Application Security News and Articles


Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Dive into insights from BSides Las Vegas 2025: how identity hygiene, human ecosystems, structural resilience, and unpredictability define modern defenses. The post Passwords, Resilience, And Being Human: Working Together For A Brighter Future At ...

The Lesson of Black Hat: It’s About the People, Stupid

At Black Hat and beyond, the real strength of cybersecurity is the people who show up, year after year, to protect, connect, and inspire. The post The Lesson of Black Hat: It’s About the People, Stupid appeared first on Security Boulevard.

Ransomware: Still Dangerous After All These Years

Ransomware isn’t dying — it’s evolving, swapping encryption for aggressive extortion as attacks and data theft hit record highs. The post Ransomware: Still Dangerous After All These Years appeared first on Security Boulevard.

French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers

Bouygues has been targeted in a cyberattack that resulted in the personal information of millions of customers getting compromised. The post French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers appeared first on SecurityWeek.

Stop Geo-Spoofing with Secure API Integration for Mobile Application

Location Spoofing or Geo Spoofing is the act of deliberately falsifying the geographical location of a device. This can be performed using various techniques such as GPS manipulation, tweaking OS settings, or by using specialized software that ...

August 2025 Patch Tuesday forecast: Try, try, again

July turned into a surprisingly busy month. It started slowly with a fairly ‘calm’ Patch Tuesday as I forecasted in my last blog. Although there were 130 new CVEs addressed across all the Microsoft releases, there was only one publicly ...

Silent Guardian of Your Codebase: The Role of SAST

In 2025, the average cost of a data breach reached an alarming Rs 22 Crore; a 13% increase from the previous year. This trend highlights how breaches are not only more frequent and sophisticated but also increasingly costly, putting an ...

NSFOCUS Monthly APT Insights – June 2025

Regional APT Threat Situation In June 2025, the global threat hunting system of Fuying Lab detected a total of 33 APT attack activities. These activities were mainly distributed in regions such as South Asia, East Asia, West Asia, Eastern Europe, ...

Third-party partners or ticking time bombs?

In this Help Net Security video, Ngaire Elizabeth Guzzetti, Technical Director Supply Chain at CyXcel, discusses why a third of U.S. organizations don’t trust third-party vendors to manage critical risks and what that means for supply chain ...

From fake CAPTCHAs to RATs: Inside 2025’s cyber deception threat trends

Cybercriminals are getting better at lying. That’s the takeaway from a new LevelBlue report, which outlines how attackers are using social engineering and legitimate tools to quietly move through environments before they’re caught. Data ...

Decoding OTP A Deep Dive into HOTP and TOTP Algorithms

Explore OTP generation algorithms like HOTP and TOTP. Understand their differences, security, and implementation for robust authentication in CIAM and passwordless systems. The post Decoding OTP A Deep Dive into HOTP and TOTP Algorithms appeared ...

Fraud controls don’t guarantee consumer trust

Over a third of companies say they are using AI, including generative AI, to fight fraud, according to Experian. As fraud threats become more complex, companies are accelerating their investments with over half adopting new analytics and building ...

New infosec products of the week: August 8, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Descope, Elastic, ExtraHop, LastPass, and Riverbed. Elastic AI SOC Engine helps SOC teams expose hidden threats Elastic AI SOC Engine (EASE) ...

CMMC Final Rule: Clear Steps for DoD Contractors

Key Takeaways Understanding the CMMC Final Rule: Why It Matters Now For years, the Cybersecurity Maturity Model Certification (CMMC) has been discussed as a future requirement for defense contractors. But until recently, it served as a framework ...

Reveal Security Unveils Preemptive Approach to Securing Applications and Cloud Services

Reveal Security this week unfurled a platform designed to enable cybersecurity teams to preemptively manage access to multiple applications and cloud infrastructure resources both before and after end users have logged in. Company CEO Kevin Hanes ...

How to Build an Incident Response Playbook in 9 Steps 

The post How to Build an Incident Response Playbook in 9 Steps  appeared first on AI Security Automation. The post How to Build an Incident Response Playbook in 9 Steps  appeared first on Security Boulevard.

Data Center Security

In an era where data is the lifeblood of every enterprise, safeguarding the core of your digital operations—the data center—is absolutely non-negotiable. With cyber threats evolving, regulations tightening, and infrastructure growing more ...

Inside Kasada: An Intern’s Dive into Bots, Data, and Company Culture

Meet Max and Kasey, two interns at Kasada who tackled real-world challenges from two very different angles—machine learning and sales operations—and came away with sharper skills, meaningful impact, and a clear sense of where they’re headed ...

Cloud Network Security

Cloud Network Security refers to the set of policies, technologies, tools, and best practices designed to protect data, applications, and systems that are hosted in the cloud from unauthorized access, cyberattacks, and data breaches. As ...

Survey: Many Organizations Hit by Ransomware Fall Victim Multiple Times

A global survey of 2,000 senior security decision-makers in organizations with between 50 and 2,000 employees finds well over a third (38%) of those who were impacted by a data breach caused by a ransomware attack were victimized multiple times ...