Application Security News and Articles


API Key Security: 7 Enterprise-Proven Methods to Prevent Costly Data Breaches

In this blog, we will navigate through a few enterprise-proven methods to make API key more secure. Read on! The post API Key Security: 7 Enterprise-Proven Methods to Prevent Costly Data Breaches appeared first on Security Boulevard.

NDSS 2025 – Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China

SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab), Jade Sheffey (UMass Amherst), David Fifield (None), Amir Houmansadr ...

NDSS 2025 – Heimdall: Towards Risk-Aware Network Management Outsourcing

SESSION Session 3A: Network Security 1 Authors, Creators & Presenters: Yuejie Wang (Peking University), Qiutong Men (New York University), Yongting Chen (New York University Shanghai), Jiajin Liu (New York University Shanghai), Gengyu Chen ...

Emulating the Destructive Sandworm Adversary

AttackIQ has released a new assessment template designed to emulate the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with a recent intrusion targeting Ukrainian organizations that aligns with patterns previously ...

In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty

Other noteworthy stories that might have slipped under the radar: EchoGram attack undermines AI guardrails, Asahi brewer still crippled after ransomware attack, Sora 2 system prompt uncovered. The post In Other News: Deepwatch Layoffs, macOS ...

Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims

Anthropic threat researchers believe that they’ve uncovered and disrupted the first documented case of a cyberattack executed with the help of its agentic AI and minimal human intervention. “The threat actor manipulated ...

Anthropic Claude AI Used by Chinese-Back Hackers in Spy Campaign

AI vendor Anthropic says a China-backed threat group used the agentic capabilities in its Claude AI model to automate as much as 90% of the operations in a info-stealing campaign that presages how hackers will used increasingly sophisticated AI ...

Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks

Learn why you should revise your Akira ransomware protection plans. Plus, find out what’s new in OWASP’s revamped Top 10 Web Application Risks list. Also, find out about agentic AI’s cognitive degradation risk. And get the latest on AI ...

The Best Platforms for Enterprise Cyber Risk Management

Enterprises today face unprecedented cyber threats: AI-driven attacks, expanding digital footprints, complex supply chains, and rising regulatory expectations across the U.S., EU, and APAC. As cyber risk becomes a top-three business risk for ...

Checkout.com Discloses Data Breach After Extortion Attempt

The information was stolen from a legacy cloud file storage system, not from its payment processing platform. The post Checkout.com Discloses Data Breach After Extortion Attempt appeared first on SecurityWeek.

Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

The media company admitted that cybercriminals attempted to extort a payment after stealing personal information.  The post Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack appeared first on SecurityWeek.

A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn

A suspected (but currently unidentified) zero-day vulnerability in Fortinet FortiWeb is being exploited by unauthenticated attackers to create new admin accounts on vulnerable, internet-facing devices. Whether intentionally or accidentally, the ...

Akira Ransomware Group Made $244 Million in Ransom Proceeds

Akira was seen exploiting SonicWall vulnerabilities and encrypting Nutanix Acropolis Hypervisor (AHV) VM disk files this year. The post Akira Ransomware Group Made $244 Million in Ransom Proceeds appeared first on SecurityWeek.

The Role of Humans in an AI-Powered World

As AI capabilities grow, we must delineate the roles that should remain exclusively human. The line seems to be between fact-based decisions and judgment-based decisions. For example, in a medical context, if an AI was demonstrably better at ...

EasyDMARC Integrates with Splunk

Originally published at EasyDMARC Integrates with Splunk by EasyDMARC. Streamline security monitoring. Centralize email threat data. EasyDMARC ... The post EasyDMARC Integrates with Splunk appeared first on EasyDMARC. The post EasyDMARC ...

The Future of Passwords: Kill Them in the Flow, Keep Them in the Constitution 

Passkeys beat passwords in security and usability, but recovery gaps create new risks. Explore why digital identity still needs a constitutional backstop beyond passkeys. The post ...

15 Best Vibe Coding Tools and Editors To Use in 2026

AI has changed how teams develop software products. Instead of writing every line inside a traditional IDE, developers now describe what they want and let...Read More The post 15 Best Vibe Coding Tools and Editors To Use in 2026 appeared first on ...

Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 

A financially motivated threat actor automated the package publishing process in a coordinated tea.xyz token farming campaign. The post Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign  appeared first on SecurityWeek.

Security Degradation in AI-Generated Code: A Threat Vector CISOs Can’t Ignore

A new study shows LLMs introduce more vulnerabilities with each code iteration, highlighting critical risks for CISOs and the need for skilled human oversight. The post Security Degradation in AI-Generated Code: A Threat Vector CISOs Can’t ...

Imunify360 Vulnerability Could Expose Millions of Sites to Hacking

A vulnerability in ImunifyAV can be exploited for arbitrary code execution by uploading a malicious file to shared servers. The post Imunify360 Vulnerability Could Expose Millions of Sites to Hacking appeared first on SecurityWeek.