Application Security News and Articles


Elastic AI SOC Engine helps SOC teams expose hidden threats

Elastic AI SOC Engine (EASE) is a new serverless, easy-to-deploy security package that brings AI-driven context-aware detection and triage into existing SIEM and EDR tools, without the need for an immediate migration or replacement. EASE delivers ...

AI can write your code, but nearly half of it may be insecure

While GenAI excels at producing functional code, it introduces security vulnerabilities in 45 percent of cases, according to Veracode’s 2025 GenAI Code Security Report, which analyzed code produced by over 100 LLMs across 80 real-world coding ...

Energy companies are blind to thousands of exposed services

Many of America’s largest energy providers are exposed to known and exploitable vulnerabilities, and most security teams may not even see them, according to a new report from SixMap. Researchers assessed the external attack surface of 21 major ...

News alert: SpyCloud’s AI-powered platform mimics veteran analysts, speeds threat detection

Austin, TX, Aug. 6, 2025, CyberNewswire: SpyCloud, the leader in identity threat protection, today announced a significant enhancement to its SaaS Investigations solution: the integration of advanced AI-powered insights that mirror the tradecraft ...

Cursor Remote Code Execution Vulnerability (CVE-2025-54135)

Overview Recently, NSFOCUS CERT detected that Cursor issued a security bulletin and fixed the Cursor remote code execution vulnerability (CVE-2025-54135); Because Cursor allows files to be written to the workspace without user approval, when an ...

Why the lifecycle of secrets defines your security posture

Over 39 million secrets were leaked on GitHub in 2024. Discover why most teams fail at secrets management and how lifecycle-aware practices can help. The post Why the lifecycle of secrets defines your security posture appeared first on Security ...

Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe

Why a secrets management strategy is now critical for modern security. The post Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe appeared first on Security Boulevard.

Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Zenity has shown how AI assistants such as ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein can be abused using specially crafted prompts. The post Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation appeared first ...

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

CyberArk has patched several vulnerabilities that could be chained for unauthenticated remote code execution. The post Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities appeared first on SecurityWeek.

Project Red Hook: Chinese Gift Card Fraud at Scale

Project Red Hook is a Homeland Security Investigations operation examining how Chinese Organized Crime is committing wholesale Gift Card Fraud by using Chinese illegal immigrants to steal gift cards, reveal their PIN, reseal the cards, and return ...

Palo Alto Networks Previews ASPM Module for Cortex Cloud Platform

Palo Alto Networks this week revealed it is providing early access to an application security posture management (ASPM) module for its Cortex security platform as part of a larger effort to streamline cybersecurity workflows. The Cortex Cloud ...

Innovation in NHIs and Secrets Management

Redefining Cybersecurity with NHI Innovation and Secrets Management Are you aware of the revolutionary changes taking place in cybersecurity and data management? Transforming digital calls for a ground-breaking approach to managing security ...

Building Confidence in Your Secrets Vaults

Is Your Secrets Vault Ensuring Optimal Data Protection? Securing Non-Human Identities (NHIs) and their accompanying secrets requires robust cybersecurity measures. NHIs, essentially machine identities, are a crucial part of cybersecurity ...

Reassured Security: Is Your Data Truly Protected?

Are Your Cybersecurity Measures Keeping Up With the Digital Age? Data protection has become a paramount concern for most organizations. However, the question remains, is your data truly protected? If you are in doubt, we are going to delve into ...

Contrast Security Adds GitHub Copilot and Sumo Logic Integrations to ADR Platform

This week at the Black Hat USA 2025 conference, Contrast Security added integrations with GitHub Copilot and the security information and event management (SIEM) platform from Sumo Logic to the Northstar edition of its application detection and ...

BSidesSF 2025: Third-Party Risk Management: SOC 2s, Security Questionnaires, And Psychosis

Creator/Author/Presenter: Eleanor Mount Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at ...

CVE-2025-54987, CVE-2025-54948: Trend Micro Apex One Command Injection Zero-Days Exploited In The Wild

Trend Micro releases a temporary mitigation tool to reduce exposure to two unpatched zero-day command injection vulnerabilities which have been exploited. Background On August 5, Trend Micro released a security advisory for two critical flaws ...

How to Prevent Helpdesk Social Engineering Attacks

Helpdesks are critical support hubs, but their central role makes them prime targets for sophisticated social engineering attacks. These attacks exploit human psychology, tricking helpdesk personnel into divulging sensitive information or ...

Executives Anonymous: What’s a SIEM? (and why you should care)

Executives Anonymous (EANON) aims to help inform the decision making process for executives and managers who may be new to the security field or even want (or need) to be better at resource control and optimization of their team’s tools.  What ...

Act Now: $100M in FY25 Cyber Grants for SLTTs Available Before August 15

With over $100 million on the table in FY25 cybersecurity grants, state, local and tribal governments have until August 15, 2025 to apply to secure critical cyber funding to strengthen their defenses. On August 1st, the U.S. Cybersecurity and ...