Application Security News and Articles


Energy companies are blind to thousands of exposed services

Many of America’s largest energy providers are exposed to known and exploitable vulnerabilities, and most security teams may not even see them, according to a new report from SixMap. Researchers assessed the external attack surface of 21 major ...

Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe

Why a secrets management strategy is now critical for modern security. The post Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe appeared first on Security Boulevard.

Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Zenity has shown how AI assistants such as ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein can be abused using specially crafted prompts. The post Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation appeared first ...

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

CyberArk has patched several vulnerabilities that could be chained for unauthenticated remote code execution. The post Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities appeared first on SecurityWeek.

Project Red Hook: Chinese Gift Card Fraud at Scale

Project Red Hook is a Homeland Security Investigations operation examining how Chinese Organized Crime is committing wholesale Gift Card Fraud by using Chinese illegal immigrants to steal gift cards, reveal their PIN, reseal the cards, and return ...

Palo Alto Networks Previews ASPM Module for Cortex Cloud Platform

Palo Alto Networks this week revealed it is providing early access to an application security posture management (ASPM) module for its Cortex security platform as part of a larger effort to streamline cybersecurity workflows. The Cortex Cloud ...

Contrast Security Adds GitHub Copilot and Sumo Logic Integrations to ADR Platform

This week at the Black Hat USA 2025 conference, Contrast Security added integrations with GitHub Copilot and the security information and event management (SIEM) platform from Sumo Logic to the Northstar edition of its application detection and ...

BSidesSF 2025: Third-Party Risk Management: SOC 2s, Security Questionnaires, And Psychosis

Creator/Author/Presenter: Eleanor Mount Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at ...

CVE-2025-54987, CVE-2025-54948: Trend Micro Apex One Command Injection Zero-Days Exploited In The Wild

Trend Micro releases a temporary mitigation tool to reduce exposure to two unpatched zero-day command injection vulnerabilities which have been exploited. Background On August 5, Trend Micro released a security advisory for two critical flaws ...

How to Prevent Helpdesk Social Engineering Attacks

Helpdesks are critical support hubs, but their central role makes them prime targets for sophisticated social engineering attacks. These attacks exploit human psychology, tricking helpdesk personnel into divulging sensitive information or ...

Executives Anonymous: What’s a SIEM? (and why you should care)

Executives Anonymous (EANON) aims to help inform the decision making process for executives and managers who may be new to the security field or even want (or need) to be better at resource control and optimization of their team’s tools.  What ...

Act Now: $100M in FY25 Cyber Grants for SLTTs Available Before August 15

With over $100 million on the table in FY25 cybersecurity grants, state, local and tribal governments have until August 15, 2025 to apply to secure critical cyber funding to strengthen their defenses. On August 1st, the U.S. Cybersecurity and ...

Google Discloses Data Breach via Salesforce Hack 

A Google Salesforce instance may have been targeted as part of a ShinyHunters campaign that hit several major companies.  The post Google Discloses Data Breach via Salesforce Hack  appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Flettner Rotor’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Flettner Rotor’ appeared first on Security Boulevard.

The Promise and Pitfalls of Ephemeral Identities

Short-lived credentials reduce exposure – but they aren’t secure by default. Here’s what ephemeral identity gets right, and where it can fail. The post The Promise and Pitfalls of Ephemeral Identities appeared first on Security Boulevard.

Absolute Security upgrades platform with AI assistant and real-time risk response tools

Absolute Security announced new innovations available on the Absolute Resilience Platform. An advanced GenAI assistant enables natural-language queries that instantly answer vital questions about the security and compliance status of endpoint ...

What Identity Federation Means for Workloads in Cloud-Native Environments

7 min readManaging identity across cloud providers used to be a human problem – think SSO portals and workforce identity sync. However, as infrastructure becomes more automated, the real fragmentation now resides between workloads: CI/CD ...

PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins

Splunk researchers developed a system to fingerprint post-logon behavior, using AI to find subtle signals of intrusion. The post PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins appeared first on SecurityWeek.

Full Stack Development in the Age of LLMs: What CTOs and Product Leaders Must Know

In 2025, code isn’t just written it’s generated, interpreted, and augmented by AI. GitHub Copilot is already writing 46% of code in supported languages, and...Read More The post Full Stack Development in the Age of LLMs: What CTOs and Product ...

7AI enables end-to-end autonomous security operations

7AI is debuting three innovations that make 7AI a platform to handle the security workflow through AI agents, from consuming zero-day alerts to novel threat investigation through contextual analysis to authorized remediation. Dynamic Reasoning ...