Application Security News and Articles


Are we headed for an AI culture war?

In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and how ...

Cybersecurity jobs available right now: September 9, 2025

Analyst, Cybersecurity DFIR ICE | Singapore | On-site – View job details As an Analyst, Cybersecurity DFIR, you will review and triage user-reported emails to identify phishing, malware, and other threats, taking containment ...

npm Chalk and Debug Packages Hit in Software Supply Chain Attack

The recent compromise of widely used npm packages chalk, debug, and more than a dozen others reveals that even the most trusted open source projects are not immune to compromise. The post npm Chalk and Debug Packages Hit in Software Supply Chain ...

Best practices for securing secrets in staging environments

Discover the most common secrets management mistakes in non-prod environments and how to fix them using scoped tokens, runtime injection, and tools like Doppler. The post Best practices for securing secrets in staging environments appeared first ...

Understanding the EU Corporate Sustainability Due Diligence Directive (CSDDD): Why It Matters and How to Prepare

Key Takeaways For years, European companies have faced a patchwork of national laws pushing them to take responsibility for human rights and environmental issues tied to their business operations. France passed its Duty of Vigilance law in 2017. ...

Confidence in Cloud Security with Advanced NHIs

Why Advanced NHIs Enhance Confidence in Cloud Security? With the increasing digitalization across different industries, such as financial services, healthcare, and travel, cybersecurity has become a topic of paramount importance. For ...

Powerful Strategies for Non-Human Identity Protection

Why is Effective NHI Protection Essential? Data security has emerged as a paramount concern. Organizations are increasingly relying on machine identities, also known as Non-Human Identities (NHIs), to ensure secure digital operations. However, ...

Relax with Secure and Managed Non-Human Identities

Are you Fully Leveraging Non-Human Identities for a Relaxing Security Management Experience? Non-human identities (NHIs), an integral component, are rapidly becoming a necessity for organizations operating in the cloud. When integrated with a ...

Drive Innovation in Cybersecurity with Smart NHIs

How Can We Drive Innovation in Cybersecurity with Smart NHIs? Organizations need to invest in innovative cybersecurity strategies in order to stay one step ahead. One such novel approach is the effective management of Non-Human Identities (NHIs) ...

60% falham. Você é um deles?

O que o FireMon Insights revela sobre o risco da política de firewall e como corrigi-lo O gerenciamento de firewall é o herói não celebrado (ou vilão oculto) da segurança... The post 60% falham. Você é um deles? appeared first on Security ...

NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages

A sophisticated npm supply chain attack compromised popular packages The post NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages appeared first on Security Boulevard.

BSidesSF 2025: Navigating the Unknowns: Fraud Mitigation For Netflix Live Events

Creator, Author and Presenter: Aditi Gupta, Yue Wang Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

Scaling Preventive Tech: From Startup Prototype to Enterprise-Grade Wellness Platform

Preventive tech isn’t about counting steps anymore. It’s about who owns the future of human performance. The difference between a scrappy prototype and an enterprise-grade...Read More The post Scaling Preventive Tech: From Startup Prototype ...

Randall Munroe’s XKCD ‘Cesium’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Cesium’ appeared first on Security Boulevard.

SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?

In cybersecurity, trust often hinges on what users think their software is doing — versus what’s actually happening under the hood. Related: Eddy Willem’s ‘Borrowed Brains’ findings Take antivirus, for example. Many users assume threat ...

Chinese Group Accused of Using Fake U.S. Rep. Email to Spy on Trade Talks

The Chinese state-sponsored group APT41 is accused of using a fake email impersonating a U.S. representative containing spyware and sent to government agencies, trade groups, and laws firms to gain information about U.S. strategy in trade talks ...

UltraViolet Cyber Acquires Application Security Testing Service from Black Duck

UltraViolet Cyber has acquired the application security testing services arm of Black Duck Software as part of an effort to expand the scope of the managed security services it provides. Company CEO Ira Goldstein said this addition to its ...

Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 

China’s APT41 sent out malicious emails on behalf of Rep. John Moolenaar to collect information ahead of US-China trade talks. The post Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report  appeared first on ...

BSidesSF 2025: Sharing Vulnerabilities

Creator, Author and Presenter: Clint Gibler Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Tech Debt: Why Fixing the Foundation Comes Before Building the Castle

42% of developer time goes to fixing tech debt instead of building features. Knight Capital lost $460M in one day due to unaddressed code issues. Here's why smart companies fix P0/P1 problems first, and the framework that helped me scale startups ...