Application Security News and Articles


Top 10 Emerging Technology Trends to Watch in 2026 and Beyond

Picture this: it’s 2026. You’re in a meeting or sketching your next big product, and somewhere, silently, AI agents are negotiating workflows, your codebase is...Read More The post Top 10 Emerging Technology Trends to Watch in 2026 and Beyond ...

Inside the F5 Breach

On October 15, 2025, F5 publicly confirmed that its internal systems had been compromised by what it described as a highly sophisticated, nation-state threat actor. The attacker gained access to development environments, exfiltrated source code ...

Get Your Developers Back to Work

Unused and dead code and Java vulnerabilities are making hard to get developers back to work. But there are ways. The post Get Your Developers Back to Work appeared first on Azul | Better Java Performance, Superior Java Support. The post Get ...

AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly

AISLE aims to automate the vulnerability remediation process by detecting, exploiting, and patching software vulnerabilities in real time. The post AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the ...

Matters.AI Raises $6.25 Million to Safeguard Enterprise Data

The company’s AI Security Engineer autonomously keeps enterprise data protected across devices and environments. The post Matters.AI Raises $6.25 Million to Safeguard Enterprise Data appeared first on SecurityWeek.

Organizations Warned of Exploited Adobe AEM Forms Vulnerability

A public PoC existed when Adobe patched the Experience Manager Forms (AEM Forms) bug in early August. The post Organizations Warned of Exploited Adobe AEM Forms Vulnerability appeared first on SecurityWeek.

AI and Cyber Control Assessment for Risk Visibility | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post AI and Cyber Control Assessment for Risk Visibility | Kovrr appeared first on Security Boulevard.

A Zero-day Incident Response Story from the Watchers on the Wall

When I woke up the morning of September 8, I didn’t have the foggiest idea what the day had prepared for me. The most terrifying part of being a security person is the first few minutes of your day when you check the dashboards. By mid-morning ...

Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking

Fuji Electric has released patches and Japan’s JPCERT has informed organizations about the vulnerabilities.  The post Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking appeared first on SecurityWeek.

Cisco Routers Hacked for Rootkit Deployment

Threat actors are exploiting CVE-2025-20352, a recent Cisco zero-day, to deploy a rootkit on older networking devices. The post Cisco Routers Hacked for Rootkit Deployment appeared first on SecurityWeek.

5 Ways CISOs can turn GRC into a profit center, not a cost center

For years, Governance, Risk, and Compliance (GRC) has been viewed as a necessary expense, an insurance policy for when things go wrong. But a new generation of CISOs is proving that when managed strategically, GRC can do far more than protect. It ...

API Attack Awareness: When Authentication Fails — Exposing APIs to Risk

Authentication issues seem like low-level attacks. But authentication today – especially API authentication – can be more difficult than people expect. Companies rely on APIs to carry sensitive information every day. If access to those APIs ...

US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin

The U.S. government has seized more than $14 billion in bitcoin and charged the founder of a Cambodian conglomerate in a massive cryptocurrency scam, accusing him and unnamed co-conspirators of exploiting forced labor to dupe would-be investors ...

Publishing Ballerina Static Analysis Results to GitHub and GitLab

Static code analysis has become an essential practice in modern software development, helping teams identify bugs, security…Continue reading on Medium »

Critical insights Q&A: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes

I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving privacy can be profitable In 2015, I sat down with Cisco’s privacy lead, Michelle Dennedy, who argued that privacy must be grounded in … ...

What Is Shadow AI and Why It Matters? – FireTail Blog

Oct 16, 2025 - Alan Fagan - What Is Shadow AI and Why It Matters | FireTail Blog Quick Facts: Shadow AI Shadow AI is when employees use AI tools within an organization without IT or compliance approval. Shadow AI often leads to data leaks, ...

The Impact of AI on Authentication

Exploring how AI enhances security and the threats it poses to authentication. The post The Impact of AI on Authentication appeared first on Security Boulevard.

Four-Year Prison Sentence for PowerSchool Hacker

Matthew Lane pleaded guilty in May to extorting two companies after hacking into their networks and stealing information. The post Four-Year Prison Sentence for PowerSchool Hacker appeared first on SecurityWeek.

F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts 

More information has come to light on the cyberattack disclosed this week by F5, including on attribution and potential risks. The post F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts  appeared first on SecurityWeek.

Unlock Passwordless Login on Bubble with MojoAuth: Next-Gen OpenID Connect (OIDC) Authentication

Set up MojoAuth Bubble plugin for secure passwordless login using magic link, OTP, or passkeys — no code, full OpenID Connect support. The post Unlock Passwordless Login on Bubble with MojoAuth: Next-Gen OpenID Connect (OIDC) Authentication ...