Application Security News and Articles


Columbia University Breach Affects Nearly 870,000 People

Columbia University has confirmed that a cyberattack exposed personal information for close to 870,000 people, including current and former students, applicants, employees, and others connected to the school. The attack began in mid-May but ...

Air France and KLM Confirm Customer Data Exposure in Third-Party Breach

Air France and KLM have disclosed that a cyberattack targeting one of their third-party service providers led to unauthorized access to certain customer information. The incident, detected in late July 2025, affected a system used for customer ...

Why Be Optimistic About Future Cybersecurity?

Is there a Silver Lining to the Cloud of Cyberthreats? The rise in cyberattacks can paint a bleak picture of the future of cybersecurity. However, such an outlook does not take into account the enormous strides being made within the field itself. ...

Maximizing Machine Identity Protection Efforts

Why Should Machine Identity Management be a Part of Your Cybersecurity Strategy? The paradigm has shifted in cybersecurity. More and more, organizations are coming to the realization that focusing solely on human identities is not enough to stave ...

How Secure Are Your Non-Human Identities in the Cloud?

Are Your Cloud-Based Non-Human Identities Adequately Secured? With industries across the globe increasingly migrate their operations to cloud-based platforms, a critical question arises: “How secure are your Non-Human Identities (NHIs) in these ...

Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage

  LinkedIn is a great communication tool for business professionals that informs, provides opportunities, and fosters collaboration — which is exactly why it is attractive to sophisticated cyber adversaries, including aggressive nation ...

BSidesSF 2025: AI’s Bitter Lesson For SOCs: Let Machines Be Machines

Creators/Authors/Presenters: Jackie Bow, Peter Sanford Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking

Researchers showed how flaws in a bus’ onboard and remote systems can be exploited by hackers for tracking, control and spying.  The post Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking appeared first on SecurityWeek.

How Secure Code Review Strengthen Web Apps Security?

Twitter recently suffered a data breach due to misconfigured settings in its application programming interface (API). As a result, hackers accessed the personal data of 5.4 million users and leaked it on an online forum. The stolen data was later ...

Mastering Identity Modern Strategies for Secure Access

Explore cutting-edge identity strategies for secure access, including passwordless authentication, adaptive access control, and decentralized identity. Learn how to enhance your organization's security posture. The post Mastering Identity Modern ...

SOURCE CODE REVIEW — HIVE AIRPORT

Tulisan ini saya buat khususnya untuk saya pribadi dan umumnya untuk pembaca. Saya membuat tulisan ini dikarenakan saya ingin mempelajari…Continue reading on Medium »

Can Your Cybersecurity Handle Evolving Threats?

Are Your Cybersecurity Measures Equipped to Handle Evolving Threats? Do you often question the adequacy of your cybersecurity measures against constantly shifting of digital threats? The key lies in comprehensively managing Non-Human Identities ...

Exciting Advances in Secrets Sprawl Management

What’s the Buzz About Secrets Sprawl Management? It’s no secret that businesses are increasingly relying on digital infrastructure and cloud services. But do you know what keeps IT specialists and cybersecurity experts on their toes? The ...

How Cybersecurity Is Getting Better with NHIs

Does your Cybersecurity Strategy Account for NHIs? Non-Human Identities (NHIs) and Secrets management play integral roles. They are often overlooked in the shadow of other robust security measures, leading to potential vulnerabilities. NHIs are ...

Choosing the Right Secrets Management Solution

Why is Secrets Management Essential in Today’s Cybersecurity Landscape? One prevailing question often emerges among cybersecurity professionals: Why is secrets management crucial to our digital?  In essence, secrets management – the process ...

Stop Chasing AI Agents. Build a Persistent, Autonomous SOC Instead

AI agents promise automation but deliver chaos. Morpheus gives your SOC a persistent, auditable core, resolving alerts faster, with fewer escalations and no sprawl. The post Stop Chasing AI Agents. Build a Persistent, Autonomous SOC Instead ...

Securing AI Agents: Exploring Critical Threats And Exploitation Techniques

Creators/Authors/Presenters: Naveen Konrajankuppam Mahavishnu, Mohankumar Vengatachalam Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. ...

Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise

Researchers demonstrate how multi-turn “storytelling” attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5’s defenses. The post Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise ...

VCF 9.0 Live Patching Ends Maintenance Window Dread

For IT administrators, two words sure to cause undue stress are “patching cycle.” It’s a necessary process fraught with challenges. Scheduling downtime, coordinating with application owners, and bracing for the unexpected create ...

Randall Munroe’s XKCD ‘Geologic Periods’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Geologic Periods’ appeared first on Security Boulevard.