Application Security News and Articles


Tackling cybersecurity today: Your top challenge and strategy

Shadow IT used to be a fringe problem, a rogue Dropbox account here, a personal Gmail there. Now, it’s everywhere. One customer said it best: “We don’t have a Shadow IT problem. We are Shadow IT.” That stuck. It’s not malice. It’s ...

PDPL (UAE)

What is PDPL (UAE)? The Personal Data Protection Law (PDPL), formally known as Federal Decree-Law No. 45 of 2021 on the Protection of Personal Data, is the United Arab Emirates’ first comprehensive data protection framework. Commonly referred ...

PDPL (Saudi)

What is PDPL (Saudi)? The Personal Data Protection Law (PDPL) is Saudi Arabia’s first comprehensive privacy law, designed to protect the personal data of individuals and regulate how organizations handle it. First issued in 2021 and amended in ...

Farmers Insurance Data Breach Impacts Over 1 Million People

Farmers New World Life Insurance and Farmers Group have filed separate data breach notifications with state authorities.  The post Farmers Insurance Data Breach Impacts Over 1 Million People appeared first on SecurityWeek.

Why a new AI tool could change how we test insider threat defenses

Insider threats are among the hardest attacks to detect because they come from people who already have legitimate access. Security teams know the risk well, but they often lack the data needed to train systems that can spot subtle patterns of ...

U.K. Home Office Impersonation: A Protection Playbook for Sponser-Licensed Orgs

UK organizations with sponsor licenses are now targets in a credential-harvesting phishing campaign. This campaign impersonates the UK Home Office and mimics the Sponsor Management System (SMS) login to steal usernames and passwords. Once ...

AI-Powered DDoS: How Attackers Evolve and Defenders Fight Back

DDoS attacks were once crude instruments—digital sledgehammers that would flood a target with massive amounts of traffic until it crashed. While these brute-force assaults remain common, a new generation of attacks is emerging with surgical ...

Why satellite cybersecurity threats matter to everyone

Satellites play a huge role in our daily lives, supporting everything from global communications to navigation, business, and national security. As space becomes more crowded and commercial satellite use grows, these systems are facing new cyber ...

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux

Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them in cloud storage, on a remote server, on network-attached storage, or on your own computer. It doesn’t create a full image of ...

Deploying SonarQube on Kubernetes with Helm Charts

By using a Helm Chart to deploy SonarQube Server, teams can quickly provision a production-ready SonarQube Server instance with minimal configuration while adopting best practices for scalability, security, and maintainability. The post Deploying ...

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies

Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare. It’s essentially a walkthrough of offensive and defensive approaches to AI security. About the author John ...

Smart manufacturing demands workers with AI and cybersecurity skills

The manufacturing sector is entering a new phase of digital transformation. According to Rockwell Automation’s 10th Annual State of Smart Manufacturing Report, 56% of manufacturers are piloting smart manufacturing initiatives, 20% have deployed ...

Public Wi-Fi Myths: Why You’re Probably Safer Than You Think

Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably ...

Building a Smart Compliance Strategy in Cloud?

Is your Strategy for Cloud Compliance Intelligent Enough? One question prevails: is your compliance strategy smart enough to handle the complexities of the cloud environment? Understanding Non-Human Identities & Secret Management Before ...

Choosing the Right SAST Tool: A Practical Guide for Developers

Static Application Security Testing (SAST) is one of the earliest and most effective defenses in the DevSecOps lifecycle. By scanning…Continue reading on Medium »

BSidesSF 2025: The Growing Crisis In CVE Data Quality

Creator, Author and Presenter: Jerry Gamblin Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

U.S. Rep Proposes Cyber Privateers to Fight Foreign Cyberthreats

A GOP congressman from Arizona has filed legislation to allow U.S. presidents to license private cyber experts to investigate cyberattacks against U.S. organizations and citizens and recover stolen assets through a centuries-old tactic used in ...

Troubling Tech Career Trends: From ‘Quiet Cracking’ to AI Anxiety

Some new terms are becoming popular in tech and cybersecurity careers, along with some unsettling workplace trends around burnout and fear of layoffs as AI gains ground in both the public and private sectors. The post Troubling Tech Career ...

Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by millions are covertly connected AND insecure Three families of Android VPN apps, with a combined 700 million-plus ...

Privileged Access Management Software Solutions

Explore top Privileged Access Management (PAM) software solutions, their key features, implementation challenges, and integration with SSO & CIAM. A guide for CTOs & VP Engineering. The post Privileged Access Management Software Solutions ...