Application Security News and Articles


How npm Security Collapsed Thanks To a 2FA Exploit

Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought Node Package Manager (npm), the JavaScript runtime environment Node.js‘s default package manager, had finally stopped ...

Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success

An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize exposure and enable innovation that is secure and compliant. Whether you’re already leveraging ...

The Future of Defensible Security: From Reactive Playbooks to Attack-Pattern-Aware Autonomous Response

Why static automation isn’t enough—and what real-world adversary data tells us about how the next-gen SOC must evolve. The post The Future of Defensible Security: From Reactive Playbooks to Attack-Pattern-Aware Autonomous Response appeared ...

What Is Goldilocks? (Or How to Set Your Kubernetes Resource Requests)

When we open sourced Goldilocks in October 2019, our goal was to provide a dashboard utility that helps you identify a baseline for setting Kubernetes resource requests and limits. We continue to refine Goldilocks, because getting resource ...

When is the Right Time to Hire a CISO?

  Knowing when to hire a CISO is a challenging proposition – one which most organizations will eventually need to answer. The need to hire a CISO depends on a combination of factors, including but not limited to: Relevance of regulatory ...

Imperva API Security: Authentication Risk Report—Key Findings & Fixes

An in-depth analysis of common JSON Web Token (JWT) mistakes, basic auth, long-lived tokens, and quick, high-impact fixes to secure your APIs. Introduction APIs are the backbone of modern digital services—from mobile apps and e-commerce to ...

BSidesSF 2025: How To Train Your Detection Dragon

Creator, Author and Presenter: Geet Pradhan Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Rethinking Security Data Management with AI-Native Pipelines

In this blog, you’ll learn why legacy pipelines fail modern SOC needs, how AI-native pipelines cut manual work, and how security teams gain cost savings, resilience, and faster threat response with adaptive, context-aware data management. The ...

Best Identity and Access Management (IAM) Software

Secure your data with the 15 best IAM software solutions. Find practical tools to manage user access and prevent identity attacks effectively. The post Best Identity and Access Management (IAM) Software appeared first on Security Boulevard.

Randall Munroe’s XKCD ‘Coastline Similarity’

via the geologic humor & dry-as-the-taiga wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Coastline Similarity’ appeared first on Security Boulevard.

UNC6395 Hackers Accessed Systems via a GitHub Account, Salesloft Says

Security investigators from Google said UNC6395 hackers spent several months running through Salesloft and Drift systems before launching a data breach campaign that some security researchers say has targeted hundreds of technology and other ...

Patch Tuesday Update – September 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 86 CVEs, including 5 republished CVEs. Overall, Microsoft announced 2 Zero-Day, 9 Critical, and 73 Important vulnerabilities. From an Impact perspective, ...

Ensuring Behavioral Analysis Data Integrity

See how using Q-Compliance to adhere to NIST 800-53 controls would help you and your organization ensure that all the core components for a robust User and Entity Behavior Analytics (UEBA) program are in place. This includes setting up proper ...

Lasso Platform Employs AI Agents to Secure AI Applications

Lasso has launched an agentic AI service for purple teaming that secures AI applications before and after deployment. By combining red and blue team functions with autonomous AI agents, the platform detects vulnerabilities like prompt injection ...

We’ve crossed the security singularity | Impart Security

The Bottom Line: We've Crossed the Security Singularity ‍ The Security Singularity: When AI Democratized Cyberattacks We've crossed a threshold that fundamentally changes cybersecurity forever. Not with fanfare or headlines, but quietly, in ...

We’ve Identified a New IT Ailment. It’s Called Credentialitis – And It’s Spreading Fast

2 min readCredentialitis isn’t just a clever name. It’s a real condition plaguing modern IT teams. Dr. Seymour Keys is here to walk you through the symptoms, the screening, and the treatment. The post We’ve Identified a New IT Ailment. ...

Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night

Authentication migrations fail 40% of the time, costing millions in downtime. Learn the strategies security leaders use to avoid disaster, choose the right vendors, and build future-proof identity infrastructure that won't lock you in. The post ...

Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack

After announcing that the cyberattack-caused disruption to factories would continue, Jaguar Land Rover is now confirming a data breach. The post Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack appeared first on SecurityWeek.

BSidesSF 2025: Trawling For IOCs: Catching C2 In A Sea Of Data

Creator, Author and Presenter: Moses Schwartz Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security

Sofia, Bulgaria, 10th September 2025, CyberNewsWire The post Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security appeared first on Security Boulevard.