Application Security News and Articles


How 300,000+ hard drives performed in the real world

Cloud storage company Backblaze has released its Q1 2025 hard drive reliability report, which provides insights into the performance and failure rates of various HDD models used in their data centers. The data helps users understand which HDDs ...

How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”

In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her upcoming book Digital Safety in a Dangerous World, which will feature her expert advice, as well as insights ...

New blockchain security standards target safer ecosystems

The Blockchain Security Standards Council (BSSC) launched its first four security standards, marking a significant milestone in the journey towards a more secure and trustworthy blockchain ecosystem. These standards are designed to address ...

5 Identity Security Risks We Found in a Regulated Enterprise

Explore 5 identity security risks uncovered in a highly regulated enterprise, and how Grip helped them regain control in a fast-moving, SaaS-first environment. The post 5 Identity Security Risks We Found in a Regulated Enterprise appeared first ...

Stay Relaxed with Efficient Non-Human Identity Security

Are You Safe With Your Current Non-Human Identity Security? The migration of services to the cloud promises flexibility, scalability, and reduced operational costs. But how confident are you about the security of your data in the cloud? A pivotal ...

Building Trust Through Secure NHIs Practices

How Can We Cultivate Trust with Secure NHIs Practices? When we navigate in increased digital interconnection, establishing trust in cybersecurity practices becomes paramount. But how do we foster such trust? The answer lies in secure Non-Human ...

Cultivate Independent Secrets Management Protocols

Why is Independent Secrets Management Crucial for Cybersecurity? How crucial do you believe independent secrets management is to your organization’s cybersecurity strategy? I’ve seen firsthand how managing Non-Human Identities (NHIs) and ...

Continuous Improvement in NHIs Management

Can Continuous Improvement in NHIs Management Be the Key to Securing Your Operations? You’re no stranger to the importance of vigilant cybersecurity. But have you considered the role of Non-Human Identities (NHIs) and Secrets Security ...

Implementing a SCIM API for Your Application: A Comprehensive Guide

This article is part of SSOJet's technical series on identity protocols and standards. For more information on implementing SCIM with SSOJet's turnkey SSO integration solution, visit our documentation. The post Implementing a SCIM API for Your ...

BSidesLV24 – GroundFloor – A Quick Story Of Security Pitfalls With Exec Commands In Software Integrations

Author/Presenter: Lenin Alevski Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware

Google bundles multiple safeguards under a single Android toggle to protect high-risk users from advanced mobile malware implants. The post Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware appeared first on ...

SSOJet LLM-Friendly Documentation

Make SSOJet docs easy for ChatGPT, Claude, Copilot, and others. LLM-optimized formats now live—faster dev experience, better AI comprehension. The post SSOJet LLM-Friendly Documentation appeared first on Security Boulevard.

Hacking the Hardware Brains of Computers is the Ultimate Cyberattack

Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware proof-of-concept that infects at the hardware ...

Randall Munroe’s XKCD ‘Deposition’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Randall Munroe’s XKCD ‘Deposition’ appeared first on Security Boulevard.

MCP, OAuth 2.1, PKCE, and the Future of AI Authorization

6 min readThe MCP authorization spec sets a new standard for securing non-human AI agents – with lessons for anyone building autonomous, scalable systems. The post MCP, OAuth 2.1, PKCE, and the Future of AI Authorization appeared first on ...

Logging AI before it happens – FireTail Blog

May 14, 2025 - Jeremy Snyder - Did you know that some AI chatbots capture your text before you submit it?At FireTail, we've been working on helping customers understand the AI usage that's happening inside their organization. As a noted ...

Google strengthens secure enterprise access from BYOD Android devices

Google has introduced Device Trust from Android Enterprise, a new solution for making sure that private Android devices used for work are secure enough to access corporate resources and data. Device Trust from Android Enterprise (Source: Google) ...

As US CVE Database Fumbles, EU ‘Replacement’ Goes Live

Diesen Kuß der ganzen Welt! European Union Vulnerability Database (EUVD) launches this week. And not a moment too soon. The post As US CVE Database Fumbles, EU ‘Replacement’ Goes Live appeared first on Security Boulevard.

Patch Tuesday Update – May 2025

In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 83 CVEs, including 5 republished CVEs. Overall, Microsoft announced 5 Zero-Day, 11 Critical, and 66 Important vulnerabilities. From an Impact perspective, ...

BSidesLV24 – GroundFloor – Nothing Went to Plan….. Because You Didn’t Have a Plan

Author/Presenter: 0DDJ0BB Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via ...