Application Security News and Articles


Salt Typhoon: What Security Action Should Governments Take Now?

The FBI just announced that the Salt Typhoon cyber attacks against U.S. telecoms uncovered last year were much worse and more widespread than previously disclosed. What’s next? The post Salt Typhoon: What Security Action Should Governments Take ...

Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 300k+ Plex Media Server instances still vulnerable to attack via CVE-2025-34158 Over 300,000 internet-facing Plex Media Server instances are ...

Exciting Developments in Cloud-Native Security

Why are Cybersecurity Professionals Excited About Cloud-Native Advancements? Is it possible that the future of cybersecurity lies in the cloud? The answer, increasingly, is a resounding yes. Cloud-native advancements have ignited a spark in the ...

Building Trust with Robust NHIs Management

Why is Holistic NHI Management Indispensable for Robust Systems? Amidst the complex labyrinth of cybersecurity management, have you ever considered the strategic importance of NHIs and their implications on building a robust system? Non-Human ...

Phishing as a Service 2.0: The Franchise Model of Cybercrime

The Golden Arches of Malice When you think of franchising, you probably picture McDonald’s, Starbucks, or Subway — not cybercriminals. But the uncomfortable truth is that modern cybercrime looks a lot less like “lone hacker in a hoodie” ...

BSidesSF 2025: Future-Proof Your Career: Evolving In The Age Of AI

Creators, Authors and Presenters: Jay Sarwate, Alok Tongaonkar, Prutha Parikh, Ketan Nilangekar Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on ...

Anthropic Launches Claude: AI Chatbot for Higher Education

Discover Claude for Education, Anthropic’s AI assistant designed for universities, promoting critical thinking and enhancing academic operations. Learn mo The post Anthropic Launches Claude: AI Chatbot for Higher Education appeared first on ...

Enterprise-Ready Solutions for Physical Security

Discover enterprise-ready physical security solutions for device management, cybersecurity, and compliance. Learn how SSOJet enhances access and reduces costs. The post Enterprise-Ready Solutions for Physical Security appeared first on Security ...

The Role of AI in the IT Industry Cybersecurity

AI adoption is surging 53% of organizations expect full or mature AI deployment in security by 2025, up from 47% just a year earlier. The statement itself highlights the acceptance of AI in cybersecurity among organizations. If you are among the ...

Passwordless Authentication Explained

Explore passwordless authentication methods, benefits, and implementation strategies. Learn about biometrics, hardware tokens, and how to enhance security and user experience. The post Passwordless Authentication Explained appeared first on ...

FedRAMP Monthly ConMon vs Annual Assessments

We say this just about every time the subject comes up (which is often, given our industry and role in it), but valid information security is not a state of being. It is a moving target and a process. Achieving certification for a certain level ...

Feel Relieved with Advanced Secrets Scanning

Why are Secrets Scanning and NHI Management Crucial in Cybersecurity? With an escalating magnitude of security threats plaguing digital, have you ever pondered over the significance of secrets scanning and Non-Human Identities (NHIs) management ...

Building Adaptable Security in a Dynamic Cloud

How Crucial is Adaptable Security for Dynamic Cloud? Where organizations increasingly shift their operations to the Cloud, the need for robust cybersecurity measures intensifies. But is traditional cybersecurity sufficient for this constantly ...

BSidesSF 2025: Log In Through The Front Door: Automating Defense Against Credential Leaks

Creator, Author and Presenter: Barath Subramaniam Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Zero Trust and Data Privacy: Inseparable in 2025

The post <b>Zero Trust and Data Privacy: Inseparable in 2025</b> appeared first on Sovy. The post Zero Trust and Data Privacy: Inseparable in 2025 appeared first on Security Boulevard.

How AI Agents Are Creating a New Class of Identity Risk

5 min readAI agents require broad API access across multiple domains simultaneously—LLM providers, enterprise APIs, cloud services, and data stores—creating identity management complexity that traditional workload security never ...

How to Streamline Your Kubernetes Add-On Updates and Stay Secure

Kubernetes add-ons are the backbone of modern clusters, powering everything from ingress and networking to observability, security, and automation. Without them, clusters aren’t production-ready. But as organizations scale, maintaining these ...

Cutting Through AppSec Noise in the Age of GenAI

The way organizations think about application security is shifting—fast. OX Security Co-Founder and CEO Neatsun Ziv talks about why the old playbook of “scan, list, and hand over to developers” has run its course. Ziv explains how the flood ...

The Hidden Costs of Fragmented Security Infrastructure

Cybersecurity conversations often focus on the latest threats, breaches, or AI-powered responses. But beneath the surface of every high-profile attack lies a quieter, more persistent challenge: fragmentation. Disconnected security tools, siloed ...

Why OT Security Demands Context, Not Just Controls

Operational technology (OT) security is no longer a niche concern—it’s front and center in today’s cyber conversations. At Black Hat this year, OT had a real moment, signaling that protecting critical infrastructure has finally caught the ...