust NHI Management

Does Your Organization Understand the Strategic Importance of NHI Management? With corporations increasingly shift operations to the cloud, they face the daunting task of managing a vast array of Non-Human Identities (NHIs) – machine identities ...

How Protected Are Your NHIs in Dynamic Networks?

Unraveling the Core Structure: What are NHIs? Are you really protecting your Non-Human Identities (NHIs) to the best of your ability? NHIs are an often misunderstood but vitally important component. They are machine identities created by ...

BSidesSF 2025: Understanding IRSF Fraud: Protecting Against SMS Exploitation

Creator, Author and Presenter: Vien Van, Senthil Sivasubramanian Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

DoorDash scams are serving up trouble

DoorDash has become a staple for more than 40 million U.S. users, whether they’re ordering takeout or delivering it. But as the app’s popularity grows, so does the attention from scammers. The post DoorDash scams are serving up trouble ...

Best Enterprise Identity and Access Management (IAM) Software

Discover the 15 best enterprise IAM software solutions. Secure your data, manage access effectively, and prevent identity-based attacks with these practical tools. The post Best Enterprise Identity and Access Management (IAM) Software appeared ...

AI Gone Rogue – What Anthropic’s Report Means for Cybersecurity

When a North Korean scammer asks Claude "what is a muffin?" it seems innocent enough. When that same person uses AI to maintain a Fortune 500 engineering job while funding weapons programs, we're looking at a fundamental shift in cybercrime. The ...

Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’

Roasting Redmond for Kerberoasting: “Like an arsonist selling firefighting services,” quips this 76-year-old. The post Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’ appeared first on Security Boulevard.

From Alert Fatigue to Proactive Defense: The Case for AI-Driven Prevention

Artificial intelligence is no longer just another tool in the cybersecurity stack—it’s becoming a requirement to keep pace with modern threats. Deep Instinct CIO Carl Froggett discusses how attackers are leveraging AI to move faster and why ...

Why Cyber Resilience Starts With People, Not Just Tools

Fletcher Heisler, CEO of Authentik Security, highlights the company’s open-source identity provider, focusing on its enterprise functionality and compliance. The discussion covers the evolution of Identity and Access Management (IAM) and ...

Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing

Join the webinar as we reveal a new model for AI pen testing – one grounded in social engineering, behavioral manipulation, and even therapeutic dialogue. The post Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing appeared ...

BSidesSF 2025: Your Intrusion Detection Still Sucks (And What To Do About It)

Creator, Author and Presenter: Jason Craig Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

Akira ransomware affiliates continue breaching organizations via SonicWall firewalls

Over a year after SonicWall patched CVE-2024-40766, a critical flaw in its next-gen firewalls, ransomware attackers are still gaining a foothold in organizations by exploiting it. Like last September and earlier this year, the attackers are ...

Realm.Security Joins Google Cloud Partner Advantage Program to Deliver Cost-Effective Security Data Management at Scale

Realm.Security joins the Google Cloud Partner Advantage program to deliver AI-powered security data pipelines that cut SIEM costs, streamline log management, and improve SOC efficiency for Google Cloud customers. The post Realm.Security Joins ...