Application Security News and Articles


Covenant Health Data Breach Impacts 478,000 Individuals

The Qilin ransomware group hacked the healthcare organization and stole data from its systems in May 2025.  The post Covenant Health Data Breach Impacts 478,000 Individuals appeared first on SecurityWeek.

Adobe ColdFusion Servers Targeted in Coordinated Campaign

GreyNoise has observed thousands of requests targeting a dozen vulnerabilities in Adobe ColdFusion during the Christmas 2025 holiday. The post Adobe ColdFusion Servers Targeted in Coordinated Campaign appeared first on SecurityWeek.

Top CVEs of December 2025

December 2025 was a brutal reality check for security teams. While most were winding down for the holidays, threat actors weaponized a tectonic shift in the landscape, headlined by the... The post Top CVEs of December 2025 appeared first on ...

Email-first cybersecurity predictions for 2026

Explore key cybersecurity predictions for 2026, from AI-powered phishing to DMARC enforcement, BIMI adoption, SPF and DKIM limits, Zero Trust, and automation. The post Email-first cybersecurity predictions for 2026 appeared first on Security ...

What shadow AI means for SaaS security and integrations

In this Help Net Security video, Jaime Blasco, CTO at Nudge Security, discusses why shadow AI matters to security teams. He describes how AI adoption happens in two ways, through company led programs and through employees choosing tools on their ...

From experiment to production, AI settles into embedded software development

AI-generated code is already running inside devices that control power grids, medical equipment, vehicles, and industrial plants. AI moves from experiment to production AI tools have become standard in embedded development workflows. More than ...

How AutoSecT Helps Security Teams Handle 1000+ Endpoints Effortlessly?

Managing security across 1000+ endpoints is no longer a scale problem alone; it is a complexity problem. Modern enterprise environments are dynamic, hybrid, and API-driven. Cloud workloads, remote employees, containerized services, and ...

Hospitals are drowning in threats they can’t triage

Healthcare is facing a rise in cyber threats driven by vulnerable medical devices, growing data exposure, and AI adoption. This article outlines the pressures, gaps, and decisions shaping healthcare’s security future. Data brokers are exposing ...

Post-Quantum Identity and Access Management for AI Agents

Secure your AI infrastructure with post-quantum identity and access management. Protect MCP deployments from quantum-enabled threats using PQC and zero-trust. The post Post-Quantum Identity and Access Management for AI Agents appeared first on ...

Types of Authentication: Complete Guide to Authentication Methods & Mechanisms

Explore various types of authentication methods including MFA, SSO, and Biometrics. Learn how to secure enterprise apps and prevent data breach. The post Types of Authentication: Complete Guide to Authentication Methods & Mechanisms appeared ...

Are Passkeys Ready for Use in Enterprises?

Explore the readiness of passkeys for enterprise use. Learn about FIDO2, WebAuthn, phishing resistance, and the challenges of legacy IT integration. The post Are Passkeys Ready for Use in Enterprises? appeared first on Security Boulevard.

Connection String Parameter Pollution — SSC Fortify Security Findings Analysis — Part 4

“Your database connection is a bridge — don’t let attackers rebuild it mid-crossing.”Continue reading on Medium »

Best of 2025: CVE-2025-29927 – Understanding the Next.js Middleware Vulnerability

When security vulnerabilities appear in popular frameworks, they can affect thousands of websites overnight. That’s exactly what’s happening with a newly discovered vulnerability in Next.js – one of the most... The post CVE-2025-29927 – ...

Best of 2025: Google Gemini AI Flaw Could Lead to Gmail Compromise, Phishing

Researchers discovered a security flaw in Google's Gemini AI chatbot that could put the 2 billion Gmail users in danger of being victims of an indirect prompt injection attack, which could lead to credentials being stolen or phishing attacks. The ...

A Happy, Prosperous & Safe New Year 2026 Wish To You And Yours

via Photographer Marjory Collins in New York City, NY, USA, January 1943. Blowing Horns on Bleeker Street, New Year's Day Permalink The post A Happy, Prosperous & Safe New Year 2026 Wish To You And Yours appeared first on Security Boulevard.

How SaaS Management Reduces Organizational Risk and Improves GRC Outcomes

As enterprises increasingly rely on SaaS applications to run critical business functions, risk management and compliance challenges are becoming more complex and less visible. Traditional governance models were not designed to account for the ...

Granular attribute-based access control for context window injections

Learn how granular attribute-based access control (ABAC) prevents context window injections in AI infrastructure using quantum-resistant security and MCP. The post Granular attribute-based access control for context window injections appeared ...

How are SOC teams empowered by advanced Machine Identity Management

How Can Machine Identity Management Optimize Security Operations? In cybersecurity, how can organizations effectively minimize risks associated with unmanaged Non-Human Identities (NHIs)? Where businesses continue to depend heavily on cloud ...

How adaptable are Secrets Scanning systems to new threats

How Do You Secure Non-Human Identities in a World of Evolving Cyber Threats? Non-Human Identities (NHIs) have become a focal point for security teams across various industries. These machine identities, which involve granting secrets like ...

What features in IAM solutions make IT managers feel relieved

What Makes Identity and Access Management Solutions a Game-Changer for IT Managers? Is your IT team constantly battling with cybersecurity threats while struggling to maintain operational efficiency? Ensuring the security of non-human identities ...