Application Security News and Articles


Thales Named a Leader in the Data Security Posture Management Market 

Thales Named a Leader in the Data Security Posture Management Market  madhav Thu, 09/25/2025 - 06:15 Most breaches begin with the same blind spot: organizations don’t know precisely what data they hold, or how exposed it is. Value and risk ...

Predicting DDoS attacks: How deep learning could give defenders an early warning

Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on detecting these attacks once they are underway. New research suggests that predicting DDoS ...

$439 million recovered in global financial crime crackdown

Authorities around the world have recovered $439 million from criminals following a months-long operation led by INTERPOL. The effort, called HAECHI VI, ran from April through August 2025 and involved police in 40 countries and territories ...

The fight to lock down drones and their supply chains

Drones have already shown their impact in military operations, and their influence is spreading across the agricultural and industrial sectors. Given their technological capabilities, we need to be aware of the risks they bring. Drones as a new ...

New framework sets baseline for SaaS security controls

Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own settings, permissions, and logs, and most third-party risk processes only look at the vendor’s overall security, not the app ...

GenAI is exposing sensitive data at scale

Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and risky sharing practices are creating serious problems for security teams. The findings show how generative AI ...

AI is rewriting the rules of cyber defense

Enterprise security teams are underprepared to detect new, adaptive AI-powered threats. The study, published by Lenovo, surveyed 600 IT leaders across major markets and shows widespread concern about external and internal risks, along with low ...

Why machine identity sprawl is now a DevSecOps problem

Machine identity sprawl is outpacing human accounts 80:1, creating hidden DevSecOps risks. Learn how unmanaged service accounts, keys, and secrets increase breach exposure and how to stop it. The post Why machine identity sprawl is now a ...

Chinese Hackers Breach U.S. Firms as Trade Tensions Rise

A Coordinated Breach Comes to Light CNN reported that Chinese state-linked hackers infiltrated several U.S. legal and technology firms in a campaign that stretched for months, if not longer. According to U.S. officials, the attackers gained ...

Justified Investments in Cloud Security Technologies

What Makes Non-Human Identities Essential for Cloud Security? How do you safeguard your digital assets when every machine identity in your organization is like a tourist visiting a foreign land? Machine identities, often termed Non-Human ...

Chinese Hackers Steal Data from U.S. Legal, Tech Firms for More Than a Year

Google threat researchers have found that the China-nexus threat group UNC5221 has been hacking into the networks and systems of U.S. legal firms and tech companies, at times spending more than a year inside compromised appliances to steal ...

How to Ensure Your IDP Gets Launched: A Guide to Platform Success

Most organizations launching an internal developer platform (IDP) initiative want transformation: faster releases, happier devs, and tighter governance. Still, too many projects stall or fail. This actionable playbook, drawn from real platform ...

DEF CON 33: Hacker Hangout

Creators, Authors and Presenters: Kari, DT, Silk Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las ...

Cloud firewalls get a (welcome) overhaul

Cloud firewalls are usually just a cluster of virtual machines running security software in a data center somewhere. So while they operate “in the cloud”, they don’t really take advantage of the additional cloud advantages like complex ...

Cyber Risk Isn’t a Backlog Problem. It’s a Parallel Processing Problem.

After nearly a decade of working with Fortune 500 CISOs, I’ve learned two universal truths: Everyone has too many vulnerabilities. Nobody has enough Advil. The vulnerability backlog is like laundry. No matter how many loads you run, it just ...

What is the SaaS Security Capability Framework (SSCF)?

Explore the SaaS Security Capability Framework (SSCF): what it is, the six domains, and how CISOs can operationalize app-level controls across the SaaS estate. The post What is the SaaS Security Capability Framework (SSCF)? appeared first on ...

EDR Is the Foundation — Morpheus Builds Autonomy on Top of It

Rich telemetry is only useful if it leads to action. Morpheus makes your EDR and XDR tools truly operational. The post EDR Is the Foundation — Morpheus Builds Autonomy on Top of It appeared first on D3 Security. The post EDR Is the Foundation ...

Randall Munroe’s XKCD ‘’Dimensional Lumber Tape Measure”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Dimensional Lumber Tape Measure” appeared first on Security Boulevard.

Response to CISA Advisory (AA25-266A): CISA Shares Lessons Learned from an Incident Response Engagement

AttackIQ has released two new assessment templates in response to the CISA Advisory (AA25-266A) published on September 23, 2025. The CSA highlights the lessons learned from an incident response engagement CISA conducted at a U.S. federal civilian ...

Mission Velocity, Mission Assurance: Why Federal Software Security Demands Both

Federal missions are moving faster than ever, and the demand for speed is matched only by the need for greater trust. From implementing zero-trust mandates to deploying AI-powered systems, today's agencies are expected to deliver software that ...