Application Security News and Articles


Workday Data Breach Bears Signs of Widespread Salesforce Hack

Workday appears to have joined the list of major companies that had their Salesforce instances targeted by hackers.  The post Workday Data Breach Bears Signs of Widespread Salesforce Hack appeared first on SecurityWeek.

DOJ Seizes $2.8 Million, Indicts Alleged Zeppelin Ransomware Operator

U.S. authorities seized $2.8 million crypto and $70,000 from Ianis Aleksandrovich Antropenko, who they say used the Zeppelin ransomware to attack companies in the United States and elsewhere and then laundered the cryptocurrency used to pay the ...

US Seizes $2.8 Million From Zeppelin Ransomware Operator

The US has indicted Zeppelin ransomware operator Ianis Antropenko, seizing over $2.8 million in cryptocurrency from his wallet. The post US Seizes $2.8 Million From Zeppelin Ransomware Operator appeared first on SecurityWeek.

DARPA AI Cyber Challenge Winners Impress With Quick, Scalable Patching 

Winners of DARPA’s AI Cyber Challenge proved AI can automate patching at scale. Their tools will go open source, offering defenders new power—but also raising concerns about AI-fueled exploits. The post DARPA AI Cyber Challenge Winners ...

Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets

Chinese APT UAT-7237 has been targeting Taiwanese web infrastructure for long-term access to high-value entities. The post Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets appeared first on SecurityWeek.

Secure Software Development – Why It Matters

Secure Software Development – Why It Matters to Every UK SMB (Even If You Don’t Write Code) When most small and medium-sized businesses (SMBs) hear “secure development,” they think: “That doesn’t apply to us, we don’t build apps or ...

Do We Have a CISO Payola Problem?

Pay-for-access dinners. Equity asks. Quiet kickbacks. The CISO payola problem is real — and it’s threatening the integrity of cybersecurity leadership. The post Do We Have a CISO Payola Problem? appeared first on Security Boulevard.

How security teams are putting AI to work right now

AI is moving from proof-of-concept into everyday security operations. In many SOCs, it is now used to cut down alert noise, guide analysts during investigations, and speed up incident response. What was once seen as experimental technology is ...

Buttercup: Open-source AI-driven system detects and patches vulnerabilities

Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits, it recently earned second place in DARPA’s AI Cyber Challenge (AIxCC). Main components Buttercup is ...

Review: Data Engineering for Cybersecurity

Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the flood of logs, events, and telemetry they collect. About the author James Bonifield has a decade of experience analyzing ...

Weak alerting and slipping prevention raise risk levels for CISOs

Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft prevention has dropped to 3 percent, password cracking success rates have nearly doubled, and ...

Bridging the AI model governance gap: Key findings for CISOs

While most organizations understand the need for strong AI model governance, many are still struggling to close gaps that could slow adoption and increase risk. The findings of a new Anaconda survey of more than 300 AI practitioners and ...

The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages

In this episode we’re discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million ...

How Secure Are Your Machine Identities in the Cloud?

Are Your Machine Identities Secure in the Cloud? More and more organizations are shifting their operations to the cloud. While this move optimizes business processes and enhances productivity, it also presents new challenges. One of the top ...

Empowering SOC Teams with Advanced NHIDR Solutions

Can Non-Human Identity and Data Rights Solutions Revolutionize Your Cybersecurity Protocol? Non-Human Identities (NHIs) are proving to be fundamental. When data breaches escalate both in frequency and impact, a renewed focus has shifted towards ...

Are Your Travel Data Secrets Truly Protected?

Is Your Travel Organization Safeguarding Its Precious Data? With cybersecurity increasingly becomes a topic of concern in every industry, the travel sector isn’t exempted. The pressing question is, “Are your travel data secrets truly ...

BSidesSF 2025: The Product Security Imperative: Lessons From CISA

Creator, Author and Presenter: Jack Cable Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...

GPT-5 vs Gemini Pro 2.5 vs Sonnet 4: Detecting Simple Vulnerabilities

Testing how GPT-5, Gemini Pro 2.5, and Sonnet 4 handle basic security flawsContinue reading on Medium »

NSF and NVIDIA Partner to Enable Fully Open AI Models

The National Science Foundation announced a new partnership with NVIDIA this past week that will enable advances in scientific discovery through artificial intelligence. The post NSF and NVIDIA Partner to Enable Fully Open AI Models appeared ...

Week in review: 2 threat actors exploiting WinRAR 0-day, Microsoft fixes “BadSuccessor” Kerberos flaw

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: WinRAR zero-day was exploited by two threat actors (CVE-2025-8088) The RomCom attackers aren’t the only ones that have been leveraging the ...