Application Security News and Articles


URL-based threats become a go-to tactic for cybercriminals

Cybercriminals are using advanced social engineering and AI-generated content to make malicious URLs difficult for users to identify, according to Proofpoint. Whether through email, text messages, or collaboration apps, URL-based threats now ...

CISOs need to think about risks before rushing into AI

Organizations are increasing investments in cloud, AI, and emerging technologies, but their infrastructure and security strategies often lag behind. A recent Unisys survey of 1,000 senior executives shows that business and IT leaders are not ...

Understanding cybersecurity at multiple levels: A Capital One analysis

The Capital One data breach exposed 106M records due to multiple security failures. Learn how a layered cybersecurity approach could have prevented it. The post Understanding cybersecurity at multiple levels: A Capital One analysis appeared first ...

The End of Tribal Knowledge: Why Contextual Policy Is the Foundation for Agentic AI Development

For years, the challenge in software security and governance hasn't been knowing what to do, but instead scaling that knowledge across fast-moving teams. At Sonatype, we invested heavily in solving that through contextual policy. Not just rules, ...

Secrets Management Solutions That Fit Your Budget

Are You Seeking a Budget-Friendly Approach to Secrets Management? One area that often perplexes businesses is the management of Non-Human Identities (NHIs) and their secrets. This crucial aspect of cybersecurity requires strategic focus, however, ...

Empower Your SOC Team with Enhanced NHI Management

Could You Revolutionize Your Cybersecurity Strategy with NHI Management? Raising the bar in cybersecurity defense has become a critical concern for organizations operating. One area that has gained traction in this regard is Non-Human Identities ...

AI To Handle 60% of SOC Work By 2028. It Had Better Be Robust.

If you’re trying to separate real AI-SOC capability from hype, you’ll love this: we’re making the 2025 AI SOC Market Landscape report available as a download. Produced by Software Analyst Cyber Research (SACR), it’s the most comprehensive ...

Life in the Swimlane with Ryan Knauer, Principal Site Reliability Engineer

The post Life in the Swimlane with Ryan Knauer, Principal Site Reliability Engineer appeared first on AI Security Automation. The post Life in the Swimlane with Ryan Knauer, Principal Site Reliability Engineer appeared first on Security Boulevard.

What is an AI Bill of Materials (AI BOM)?

Learn how to create and automate an AI BOM. The post What is an AI Bill of Materials (AI BOM)? appeared first on Security Boulevard.

Phishing in 2025: Smarter Threats, Smarter Defense

ManagedMethods recently hosted a webinar on one of the most pressing issues in K–12 cybersecurity: phishing. While schools have been targets for years, 2025 feels different. Attackers are evolving faster than ever, and traditional email ...

Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)

Apple has fixed yet another vulnerability (CVE-2025-43300) that has apparently been exploited as a zero-day “in an extremely sophisticated attack against specific targeted individuals.” About CVE-2025-43300 CVE-2025-43300 is an ...

Your Digital Shadow: Why Human-Powered Due Diligence Still Matters in the Age of Data Overload

There’s never been more data available about people and organizations. Yet, paradoxically, the overwhelming volume of that data can obscure the very truths security professionals are trying to uncover. In a landscape shaped by automation, AI, ...

BSidesSF 2025: How To Pull Off A Near Undetectable DDoS Attack (And How To Stop It)

Creator, Author and Presenter: Simon Wijckmans Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Alleged Rapper Bot DDoS botnet master arrested, charged

US federal prosecutors have charged a man with running Rapper Bot, a powerful botnet that was rented out to launch large-scale distributed denial-of-service (DDoS) attacks around the world. According to court documents, 22-year-old Ethan Foltz of ...

Futurum Signal is Live: Real-Time Intelligence for Cyber Defenders

In cybersecurity, timing is everything. Threats don’t wait for quarterly analyst updates, and adversaries don’t schedule their attacks to match publication calendars. We live in a world where zero-days drop overnight, AI-powered phishing ...

Randall Munroe’s XKCD ‘Snake-In-The-Box Problem’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Snake-In-The-Box Problem’ appeared first on Security Boulevard.

AuthZed Adds Cloud Edition of Infrastructure Authorization Platform

AuthZed today unfurled a self-service edition of its platform for managing infrastructure authorizations that can be deployed in a cloud computing environment. Company CEO Jake Moshenko said this AuthZed Cloud option will make it simpler for some ...

AuthZed Adds Self-Service Cloud for Infrastructure Authorization

AuthZed today unfurled a self-service edition of its platform for managing infrastructure authorizations that can be deployed in a cloud computing environment. Company CEO Jake Moshenko said this AuthZed Cloud option will make it simpler for some ...

Application Security in 2025: Why Scale, AI, and Automation Are Reshaping Priorities

New survey results shed light on the state of AppSec in 2025. The post Application Security in 2025: Why Scale, AI, and Automation Are Reshaping Priorities appeared first on Security Boulevard.

Signed, Sealed, and Delivered: The Case for Authenticating AI Agents

As agentic AI blends into malicious traffic, Authenticating AI Agents with cryptographic signatures is becoming the only scalable way to separate trusted bots from imposters. The post Signed, Sealed, and Delivered: The Case for Authenticating AI ...