Application Security News and Articles


Detecting danger: EASM in the modern security stack

In today’s complex threat environment, the challenge for security professionals isn’t just defeating threats – it’s finding your vulnerabilities in the first place. That’s where External Attack Surface Management (EASM) tools come in. ...

Five habits of highly secure development teams

In this Help Net Security video, Brendon Collins, Principal Consultant at Optiv, explores how organizations can embed security and privacy into the software development lifecycle (SDLC) from the very start. He outlines five proactive principles, ...

AI will drive purchases this year, but not without questions

AI is moving into security operations, but CISOs are approaching it with a mix of optimism and realism. A new report from Arctic Wolf shows that most organizations are exploring or adopting AI-driven tools, yet many still see risks that need ...

10 Ways to Optimize Data Center Operations

Running a data center efficiently is no small feat. From managing energy costs to preventing downtime, there’s a lot that can go wrong—and a lot that can be optimized. Discover 10 actionable strategies to enhance your data center operations, ...

12 Questions to Ask a Zero Trust Solution Provider 

Implementing Zero Trust is no longer optional. It’s a strategic imperative. But with a flood of solutions and vendors all claiming to be the answer, navigating your options can be overwhelming. Whether you’re just starting your evaluation or ...

Grade School Crypto Videos

This is a short, gentle two-part introduction to basic cryptographic concepts using text-based crypto examples. The videos illustrate encryption, decryption, ciphers, keys, algorithms, code cracking, cryptanalysis, and letter frequency ...

Missed jury duty? Scammers hope you think so

  The post Missed jury duty? Scammers hope you think so appeared first on Security Boulevard.

Beyond Chatbots: Why Morpheus Leaves SOAR with Bolted-On AI in the Dust

Bolting a chatbot onto a legacy SOAR tool doesn’t make it intelligent. Here’s what real autonomous security operations look like — and why they matter. The post Beyond Chatbots: Why Morpheus Leaves SOAR with Bolted-On AI in the Dust ...

Smart Approaches to Non-Human Identity Detection

Are We Fully Leveraging the Power of NHI and Secrets Management? Many organizations are waking up to the potential of Non-Human Identity (NHI) management to reinforce their cybersecurity strategies. They are recognizing the potential of NHI – a ...

Secrets Management that Fits Your Budget

Is Comprehensive Protection for Your Digital Assets Achievable on a Budget? One aspect that often goes overlooked is the management of Non-Human Identities (NHIs) and secrets. NHI and secrets management, with its focus on the lifecycle of machine ...

Stay Ahead with Proactive Secrets Security

Why Is Proactive Secrets Security Paramount in Today’s Business Landscape? With cybersecurity threats continuously evolving and becoming more sophisticated, companies are faced with the complex task of managing Non-Human Identities (NHIs) and ...

TDL 002 | Defending the DNS: How Quad9 Protects the Internet with John Todd

Summary The Defender’s Log episode features John Todd from Quad9, discussing their mission to protect the internet through secure DNS. Quad9, a non-profit launched in 2017 with founding partners Global Cyber Alliance, Packet Clearing House, and ...

A Q&A with Cybersecurity Specialist at Bayside

The post A Q&A with Cybersecurity Specialist at Bayside appeared first on AI Security Automation. The post A Q&A with Cybersecurity Specialist at Bayside appeared first on Security Boulevard.

BSidesSF 2025: Centralizing Egress Access Controls Across A Hybrid Environment At Block

Creator, Author and Presenter: Ramesh Ramani Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Gitblit Authentication Bypass Vulnerability (CVE-2024-28080)

Overview Recently, NSFOCUS CERT detected that Gitblit issued a security announcement and fixed the Gitblit authentication bypass vulnerability (CVE-2024-28080); Because Gitblit’s SSH service has defects in the public key authentication process, ...

Stop Panicking: The FIDO ‘Bypass’ That Never Actually Bypassed FIDO

The cybersecurity world exploded in August 2025 when SquareX dropped a bombshell at Black Hat USA: passkeys were “pwned.” Headlines screamed. Twitter erupted. CTOs panicked. But here’s what actually happened: absolutely nothing changed ...

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers

Tracked as CVE-2025-57819 (CVSS score of 10/10), the bug is described as an insufficient sanitization of user-supplied data. The post Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers appeared first on SecurityWeek.

Trusted Cloud Edge in Practice: Transforming Critical Industries

Part 3: Stealth Networking in Action – Real-World Deployment Scenarios Editor’s Note: In Part Two of this series, we explored why tunnel-free architectures are the foundation of the Trusted Cloud Edge. Now it’s time to move from theory to ...

Automatic Secrets Redaction at Runtime: Building a GitGuardian Lambda Extension

I'm going to show you how to build a Lambda Runtime API extension that automatically scans and redacts sensitive information from your function responses, without touching a single line of your existing function code. The post Automatic Secrets ...

Google Hack Redux: Should 2.5B Gmail Users PANIC Now?

Summer’s lease hath all too short a date: Let’s ask Ian Betteridge. The post Google Hack Redux: Should 2.5B Gmail Users PANIC Now? appeared first on Security Boulevard.