Application Security News and Articles


Samsung Patches Zero-Day Exploited Against Android Users

Reported by Meta and WhatsApp, the vulnerability leads to remote code execution and was likely exploited by a spyware vendor. The post Samsung Patches Zero-Day Exploited Against Android Users appeared first on SecurityWeek.

Hacker Deceives 18,000 Script Kiddies with Fake Malware Builder

A threat actor targeted low-skilled hackers, known as ‘script kiddies’ with a fake malware builder that secretly infected them with a backdoor to st The post Hacker Deceives 18,000 Script Kiddies with Fake Malware Builder appeared first on ...

Implementing Single Sign-on Solutions

Learn how to implement single sign-on (SSO) solutions for your enterprise. This guide covers SSO protocols, security best practices, and choosing the right SSO provider. The post Implementing Single Sign-on Solutions appeared first on Security ...

An Overview of Passwordless Authentication

Explore passwordless authentication methods, benefits, and implementation strategies. Learn how to enhance security and user experience by eliminating passwords. The post An Overview of Passwordless Authentication appeared first on Security ...

New Research Reveals One-Third of Cloud Assets Harbor Easily Exploitable Vulnerabilities

Analysis of nearly five million internet-exposed assets shows significant security gaps across major cloud platforms, with Google Cloud-hosted assets showing highest vulnerability rates.    The post New Research Reveals One-Third of Cloud ...

Most enterprise AI use is invisible to security teams

Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data privacy, compliance, and governance. This blind spot is ...

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to store and index network traffic in standard PCAP format, making it easy to search and access. The solution includes ...

What could a secure 6G network look like?

The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised and make sure to build it ...

Why neglected assets are the hidden threat attackers love to find

In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned ...

Static feeds leave intelligence teams reacting to irrelevant or late data

Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need to be taken. A new report from Flashpoint argues that most current ...

Relax With Advanced Non-Human Identity Protections

Are Your Cloud Operations Truly Secure? Let’s face it: Companies are leveraging diverse technologies to stay competitive and efficient. Essentially, many operations are migrating to the cloud to facilitate seamless business processes. But as we ...

Achieve Independence in NHI and Secrets Management

Why should NHI and Secrets Management Matter to Businesses? How often do businesses rethink their cybersecurity strategy to ensure it is all-inclusive and fool-proof? A comprehensive data protection plan cannot overlook the need for Non-Human ...

The Best testing tools for Node.js

Discover the 15 best Node.js testing tools to ensure code reliability. This practical list covers top frameworks, their benefits, and use cases for robust testing. The post The Best testing tools for Node.js appeared first on Security Boulevard.

DEF CON 33: AIxCC 42 Beyond Bugs

Creators, Authors and Presenters: Silk Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas ...

Top 20 Programmers & Developers to Follow on Twitter for Coding Tips in 2025

Follow the top 20 programmers on Twitter for 2025! Get actionable coding tips, industry insights, and stay ahead on tech trends from leading developers. The post Top 20 Programmers & Developers to Follow on Twitter for Coding Tips in 2025 ...

Cyber Privateers: The Return of the Hack-Back Debate

Is the second Trump administration open to private-sector companies — or non-military or other government agencies — using offensive security against cyber threats? The post Cyber Privateers: The Return of the Hack-Back Debate appeared first ...

Week in review: Salesloft Drift breach investigation results, malicious GitHub Desktop installers

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Salesloft Drift data breach: Investigation reveals how attackers got in The attack that resulted in the Salesloft Drift data breach started with ...

Stay Ahead: Innovation in Secrets Scanning and Management

Why is the Holistic Approach to Secrets Scanning and Management Crucial? Where data breaches and cyber-attacks are increasingly common, one solution to stay ahead is through innovation in secrets scanning and management. But, what if the secrets ...

Enhance Responsiveness With Efficient NHI Strategies

How Can Efficient NHI Strategies Boost Your Security Responsiveness? Security is a multifaceted and complex issue. A security gap many organizations often overlook is the management of Non-Human Identities (NHIs) and their corresponding secrets. ...

Attorney Generals go after Bitcoin ATMs for supporting Fraud

On 08SEP2025, the District of Columbia's Attorney General filed a lawsuit against Athena, a "Bitcoin ATM machine" provider with 4100+ BTMs installed. Athena charges as much as a 26% fee when someone deposits cash to buy cryptocurrency. More ...