Application Security News and Articles


BSidesSF 2025: Blank Space: Filling The Gaps In Atomic And Behavioral Cloud-Specific IoCs

Creator, Author and Presenter: Merav Bar, Gili Tikochinski Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack

Flaw allows attackers to reset and hijack TP-Link TL-WA855RE devices; CISA urges users to retire discontinued extenders. The post US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack appeared first on SecurityWeek.

How Kingman USD Secures Google Workspace on a K-12 Budget with Cloud Monitor

Arizona district gains real-time threat visibility and protects student data while within budget by partnering with ManagedMethods Claire Sexton, Cybersecurity Administrator for Kingman Unified School District located in Kingman, Arizona, ...

Survey Surfaces Raft of WordPress Cybersecurity Concerns

A survey of 264 professionals that maintain websites based on the WordPress content management system (CMS) finds 96% have been impacted by at least one security incident/event, with just under two-thirds of those respondents (64%) having ...

Goldilocks: An Open Source Tool for Recommending Resource Requests

One of the questions that I get most frequently from our clients at Fairwinds is “How do we know what to set our resource requests and limits to?” Goldilocks is an open source Kubernetes controller developed by Fairwinds that provides a ...

Soar is your Safest Bet

It’s the middle of the week, you are working on a project that needs to be done, and while you are trying to focus, you get the same phishing alert for the 10th time this week. Your team is drowning in noise, and you’re looking around ...

When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook

What do a pharma firm, a hospital service provider, and your smart doorbell have in common? They were all targets in cyberattacks last month. Here’s the August end-of-month threat rundown from the ColorTokens Threat Advisory Team, a peek into ...

Randall Munroe’s XKCD ‘Archaeology Research’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Archaeology Research’ appeared first on Security Boulevard.

Salesloft Drift Breach: 7 Steps to Protect Your Organization

The Salesloft Drift breach is expanding fast. Learn what’s at risk and the 7 critical steps security teams should take to protect their SaaS ecosystem. The post Salesloft Drift Breach: 7 Steps to Protect Your Organization appeared first on ...

BSidesSF 2025: The Four Tribes Of Security Champions

Creator, Author and Presenter: Marisa Fagan Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

When Google Says “Scan for Secrets”: A Complete Guide to Finding Hidden Credentials in Salesforce

The Salesloft Drift breach affected hundreds of organizations through Salesforce, including Cloudflare, Palo Alto Networks, and Zscaler. Google now explicitly recommends running secrets scanning tools across Salesforce data—here's your complete ...

From Models to Missions: Applying the AI RMF to Federal Software Supply Chains

Federal agencies are quickly adopting artificial intelligence (AI) to make more informed decisions faster. And it's boosting productivity in all kinds of ways, from automating citizen services to accelerating vulnerability response. It's not an ...

Google Patches High-Severity Chrome Vulnerability in Latest Update

Chrome's latest release addresses a high-severity use-after-free vulnerability in the V8 JavaScript engine that could be exploited for remote code execution. The post Google Patches High-Severity Chrome Vulnerability in Latest Update appeared ...

Nucleus Insights turns CVE noise into an explainable threat signal

Nucleus Security introduced Nucleus Insights, AI-powered threat intelligence built to solve one of the most painful problems in vulnerability management: knowing which CVEs matter and why. Unlike traditional threat intelligence feeds made for ...

Everfox HSV-T protects data transfer between classified and unclassified networks

Everfox launched High Speed Verifier-Turnkey (HSV-T). This hardware-enforced secure data transfer solution enhances digital collaboration and interoperability between allied nations, safeguarding mission-critical data transfers from high threat ...

Veeam Software Appliance boosts data protection

Veeam Software announced its fully pre-built, pre-harden ed software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, ...

Cato Networks Acquires AI Security Firm Aim Security

Founded in 2022 to help organizations with the secure deployment of generative-AI utilities, Aim emerged from stealth in January 2024. The post Cato Networks Acquires AI Security Firm Aim Security appeared first on SecurityWeek.

Data masking and data governance: Ensuring data integrity

Safeguarding data is a fundamental function of data governance—and that extends to the data used by developers. But how do you maintain test data utility when masking sensitive information? The post Data masking and data governance: Ensuring ...

Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise

Cloudflare has also been affected by the Salesloft Drift breach, the US web infrastructure and security company confirmed on Tuesday, and the attackers got their hands on 104 Cloudflare API tokens. “We have identified no suspicious activity ...

Synack + Tenable: AI-Powered Partnership Translates Vulnerability Insights into Action

The combined Synack/Tenable solution reduces alert noise for overloaded security teams, isolating the most exploitable threats so they can proactively close security gaps faster. Vulnerability Assessment