Application Security News and Articles
API integrations have become the backbone of modern digital interactions, yet they also introduce vulnerabilities that can be exploited if left unchecked. The convergence of artificial intelligence (AI) and application programming interfaces ...
Learn what generative AI in cybersecurity is and how to secure against threats.
The post What is Generative AI Security? appeared first on Security Boulevard.
Learn how GitGuardian and Delinea solve the growing problem of improper offboarding for Non-Human Identities (NHIs). Discover why orphaned secrets are a top security risk and how to automate their lifecycle management.
The post How GitGuardian ...
ADP E2EE vs. UK: Brits agree to change course, but Tim still shtum.
The post UK Quietly Drops ‘Think of the Children’ Apple iCloud Crypto Crack Call appeared first on Security Boulevard.
A ransomware crew doesn’t need to smash every door in your network. They just need one. And once they’re inside, they move sideways, quietly hopping from system to system, until they find the jackpot. That sideways move, known as lateral ...
Google used its Cloud Security Summit 2025 today to introduce a wide range of updates aimed at securing AI innovation and strengthening enterprise defenses. The announcements span protections for AI agents, new tools for security operations ...
DataDome’s enhanced dashboard gives businesses the visibility and control they need over rapidly growing AI agent and LLM crawler traffic, helping protect revenue, SEO, and security.
The post DataDome Enhances Visibility of AI Agents & LLM ...
Creator, Author and Presenter: HD Moore
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...
The lines between SaaS and AI are vanishing. AI agents are now first-class citizens in your SaaS universe: accessing sensitive data, triggering workflows, and introducing new risks that legacy SaaS security posture management tools (SSPM) miss. ...
Government agencies at every level face rising cyber threats, evolving compliance demands, and limited IT resources, all while maintaining critical public services.
Join us to explore how CimTrak empowers government entities to strengthen ...
Cofense launched Vision 3.0, the latest advancement to its Phishing Threat Detection and Response (PDR) platform. Vision 3.0 delivers faster, smarter incident response by giving security teams visibility into exactly how users interacted with ...
Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State University and Citizen Lab. Finding the secret links Virtual private networks ...
PipeMagic, which poses as a ChatGPT application, is a modular malware framework that provides persistent access and flexibility.
The post Microsoft Dissects PipeMagic Modular Backdoor appeared first on SecurityWeek.
Using a single, carefully-crafted prompt, Cybernews researchers were able to manipulate Lenovo's customer service AI chatbot, Lena, into giving up customer agent session cookies, which opened up the possibility of multiple lines of attack, from ...
TPG Telecom has disclosed a cybersecurity incident after discovering unauthorized access to an iiNet order management system.
The post Australia’s TPG Telecom Investigating iiNet Hack appeared first on SecurityWeek.
Britain abandoned its demand that Apple provide backdoor access to any encrypted user data stored in the cloud.
The post Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data appeared first on SecurityWeek.
Bragg Gaming Group says hackers accessed its internal systems over the weekend, but did not affect its operations.
The post Gambling Tech Firm Bragg Discloses Cyberattack appeared first on SecurityWeek.
Al-Tahery Al-Mashriky of the Yemen Cyber Army has been accused of hacking into and defacing many websites as part of hacktivist campaigns.
The post Hacktivist Sentenced to 20 Months of Prison in UK appeared first on SecurityWeek.
A new public exploit chains two critical flaws in SAP NetWeaver, exposing unpatched instances to code execution attacks.
The post New Exploit Poses Threat to SAP NetWeaver Instances appeared first on SecurityWeek.
As AI adoption accelerates, businesses face hidden risks from third-party models like ChatGPT and Claude, including data leakage and malicious data infiltration. By implementing corporate AI tools and educating employees, companies can harness ...