Application Security News and Articles


What to do when there are vulnerabilities in GenAI code?

Vulnerabilities in generative AI (GenAI) code are a significant and growing problem. While GenAI can accelerate productivity by automating…Continue reading on Medium »

What to do when there are vulnerabilities in GenAI code?

Vulnerabilities in generative AI (GenAI) code are a significant and growing problem. While GenAI can accelerate productivity by automating…Continue reading on Medium »

Cybersecurity AI (CAI): Open-source framework for AI security

Cybersecurity AI (CAI) is an open-source framework that helps security teams build and run AI-driven tools for offensive and defensive tasks. It’s designed for anyone working in security, including researchers, ethical hackers, IT staff, and ...

Kubernetes matures as AI and GitOps reshape operations

Kubernetes has moved well past its early adoption phase. The new Komodor 2025 Enterprise Kubernetes Report shows that technical teams are shifting their focus from running containers to managing a growing mix of AI workloads and advanced ...

AI needs ethics to avoid real-world harm

In this Help Net Security video, Brittany Allen, Senior Trust and Safety Architect at Sift, explores how the rise of AI agents is creating new fraud risks. She explains how these agents, while designed to assist users, can unintentionally help ...

Situational Awareness & Family Safety: Staying Alert in Today’s World with Andy Murphy

Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, ...

OpenID Foundation sets new standards for real-time security event sharing

The OpenID Foundation (OIDF) has approved three Final Specifications, establishing the first global standards for real-time security event sharing across digital identity systems. The approved Final Specifications are: OpenID Shared Signals ...

Budget-Friendly Secrets Management Strategies

Why Are Non-Human Identities Critical for Budget-Friendly Security? How can organizations maintain a fortified security posture while staying within budget constraints? This challenge is particularly pressing when considering the management of ...

Airport Cyberattack Disrupts More Flights Across Europe

The cyberattack affected software of Collins Aerospace, whose systems help passengers check in, print boarding passes and bag tags, and dispatch their luggage. The post Airport Cyberattack Disrupts More Flights Across Europe appeared first on ...

DEF CON 33: Mobile Hacking Community

Creators, Authors and Presenters: d3dbot, Mobile Hacking Community Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events ...

The Silent Threat: How Misconfigurations Fuel the Cyber Crime Economy

Billions of records are breached each year as a result of misconfigured servers, firewalls and other network devices. What can be done? Let’s explore. The post The Silent Threat: How Misconfigurations Fuel the Cyber Crime Economy appeared first ...

Week in review: Chrome 0-day fixed, npm supply chain attack, LinkedIn data used for AI

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most enterprise AI use is invisible to security teams Most enterprise AI activity is happening without the knowledge of IT and security teams. ...

Steps to Achieve Enterprise Readiness for Software

A detailed guide for CTOs and VP of Engineering on achieving enterprise readiness for software, covering security, scalability, compliance, and integration. The post Steps to Achieve Enterprise Readiness for Software appeared first on Security ...

Vulnerability Management and Remediation Solutions

Explore vulnerability management and remediation solutions for enterprise SSO and CIAM. Learn to protect your systems from cyber threats with effective strategies. The post Vulnerability Management and Remediation Solutions appeared first on ...

Using Smartphone Cameras for Easy Eye Vein Verification

Discover how smartphone cameras can be used for easy eye vein verification. Learn about the software development, security, and future trends of this biometric authentication method. The post Using Smartphone Cameras for Easy Eye Vein ...

Feel Reassured with Comprehensive Secrets Scanning

Are You Leveraging Non-Human Identities for Optimal Security? The increasing prevalence of Non-Human Identities (NHIs) presents both opportunities and challenges for cybersecurity professionals. These machine identities are critical components of ...

Enhancing Your Team’s Capabilities in NHIDR

How Secure Are Your Organization’s Machine Identities? Have you ever considered the sheer number of machine identities roaming within your organization’s networks, each carrying sensitive secrets that require careful management? Where threats ...

SonarQube Cloud: OIv

1. SonarQube CloudContinue reading on Medium »

Cyberattack Disrupts Check-In Systems at Major European Airports

The disruptions to airport electronic systems meant that only manual check-in and boarding was possible. The post Cyberattack Disrupts Check-In Systems at Major European Airports appeared first on SecurityWeek.

DEF CON 33: One Modem To Brick Them All -Vulns In EV Charging Comms

Creators, Authors and Presenters: Jan Berens, Marcell Szakaly Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at ...