Application Security News and Articles


Humans built the problem, AI just scaled it

Information moves across cloud platforms, personal devices, and AI tools, often faster than security teams can track it. Proofpoint’s 2025 Data Security Landscape report shows that most organizations faced data loss last year, usually caused by ...

What shadow AI means for your company’s security

In this Help Net Security video, Peled Eldan‏, Head of Research at XM Cyber, explains the hidden risks of shadow AI. He describes how employees often use unapproved AI tools at work to save time or solve problems, even when approved tools are ...

Retailers are learning to say no to ransom demands

Ransomware remains one of the biggest operational risks for retailers, but the latest data shows a shift in how these attacks unfold. Fewer incidents now lead to data encryption, recovery costs have dropped, and businesses are bouncing back ...

7 AI Code Review Tools for Code Security Checks

Software development velocity has surged in the last three years.Continue reading on JavaScript in Plain English »

Survey: Organizations Are Too Confident in Their Cyber Resiliency

A global survey of 1,773 C-level executives, security professionals and security and technical directors finds nearly all (95%) are confident in their ability to recover from a ransomware attack. Conducted by OpenText, the survey also notes that ...

Ensuring Data Integrity: Can NHIs Be the Key?

How Do Non-Human Identities (NHIs) Enhance Data Integrity? Can NHIs play a pivotal role in enhancing data integrity? Where organizations increasingly migrate to cloud environments, the necessity for robust cybersecurity measures becomes ...

Feel Supported: Enhancing IAM with NHIs

How Can Organizations Seamlessly Enhance IAM with NHIs? An important consideration is how organizations can enhance Identity and Access Management (IAM) with Non-Human Identities (NHIs). With businesses accelerate their move to cloud ...

Building an Impenetrable Cloud with NHI Strategies

How Secure Are Your Cloud-Based Systems With NHI Management? Where data breaches are becoming increasingly common, how secure are your organization’s machine identities? With the rise of Non-Human Identities (NHIs), ensuring airtight security ...

Smart Secrets Management for Effective Risk Reduction

Why Are Non-Human Identities the Key to Smart Secrets Management? Have you considered the role of Non-Human Identities (NHIs) in secrets management? Where digital ecosystems become increasingly complex, protecting these machine identities becomes ...

250 Episodes of Cloud Security Podcast by Google: From Confidential Computing to AI-Ready SOC

Gemini for Docs improvises So this may suck, but I am hoping to at least earn some points for honesty here. I wanted to write something pithy and smart once I realized our Cloud Security Podcast by Google just aired our 250th episode (“EP250 ...

Securing AI-Generated Code: What Does It Look Like in Practice?

Get details on our recent survey on the security of AI-generated code. The post Securing AI-Generated Code: What Does It Look Like in Practice? appeared first on Security Boulevard.

Smarter Connectivity

Product Update: Version 5.2 This release focuses on giving you more control over your infrastructure connections and ensuring your monitoring tools run smoother than ever. From enhanced circuit management and expanded search capabilities to ...

NDSS 2025 – Understanding And Detecting Harmful Memes With Multimodal Large Language Models

SESSION Session 2A: LLM Security Authors, Creators & Presenters: Yong Zhuang (Wuhan University), Keyan Guo (University at Buffalo), Juan Wang (Wuhan University), Yiheng Jing (Wuhan University), Xiaoyang Xu (Wuhan University), Wenzhe Yi (Wuhan ...

Survey: Cybersecurity Leaders Much More Concerned About AI Generated Code

A survey of 400 cybersecurity leaders in the U.S. and United Kingdom published today finds all respondents reporting that AI tools are now generating code in their organization’s code base, with just under a third now seeing those tools being ...

Google uncovers malware using LLMs to operate and evade detection

PromptLock, the AI-powered proof-of-concept ransomware developed by researchers at NYU Tandon and initially mistaken for an active threat by ESET, is no longer an isolated example: Google’s latest report shows attackers are now creating and ...

Randall Munroe’s XKCD ‘’Physics Paths”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Physics Paths” appeared first on Security Boulevard.

Why Agentic AI Needs Guardrails to Thrive

5 min readAgentic AI systems need comprehensive guardrails to deploy safely at scale. Learn how access controls, policy frameworks, and visibility enable automation. The post Why Agentic AI Needs Guardrails to Thrive appeared first on Aembit. The ...

The Promise and Perils of Agentic AI: Autonomy at Scale

7 min readExplore the profound shift to agentic AI, its unprecedented automation capabilities, and the critical security and governance challenges it introduces. Learn how to secure autonomous systems. The post The Promise and Perils of Agentic ...

Rethinking Cyber Resilience in the Age of AI

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data ...

Best Application Security Testing Services to Know

Discover the best Application Security Testing (AST) services in 2025. The post Best Application Security Testing Services to Know appeared first on Security Boulevard.