Application Security News and Articles


Google Discloses Data Breach via Salesforce Hack 

A Google Salesforce instance may have been targeted as part of a ShinyHunters campaign that hit several major companies.  The post Google Discloses Data Breach via Salesforce Hack  appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Flettner Rotor’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Flettner Rotor’ appeared first on Security Boulevard.

The Promise and Pitfalls of Ephemeral Identities

Short-lived credentials reduce exposure – but they aren’t secure by default. Here’s what ephemeral identity gets right, and where it can fail. The post The Promise and Pitfalls of Ephemeral Identities appeared first on Security Boulevard.

Absolute Security upgrades platform with AI assistant and real-time risk response tools

Absolute Security announced new innovations available on the Absolute Resilience Platform. An advanced GenAI assistant enables natural-language queries that instantly answer vital questions about the security and compliance status of endpoint ...

What Identity Federation Means for Workloads in Cloud-Native Environments

7 min readManaging identity across cloud providers used to be a human problem – think SSO portals and workforce identity sync. However, as infrastructure becomes more automated, the real fragmentation now resides between workloads: CI/CD ...

PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins

Splunk researchers developed a system to fingerprint post-logon behavior, using AI to find subtle signals of intrusion. The post PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins appeared first on SecurityWeek.

Full Stack Development in the Age of LLMs: What CTOs and Product Leaders Must Know

In 2025, code isn’t just written it’s generated, interpreted, and augmented by AI. GitHub Copilot is already writing 46% of code in supported languages, and...Read More The post Full Stack Development in the Age of LLMs: What CTOs and Product ...

7AI enables end-to-end autonomous security operations

7AI is debuting three innovations that make 7AI a platform to handle the security workflow through AI agents, from consuming zero-day alerts to novel threat investigation through contextual analysis to authorized remediation. Dynamic Reasoning ...

DataDome & TollBit Partner to Protect and Monetize AI traffic

DataDome and TollBit partner to help businesses protect content and monetize compliant AI traffic. Gain real-time protection, actionable insights, and new revenue from agentic AI. The post DataDome & TollBit Partner to Protect and Monetize AI ...

WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says

Meta linked these scams to a criminal scam center in Cambodia — and said it disrupted the campaign in partnership with ChatGPT maker OpenAI. The post WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says appeared ...

The AI Security Dilemma: Navigating the High-Stakes World of Cloud AI

AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely. Artificial Intelligence is no longer on the ...

https://www.youtube-nocookie.com/embed/IPusFv_iEI8?si=Kr-IckosVNP0Azou

Creators/Authors/Presenters: Ashish Rajan, Jackie Bow, Kane Narraway Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

Trend Micro Patches Apex One Vulnerabilities Exploited in Wild

Trend Micro has rushed to fix two Apex One zero-days that may have been exploited by Chinese threat actors. The post Trend Micro Patches Apex One Vulnerabilities Exploited in Wild appeared first on SecurityWeek.

Sysdig Previews Set of AI Agents for Cloud Security Platform

Sysdig, this week at the Black Hat USA 2025 conference, revealed it is providing early access to artificial intelligence (AI) agents that have been added to its cloud native application protection platform (CNAPP). The post Sysdig Previews Set of ...

Staying Secure When Logging In: A Practical Guide to Protecting Your Digital Identity

Master login security with expert insights from building identity systems serving millions of users. This comprehensive guide covers password managers, two-factor authentication, phishing protection, Wi-Fi security, and advanced strategies to ...

Love Your Kubernetes Add-Ons: Securing Kubernetes Beyond the Core

Kubernetes has come a long way, from early pain points around cluster upgrades to more streamlined processes enforced by managed cloud providers. But one area still lagging behind in maturity, security, and operational best practices? ...

Microsoft Paid Out $17 Million in Bug Bounties in Past Year

Microsoft handed out $17 million in rewards to 344 security researchers through its bug bounty programs over the past year. The post Microsoft Paid Out $17 Million in Bug Bounties in Past Year appeared first on SecurityWeek.

Abnormal AI spots risky misconfigs in Microsoft 365 before attackers do

Abnormal AI updated Security Posture Management product, bringing AI-driven protection, automated prioritization, and remediation guidance to customers’ Microsoft 365 environments. As Microsoft 365 environments become more complex, accidental ...

Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities

An AI extension to the Ox Security platform automatically generates organization specific code to fix vulnerabilities in the codebase. The post Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities appeared first on ...

Adobe patches critical Adobe Experience Manager Forms vulnerabilities with public PoC

Adobe has released an emergency security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE), which fix two critical vulnerabilities (CVE-2025-54253, CVE-2025-54254) with a publicly available proof-of-concept (PoC) exploit. ...