Application Security News and Articles


Hospitals are running out of excuses for weak cyber hygiene

Healthcare leaders continue to treat cybersecurity as a technical safeguard instead of a strategic business function, according to the 2025 US Healthcare Cyber Resilience Survey by EY. The study, based on responses from 100 healthcare executives, ...

New infosec products of the week: November 7, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1touch.io, Barracuda Networks, Bitdefender, Forescout, and Komodor. Bitdefender GravityZone Security Data Lake unifies telemetry from multiple tools ...

Elevating Customer Support with Smarter Access Solutions in an AI-Constrained World

Learn how unblocking AI tools enhances customer support speed, consistency, and reliability while maintaining strong security and compliance standards. The post Elevating Customer Support with Smarter Access Solutions in an AI-Constrained World ...

How Fast and Secure Customer Support Relies on Internet Privacy Tools

Discover how free VPNs enhance customer support speed, privacy, and trust by securing user connections and ensuring smooth, safe service interactions. The post How Fast and Secure Customer Support Relies on Internet Privacy Tools appeared first ...

JumpServer Connection Token Improper Authentication Vulnerability (CVE-2025-62712) Notice

Overview Recently, NSFOCUS CERT detected that JumpServer issued a security bulletin to fix the JumpServer connection token improper authentication vulnerability (CVE-2025-62712); Due to improper authentication of JumpServer’s ...

The public’s one account for government services

Explore the idea of a single, secure digital identity for accessing all government services. Learn about the technical challenges, security, and user experience considerations. The post The public’s one account for government services ...

What Are Passkeys and How Do They Work?

Discover passkeys, the next-generation authentication method replacing passwords. Learn how passkeys work, their security advantages, and how they're shaping software development. The post What Are Passkeys and How Do They Work? appeared first on ...

Closing the Zero Trust Loop: ZTNA + CDR

The post Closing the Zero Trust Loop: ZTNA + CDR appeared first on Votiro. The post Closing the Zero Trust Loop: ZTNA + CDR appeared first on Security Boulevard.

Getting Better Security: The Critical Role of NHIs

How Does Non-Human Identity Management Improve Cybersecurity? Have you ever wondered how managing identities that aren’t human can enhance the security of your organization? The notion of security extends beyond just safeguarding data from ...

How NHIs Deliver Value in Securing Data Assets

How Are Non-Human Identities Redefining Cybersecurity? How do organizations address the intricacies of managing Non-Human Identities (NHIs) to safeguard critical data? While digital becomes more complex, the necessity for robust NHI management ...

Optimistic About Cloud Security? You Need NHIs

What is the Pivotal Role of Non-Human Identities in Cloud Security? How secure is your organization’s cloud infrastructure? It’s a crucial question while more businesses shift to cloud environments and face complex security challenges. One ...

Stay Relaxed with Advanced NHIs in Compliance

How Does NHI Management Contribute to a Relaxed Security Stance? Can machine identities bring tranquility to your cybersecurity? InUnderstanding and managing Non-Human Identities (NHIs) can indeed create a calmer security environment for ...

Closing the Card Fraud Detection Gap

Strengthen Fiserv’s card fraud defense with Enzoic BIN Monitoring—real-time dark web alerts that help stop fraud before it starts. The post Closing the Card Fraud Detection Gap appeared first on Security Boulevard.

Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management

The enterprise IT perimeter dissolved years ago, taking with it any illusion that security teams can dictate which applications employees use or which devices they work from. Today’s reality: employees install applications freely, work from ...

Ransom Tales: Volume V — Throwback Edition! Emulating REvil, DarkSide, and BlackMatter Ransomware

AttackIQ presents the fifth volume of Ransom Tales, an initiative focused on emulating the Tactics, Techniques, and Procedures (TTPs) exhibited by sophisticated and prominent ransomware families with the objective of empowering defenders to ...

JFrog Uncovers Severe React Vulnerability Threat to Software Supply Chains

The security research team at JFrog, a provider of a platform for building and deploying software, have discovered a critical vulnerability in a node package manager (NPM) found in tools used by application developers that enable unauthenticated ...

NDSS 2025 – Duumviri: Detecting Trackers And Mixed Trackers With A Breakage Detector

SESSION Session 2B: Web Security Authors, Creators & Presenters: He Shuang (University of Toronto), Lianying Zhao (Carleton University and University of Toronto), David Lie (University of Toronto) PAPER Duumviri: Detecting Trackers and Mixed ...

DataDome Earns Three New AWS Competencies

DataDome strengthens its AWS partnership with three new Competencies, delivering real-time bot and agent trust management across key industries. The post DataDome Earns Three New AWS Competencies appeared first on Security Boulevard.

Holiday Fraud Trends 2025: The Top 5 Cyber Threats to Watch This Season

Fraud is Starting Earlier, Scaling Faster, and Blurring the Line Between Human and Bots The post Holiday Fraud Trends 2025: The Top 5 Cyber Threats to Watch This Season appeared first on Security Boulevard.

Cognitive Threat Analytics: How Seceon Enables Next-Gen SOC Defence

Introduction In the rapidly evolving cyber-threat landscape, traditional signature-based defences are no longer sufficient. Threat actors increasingly use stealth, lateral movement, encrypted channels, zero-day exploits and insider tactics. To ...