Application Security News and Articles


DataDome Releases Edgee Server-Side Integration

Our new Edgee Integration is the latest in a range of 50+ integrations that ensure DataDome stops fraud on any infrastructure. The post DataDome Releases Edgee Server-Side Integration appeared first on Security Boulevard.

Noodlophile infostealer is hiding behind fake copyright and PI infringement notices

Attackers pushing the Noodlophile infostealer are targeting businesses with spear-phishing emails threatening legal action due to copyright or intellectual property infringement, Morphisec researchers have warned. The campaign The emails, ...

What is a Qualified Electronic Signature (QES)?

A Qualified Electronic Signature (QES) is the most secure and legally binding form of e-signature under EU eIDAS regulations. Unlike simple or advanced e-signatures, QES requires strict identity verification, qualified certificates, and trusted ...

Strengthening Identity Security

Osterman’s 2025 research shows how to close identity security gaps from compromised passwords with faster detection and remediation. The post Strengthening Identity Security appeared first on Security Boulevard.

Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities

More than 870 N-able N-central instances have not been patched against CVE-2025-8875 and CVE-2025-8876, two exploited vulnerabilities. The post Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities appeared first on ...

Workday Data Breach Bears Signs of Widespread Salesforce Hack

Workday appears to have joined the list of major companies that had their Salesforce instances targeted by hackers.  The post Workday Data Breach Bears Signs of Widespread Salesforce Hack appeared first on SecurityWeek.

DOJ Seizes $2.8 Million, Indicts Alleged Zeppelin Ransomware Operator

U.S. authorities seized $2.8 million crypto and $70,000 from Ianis Aleksandrovich Antropenko, who they say used the Zeppelin ransomware to attack companies in the United States and elsewhere and then laundered the cryptocurrency used to pay the ...

US Seizes $2.8 Million From Zeppelin Ransomware Operator

The US has indicted Zeppelin ransomware operator Ianis Antropenko, seizing over $2.8 million in cryptocurrency from his wallet. The post US Seizes $2.8 Million From Zeppelin Ransomware Operator appeared first on SecurityWeek.

DARPA AI Cyber Challenge Winners Impress With Quick, Scalable Patching 

Winners of DARPA’s AI Cyber Challenge proved AI can automate patching at scale. Their tools will go open source, offering defenders new power—but also raising concerns about AI-fueled exploits. The post DARPA AI Cyber Challenge Winners ...

Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets

Chinese APT UAT-7237 has been targeting Taiwanese web infrastructure for long-term access to high-value entities. The post Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets appeared first on SecurityWeek.

Secure Software Development – Why It Matters

Secure Software Development – Why It Matters to Every UK SMB (Even If You Don’t Write Code) When most small and medium-sized businesses (SMBs) hear “secure development,” they think: “That doesn’t apply to us, we don’t build apps or ...

Do We Have a CISO Payola Problem?

Pay-for-access dinners. Equity asks. Quiet kickbacks. The CISO payola problem is real — and it’s threatening the integrity of cybersecurity leadership. The post Do We Have a CISO Payola Problem? appeared first on Security Boulevard.

How security teams are putting AI to work right now

AI is moving from proof-of-concept into everyday security operations. In many SOCs, it is now used to cut down alert noise, guide analysts during investigations, and speed up incident response. What was once seen as experimental technology is ...

Buttercup: Open-source AI-driven system detects and patches vulnerabilities

Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits, it recently earned second place in DARPA’s AI Cyber Challenge (AIxCC). Main components Buttercup is ...

Review: Data Engineering for Cybersecurity

Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the flood of logs, events, and telemetry they collect. About the author James Bonifield has a decade of experience analyzing ...

Weak alerting and slipping prevention raise risk levels for CISOs

Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft prevention has dropped to 3 percent, password cracking success rates have nearly doubled, and ...

Bridging the AI model governance gap: Key findings for CISOs

While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could slow adoption and increase risk. The findings of a new Anaconda survey of more than 300 AI practitioners and ...

The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages

In this episode we’re discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million ...

How Secure Are Your Machine Identities in the Cloud?

Are Your Machine Identities Secure in the Cloud? More and more organizations are shifting their operations to the cloud. While this move optimizes business processes and enhances productivity, it also presents new challenges. One of the top ...

Empowering SOC Teams with Advanced NHIDR Solutions

Can Non-Human Identity and Data Rights Solutions Revolutionize Your Cybersecurity Protocol? Non-Human Identities (NHIs) are proving to be fundamental. When data breaches escalate both in frequency and impact, a renewed focus has shifted towards ...