Application Security News and Articles


Secrets Management That Fits Your Budget

Is Your Secrets Management Strategy Straining Your Budget? Organizations are on the lookout for budget-friendly secrets management solutions that provide robust security without causing financial strain. I believe that a comprehensive Non-Human ...

NHIs Solutions Tailored to Handle Your Needs

Why is the Strategic Management of NHIs Essential? How do we ensure that our cybersecurity measures keep pace? Non-Human Identities (NHIs) present a unique challenge, as they require a different approach to securing their secrets. This task can ...

Stay Ahead with Proactive Non-Human Identity Management

How Does Proactive Non-Human Identity Management Keep You Ahead? Cybersecurity, for years, has been placing humans at the center of the identity universe. But have you considered the indispensable role of Non-Human Identities (NHIs) in your ...

Feel Supported by Advanced IAM Strategies

Are You Maximizing the Potential of Your IAM Strategies? Effective data management requires a nuanced understanding of advanced Identity and Access Management (IAM) strategies. Where cyber threats are evolving at a rapid pace, an organization’s ...

Patch Tuesday: Microsoft fixes 5 actively exploited zero-days

On May 2025 Patch Tuesday, Microsoft has released security fixes for 70+ vulnerabilities, among them five actively exploited zero-days and two publicly disclosed (but not exploited) vulnerabilities. The zero-days and the publicly disclosed flaws ...

Adobe Patches Big Batch of Critical-Severity Software Flaws

Adobe Patch Tuesday headlined by a major Adobe ColdFusion update patching a wide swatch of code execution and privilege escalation attacks. The post Adobe Patches Big Batch of Critical-Severity Software Flaws appeared first on SecurityWeek.

Microsoft to Lay Off About 3% of Its Workforce

The tech giant didn’t disclose the total amount of lost jobs but it will amount to about 6,000 people. The post Microsoft to Lay Off About 3% of Its Workforce appeared first on SecurityWeek.

Deepfake 101: Understanding Digital Deception in Today’s World

As AI makes perfect digital impersonations increasingly accessible, distinguishing reality from fiction becomes harder. This guide breaks down deepfake technology in simple terms and provides practical protection strategies anyone can ...

Microsoft’s May 2025 Patch Tuesday Addresses 71 CVEs (CVE-2025-32701, CVE-2025-32706, CVE-2025-30400)

5Critical 66Important 0Moderate 0Low Microsoft addresses 71 CVEs including seven zero-days, five of which were exploited in the wild. Microsoft patched 71 CVEs in its May 2025 Patch Tuesday release, with five rated critical and 66 rated as ...

BSidesLV24 – GroundFloor – Pipeline Pandemonium: How To Hijack The Cloud And Make It Rain Insecurity

Author/Presenter: Blake Hudson Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)

Fortinet has patched a critical vulnerability (CVE-2025-32756) that has been exploited in the wild to compromise FortiVoice phone / conferencing systems, the company’s product security incident response team has revealed on Tuesday. About ...

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday

Patch Tuesday: Microsoft patches at least 70 security bugs and flagged five zero-days in the “exploitation detected” category. The post Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday appeared first on SecurityWeek.

Network Security Policy Management (NSPM) in 2025

The recent failure of Skybox has left many companies without a supported NSPM solution. As a result, many of these previous Skybox customers have taken this opportunity to reevaluate their... The post Network Security Policy Management (NSPM) in ...

The Security Gap JPMorgan Chase’s CISO Didn’t Mention — And Why It’s in Your Browser

The Security Gap JPMorgan Chase’s CISO Didn’t Mention — And Why It’s in Your Browser When the CISO of JPMorgan Chase issues a public letter to all technology vendors, the industry pays attention — and rightfully so. In his open ...

How to safely change your name without putting your identity at risk

Changing your name—whether due to marriage, divorce, or personal choice—is a significant life event. However, this process involves sharing sensitive personal information across various platforms, making it a potential target for identity ...

Unified Account Defense: How AI-Powered Layers Stop Bots and Human Fraud—Faster

From login abuse to in-session fraud, DataDome’s unified account protection layers stop both bots and human attackers in real time—without disrupting legitimate users. The post Unified Account Defense: How AI-Powered Layers Stop Bots and ...

Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)

Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a “very limited” number of customers, Ivanti has confirmed on Tuesday, and urged customers to ...

Randall Munroe’s XKCD ‘Pascal’s Law’

via the inimitable Daniel Stori at Turnoff.US! Permalink The post Randall Munroe’s XKCD ‘Pascal’s Law’ appeared first on Security Boulevard.

BSidesLV24 – GroundFloor – Detection Engineering Demystified: Building Custom Detections For GitHub Enterprise

Author/Presenter: David French Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Scripting Outside the Box: API Client Security Risks (1/2)

Discover hidden risks in API testing tools like Postman and Insomnia. We dive into scripting vulnerabilities and explore JavaScript sandbox security pitfalls. The post Scripting Outside the Box: API Client Security Risks (1/2) appeared first on ...