Application Security News and Articles


LLM02: Sensitive Information Disclosure – FireTail Blog

May 08, 2025 - Lina Romero - In 2025, AI security is a relevant issue. With the landscape changing so rapidly and new risks emerging every day, it is difficult for developers and security teams to stay on top of AI security. The OWASP Top 10 ...

How SCIM Works: The REST API Powering Modern Identity Provisioning

This article is part of SSOJet's technical series on identity protocols and standards. For more information on implementing SCIM with SSOJet's turnkey SSO integration solution, visit our documentation or contact our support team. The post How ...

How to Unite Developers, DevOps, and Security Without Slowing Down

5 min readBuilders and protectors don’t have to clash – they just need a common path. The post How to Unite Developers, DevOps, and Security Without Slowing Down appeared first on Aembit. The post How to Unite Developers, DevOps, and Security ...

BSidesLV24 – Hacking Trust Establishment

Author/Presenter: Carrie Randolph Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

Enhancing Digital Identity: Insights and Updates on Security

Innovative ways to protect your accounts with passkeys and digital identities. Enhance security and streamline access today! The post Enhancing Digital Identity: Insights and Updates on Security appeared first on Security Boulevard.

Enhancing Software Teams Performance with AI and Social Drivers

How social drivers like trust and purpose can enhance software engineering team performance. Discover insights and actionable strategies today! The post Enhancing Software Teams Performance with AI and Social Drivers appeared first on Security ...

LockBit Ransomware Hacked: Database and Victim Chats Leaked

LockBit ransomware website hacked! Sensitive data leaked, including Bitcoin keys. Learn about the breach and how to secure your organization. The post LockBit Ransomware Hacked: Database and Victim Chats Leaked appeared first on Security Boulevard.

Model Context Protocol Adoption and C# SDK Integration in Java

Explore the growing adoption of the Model Context Protocol in Java, including key frameworks and security considerations. Discover more! The post Model Context Protocol Adoption and C# SDK Integration in Java appeared first on Security Boulevard.

Dev Proxy v0.27: New API Modeling and AI Features Released

Latest features in Microsoft Dev Proxy v0.27, including TypeSpec generation and Nested App Authentication. Enhance your development today! The post Dev Proxy v0.27: New API Modeling and AI Features Released appeared first on Security Boulevard.

SMBs Know They’re At Risk, but Most Aren’t Embracing AI

A survey by CrowdStrike finds the gap between SMB awareness of cyber threats and efforts by them to protect themselves is widening, with not enough of them spending the money needed on AI and other tools to defend against ransomware and other ...

A Q&A with Head of Security Solutions at Abraxas

The post A Q&A with Head of Security Solutions at Abraxas appeared first on AI Security Automation. The post A Q&A with Head of Security Solutions at Abraxas appeared first on Security Boulevard.

Hackers Are Spoilt for Choice: It’s Time to Focus on Data-Centric Security

Getting actionable intelligence about the data breach landscape isn’t always easy. Fortunately, the annual Verizon Data Breach Investigations Report (DBIR) is an exception to the rule. Based on the tech firm’s incident response engagements, ...

CAPTCHA in the Age of AI: Why It’s No Longer Enough

AI has made CAPTCHA obsolete—learn why the future of bot protection is invisible, intent-based, and powered by real-time AI. The post CAPTCHA in the Age of AI: Why It’s No Longer Enough appeared first on Security Boulevard.

The many variants of the ClickFix social engineering tactic

As new malware delivery campaigns using the ClickFix social engineering tactic are spotted nearly every month, it’s interesting to see how the various attackers are trying to refine the two main elements: the lure and the ...

How China’s Admission Reinforces the Urgency for AI-Powered, Preemptive Cybersecurity

In December, a senior Chinese cyber official offered what U.S. representatives took as tacit admission: China was behind a series of cyber intrusions targeting U.S. critical infrastructure. As reported by The Wall Street Journal, this ...

Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

British startup exits stealth with $20 million in seed-stage financing led by US investors Scout Ventures and Artis Ventures. The post Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech appeared first on SecurityWeek.

Leading Through Uncertainty: AI, Risk, and Real Talk from RSAC’s Women in Cyber

Recapping Synack's Women in Cyber panel: Inside the hard conversations about AI risk, hiring struggles, and why resilience The post Leading Through Uncertainty: AI, Risk, and Real Talk from RSAC’s Women in Cyber appeared first on Security ...

Indirect prompt injection attacks target common LLM data sources

While the shortest distance between two points is a straight line, a straight-line attack on a large language model isn't always the most efficient — and least noisy — way to get the LLM to do bad things. That's why malicious actors have been ...

Europol Announces More DDoS Service Takedowns, Arrests

Four people have been arrested in Poland and several websites associated with DDoS-for-hire services have been shut down. The post Europol Announces More DDoS Service Takedowns, Arrests appeared first on SecurityWeek.