Application Security News and Articles


Combining AI and APIs to close the risk visibility gap: A strategic framework

API integrations have become the backbone of modern digital interactions, yet they also introduce vulnerabilities that can be exploited if left unchecked. The convergence of artificial intelligence (AI) and application programming interfaces ...

What is Generative AI Security?

Learn what generative AI in cybersecurity is and how to secure against threats. The post What is Generative AI Security? appeared first on Security Boulevard.

How GitGuardian and Delinea Solve Improper Offboarding of NHIs at Scale

Learn how GitGuardian and Delinea solve the growing problem of improper offboarding for Non-Human Identities (NHIs). Discover why orphaned secrets are a top security risk and how to automate their lifecycle management. The post How GitGuardian ...

UK Quietly Drops ‘Think of the Children’ Apple iCloud Crypto Crack Call

ADP E2EE vs. UK: Brits agree to change course, but Tim still shtum. The post UK Quietly Drops ‘Think of the Children’ Apple iCloud Crypto Crack Call appeared first on Security Boulevard.

From Google to Healthcare Giants: How Breaches Spiral Out of Control

A ransomware crew doesn’t need to smash every door in your network. They just need one. And once they’re inside, they move sideways, quietly hopping from system to system, until they find the jackpot. That sideways move, known as lateral ...

Google unveils new AI and cloud security capabilities at Security Summit

Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements span protections for AI agents, new tools for security operations ...

DataDome Enhances Visibility of AI Agents & LLM Crawlers in Your Dashboard

DataDome’s enhanced dashboard gives businesses the visibility and control they need over rapidly growing AI agent and LLM crawler traffic, helping protect revenue, SEO, and security. The post DataDome Enhances Visibility of AI Agents & LLM ...

BSidesSF 2025: Charting the SSH Multiverse

Creator, Author and Presenter: HD Moore Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

Webinar: Why AI and SaaS are now the same attack surface

The lines between SaaS and AI are vanishing. AI agents are now first-class citizens in your SaaS universe: accessing sensitive data, triggering workflows, and introducing new risks that legacy SaaS security posture management tools (SSPM) miss. ...

Securing Government Systems at Scale: How CimTrak Delivers Unprecedented Visibility, Security and Cyber Resilience

Government agencies at every level face rising cyber threats, evolving compliance demands, and limited IT resources, all while maintaining critical public services.  Join us to explore how CimTrak empowers government entities to strengthen ...

Cofense Vision 3.0 identifies user engagement with phishing emails

Cofense launched Vision 3.0, the latest advancement to its Phishing Threat Detection and Response (PDR) platform. Vision 3.0 delivers faster, smarter incident response by giving security teams visibility into exactly how users interacted with ...

Android VPN apps used by millions are covertly connected AND insecure

Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Finding the secret links Virtual private networks ...

Microsoft Dissects PipeMagic Modular Backdoor

PipeMagic, which poses as a ChatGPT application, is a modular malware framework that provides persistent access and flexibility. The post Microsoft Dissects PipeMagic Modular Backdoor appeared first on SecurityWeek.

Flaw in Too-Trusting Lenovo Chatbot Could Have Let Hackers In

Using a single, carefully-crafted prompt, Cybernews researchers were able to manipulate Lenovo's customer service AI chatbot, Lena, into giving up customer agent session cookies, which opened up the possibility of multiple lines of attack, from ...

Australia’s TPG Telecom Investigating iiNet Hack

TPG Telecom has disclosed a cybersecurity incident after discovering unauthorized access to an iiNet order management system. The post Australia’s TPG Telecom Investigating iiNet Hack appeared first on SecurityWeek.

Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data

Britain abandoned its demand that Apple provide backdoor access to any encrypted user data stored in the cloud. The post Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data appeared first on SecurityWeek.

Gambling Tech Firm Bragg Discloses Cyberattack

Bragg Gaming Group says hackers accessed its internal systems over the weekend, but did not affect its operations. The post Gambling Tech Firm Bragg Discloses Cyberattack appeared first on SecurityWeek.

Hacktivist Sentenced to 20 Months of Prison in UK

Al-Tahery Al-Mashriky of the Yemen Cyber Army has been accused of hacking into and defacing many websites as part of hacktivist campaigns. The post Hacktivist Sentenced to 20 Months of Prison in UK appeared first on SecurityWeek.

New Exploit Poses Threat to SAP NetWeaver Instances

A new public exploit chains two critical flaws in SAP NetWeaver, exposing unpatched instances to code execution attacks. The post New Exploit Poses Threat to SAP NetWeaver Instances appeared first on SecurityWeek.

The Hidden Risks of External AI Models and How Businesses can Mitigate Them 

As AI adoption accelerates, businesses face hidden risks from third-party models like ChatGPT and Claude, including data leakage and malicious data infiltration. By implementing corporate AI tools and educating employees, companies can harness ...