Application Security News and Articles


Managing Users without Tokens in Passwordless Systems

Explore user management strategies in passwordless authentication systems that don't rely on tokens. Learn about biometric authentication, device binding, and more. The post Managing Users without Tokens in Passwordless Systems appeared first on ...

Adapting to New Age Cyber Threats with NHIs?

Are Traditional Security Measures Enough? The advent of intelligent non-human identities (NHIs) has shifted cybersecurity, posing new challenges for organizations to overcome. Are traditional security measures, designed to protect human ...

Feeling Assured with Your Secrets Scanning Tools?

Are your secrets scanning tools instilling confidence? Securing Non-Human Identities: A Vital Component of Cybersecurity Are your secrets scanning tools providing the assurance you need? With data protection becomes an ever-increasing concern, ...

Staying Calm with Effective Secrets Rotation?

Why Is Secrets Rotation Essential for a Calm Security Strategy? What if we told you that your company’s data security could be significantly improved by adopting a simple practice? Known as secrets rotation, this strategy has proven to be an ...

BSidesSF 2025: How To Tame Your Dragon: Productionizing Agentic Apps Reliably And Securely

Creator, Author and Presenter: Thomas Vissers, Tim Van hamme Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

Scraping At Carrier Scale: Why Mobile IPs Outperform Datacenter IPs

Learn why mobile IPs outperform datacenter IPs for large-scale scraping, reducing bans and boosting success with natural traffic patterns. The post Scraping At Carrier Scale: Why Mobile IPs Outperform Datacenter IPs appeared first on Security ...

What is OTP Authentication? A Simple Guide

Introduction Let’s be honest — passwords are kind of a pain. We’re told to create long, complicated ones with numbers, […] The post What is OTP Authentication? A Simple Guide appeared first on Security Boulevard.

Looking for the Best VMDR and Pentesting Tool? The Breakthrough

Let’s come straight to the point! Kratikal gives you AutoSecT. Your security is the main driving point that made it possible to build the world’s leading VMDR and pentesting platform, powered by AI. Do you know what’s more interesting? Your ...

What is MCP Security?

Large language models (LLMs) aren’t just answering questions anymore. They’re booking travel, crunching data, and even pulling the levers of other software on your behalf. At the center of it is a standard with big implications: MCP — the ...

Automated Incident Response: Everything You Need to Know

Learn how security automation streamlines incident response processes for faster response times and maximum efficiency. The post Automated Incident Response: Everything You Need to Know appeared first on AI Security Automation. The post Automated ...

Debunking Myths and Best Practices for MitM Protection in Mobile Apps

To protect against Man-in-the-Middle (MitM) attacks in mobile, you need robust end-to-end security that includes certificate pinning as part of a broader solution which eliminates on-device threats and allows fast and easy pin rotation. See this ...

Are High-Privilege NHIs Properly Protected?

Do High-Privilege NHIs Receive Adequate Protection? Without robust Non-Human Identity (NHI) management, a company’s cybersecurity measures might fall short. But what exactly does NHI protection entail, and are high-privilege NHIs correctly ...

Scaling Your Secrets Management Effectively

Is your organization’s secrets management scalable? With businesses increasingly migrate to cloud-based architectures, the focus on cybersecurity sharpens. One facet of this is the management of Non-Human Identities (NHIs) and secrets, which ...

Relieved by Advanced Secrets Vaulting Techniques?

Are You Experiencing Relief with Advanced Secrets Vaulting Techniques? Are you seeking relief from the constant worry of ensuring your organization’s data safety? Are advanced secrets vaulting techniques providing the comprehensive protection ...

BSidesSF 2025: Versus Killnet

Creator, Author and Presenter: Alex Holden Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

What is Single Sign-On (SSO)

What is Single Sign-On (SSO) richard-r.stew… Fri, 08/22/2025 - 16:53 Single Sign-On (SSO) [GO1] is an authentication model in which a user logs in once with a set of credentials to gain access to multiple applications. It forms a key part ...

20-year-old Scattered Spider Member Sentenced to 10 Years in Prison

Noah Michael Urban, a 20-year-old Florida man, was sentenced for his role as a member of the notorious Scattered Spider threat group in a series of phishing and other scams between 2022 and 2023 in which they got victims' credentials and used ...

Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects

Dubbed Operation Serengeti 2.0, the operation took place between June and August. The post Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects appeared first on SecurityWeek.

BSidesSF 2025: Welcome To Day Two Of BSidesSF 2025!

Creator, Author and Presenter: Reed Loden Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

China-linked Murky Panda targets and moves laterally through cloud services

In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions. A good chunk of this surge is due to “China-nexus adversaries”, Murky Panda (aka Silk Typhoon) among ...