Application Security News and Articles


Are Passkeys Ready for Use in Enterprises?

Explore the readiness of passkeys for enterprise use. Learn about FIDO2, WebAuthn, phishing resistance, and the challenges of legacy IT integration. The post Are Passkeys Ready for Use in Enterprises? appeared first on Security Boulevard.

Connection String Parameter Pollution — SSC Fortify Security Findings Analysis — Part 4

“Your database connection is a bridge — don’t let attackers rebuild it mid-crossing.”Continue reading on Medium »

Best of 2025: CVE-2025-29927 – Understanding the Next.js Middleware Vulnerability

When security vulnerabilities appear in popular frameworks, they can affect thousands of websites overnight. That’s exactly what’s happening with a newly discovered vulnerability in Next.js – one of the most... The post CVE-2025-29927 – ...

Best of 2025: Google Gemini AI Flaw Could Lead to Gmail Compromise, Phishing

Researchers discovered a security flaw in Google's Gemini AI chatbot that could put the 2 billion Gmail users in danger of being victims of an indirect prompt injection attack, which could lead to credentials being stolen or phishing attacks. The ...

A Happy, Prosperous & Safe New Year 2026 Wish To You And Yours

via Photographer Marjory Collins in New York City, NY, USA, January 1943. Blowing Horns on Bleeker Street, New Year's Day Permalink The post A Happy, Prosperous & Safe New Year 2026 Wish To You And Yours appeared first on Security Boulevard.

How SaaS Management Reduces Organizational Risk and Improves GRC Outcomes

As enterprises increasingly rely on SaaS applications to run critical business functions, risk management and compliance challenges are becoming more complex and less visible. Traditional governance models were not designed to account for the ...

Granular attribute-based access control for context window injections

Learn how granular attribute-based access control (ABAC) prevents context window injections in AI infrastructure using quantum-resistant security and MCP. The post Granular attribute-based access control for context window injections appeared ...

How are SOC teams empowered by advanced Machine Identity Management

How Can Machine Identity Management Optimize Security Operations? In cybersecurity, how can organizations effectively minimize risks associated with unmanaged Non-Human Identities (NHIs)? Where businesses continue to depend heavily on cloud ...

How adaptable are Secrets Scanning systems to new threats

How Do You Secure Non-Human Identities in a World of Evolving Cyber Threats? Non-Human Identities (NHIs) have become a focal point for security teams across various industries. These machine identities, which involve granting secrets like ...

What features in IAM solutions make IT managers feel relieved

What Makes Identity and Access Management Solutions a Game-Changer for IT Managers? Is your IT team constantly battling with cybersecurity threats while struggling to maintain operational efficiency? Ensuring the security of non-human identities ...

Why are cybersecurity experts excited about the latest in Secrets Vaulting

Is Your Organization Ready to Embrace the Latest in Secrets Vaulting? Secrets vaulting is emerging as a crucial element. But what exactly is secrets vaulting, and why are cybersecurity experts so excited about its potential? While we delve into ...

Top 10 Cybersecurity Predictions for 2026

Top 10 Cybersecurity Predictions for 2026 The year AI changes cybersecurity forever Cybersecurity predictions are an opportunity to look forward instead of back, to be proactive instead of reactive, and to consider how changes in attackers, ...

NDSS 2025 – • Decentralized Infrastructure For Sharing Trusted Encrypted Facts And Nothing More

Session 7C: Secure Protocols Authors, Creators & Presenters: Sofia Celi (Brave Software), Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa), Hamed Haddadi (Imperial College London & Brave Software), Gonçalo Pestana ...

Randall Munroe’s XKCD ‘Inverted Catenaries’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Inverted Catenaries’ appeared first on Security Boulevard.

NDSS 2025 – Impact Tracing: Identifying The Culprit Of Misinformation In Encrypted Messaging Systems

Session 7C: Secure Protocols Authors, Creators & Presenters: Zhongming Wang (Chongqing University), Tao Xiang (Chongqing University), Xiaoguo Li (Chongqing University), Biwen Chen (Chongqing University), Guomin Yang (Singapore Management ...

Communicating AI Risk to the Board With Confidence | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Communicating AI Risk to the Board With Confidence | Kovrr appeared first on Security Boulevard.

Best of 2025: News alert: SquareX research finds browser AI agents are proving riskier than human employees

Palo Alto, Calif., Jun. 30, 2025, CyberNewswire–Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareX’s research reveals that Browser AI Agents are more likely to ...

SHARED INTEL Q&A: Why Data Bill of Materials (DBOM) is surfacing as a crucial tool to secure AI

Enterprises hustling to embed AI across their operations came to an uncomfortable realization in 2025: they lost track of the data powering those systems. Related: The case for SBOM Few paused to map where sensitive data lived or how it … ...

Best of 2025: NOT-So-Great Firewall: China Blocks the Web for 74 Min.

HTTPS connections on port 443 received forged  replies. Chinese web users couldn’t access websites outside the People’s Republic yesterday. The outage lasted an hour and a quarter—with no explanation. Nobody’s sure whether it was a ...

Top Data Breaches of December 2025

December 2025 closed the year with several high-impact data breaches across retail, education, healthcare research, and telecom. These incidents were not driven by a single cause. Some stemmed from misconfigured... The post Top Data Breaches of ...