Application Security News and Articles


Avoid Python SAST scanners based on AI

What happened with blockchain technology is also happening with AI technology. Too many people believe that it is a solution for all hard…Continue reading on Medium »

Why Your Growing B2B Company Shouldn’t Build AI Infrastructure (And What to Do Instead)

Most growing B2B companies are making the same expensive mistake with AI that they made with cloud computing 15 years ago. Here's why building your own AI infrastructure will kill your competitive advantage and what smart leaders are doing ...

Top solutions to watch after Black Hat USA 2025

Black Hat USA 2025 was packed with innovation, with companies showing off tools built to get ahead of what’s coming next. From smarter offensive security to new ways of spotting attacks faster, the conference had no shortage of exciting ...

How to authenticate OpenAI Operator requests using HTTP message signatures

Cloudflare recently introduced a new authentication standard, HTTP message signatures, designed to securely verify automated traffic from known bot operators. OpenAI has adopted this standard in its OpenAI Operator product, which allows ChatGPT ...

Everything You Need to Know About the California Consumer Privacy Act (CCPA) in 2025

California Consumer Privacy Act (CCPA): CCPA and CPRA, Simplified On July 1, 2025, the California Attorney General settled with Healthline for $1.55 million, the highest CCPA-related fine to date, citing... The post Everything You Need to Know ...

Photos: Black Hat USA 2025

Here’s a look inside Black Hat USA 2025. The featured vendors are: Stellar Cyber, Vonahi Security, Gurucul, Check Point, HackerOne, EasyDMARC, Elastic, Google, Tines, Veracode, VioletX, Pentera, Keep Aware, Oleria, SpyCloud, and Picus ...

Has Cyber Been Infected With the Economic Malaise?

From the floor at #BlackHat2025: Cybersecurity has the blinking lights, but this year it also has blood in the water, writes Alan. The post Has Cyber Been Infected With the Economic Malaise? appeared first on Security Boulevard.

Beyond PQC: Building adaptive security programs for the unknown

In this Help Net Security interview, Jordan Avnaim, CISO at Entrust, discusses how to communicate the quantum computing threat to executive teams using a risk-based approach. He explains why post-quantum cryptography (PQC) is an urgent and ...

Match or trap? Online dating scams and other dangers to know

First comes swiping, then comes… scams? Online dating can lead to lasting love, but it can also open the door to heartbreak, fraud, and safety risks. Here’s what to watch out for so you can date smarter and safer.  The post Match or trap? ...

Cybercriminals are getting personal, and it’s working

Cybercriminals are deploying unidentifiable phishing kits (58% of phishing sites) to propagate malicious campaigns at scale, indicating a trend towards custom-made or obfuscated deployments, according to VIPRE Security. These phishing kits ...

Elastic AI SOC Engine helps SOC teams expose hidden threats

Elastic AI SOC Engine (EASE) is a new serverless, easy-to-deploy security package that brings AI-driven context-aware detection and triage into existing SIEM and EDR tools, without the need for an immediate migration or replacement. EASE delivers ...

AI can write your code, but nearly half of it may be insecure

While GenAI excels at producing functional code, it introduces security vulnerabilities in 45 percent of cases, according to Veracode’s 2025 GenAI Code Security Report, which analyzed code produced by over 100 LLMs across 80 real-world coding ...

Energy companies are blind to thousands of exposed services

Many of America’s largest energy providers are exposed to known and exploitable vulnerabilities, and most security teams may not even see them, according to a new report from SixMap. Researchers assessed the external attack surface of 21 major ...

News alert: SpyCloud’s AI-powered platform mimics veteran analysts, speeds threat detection

Austin, TX, Aug. 6, 2025, CyberNewswire: SpyCloud, the leader in identity threat protection, today announced a significant enhancement to its SaaS Investigations solution: the integration of advanced AI-powered insights that mirror the tradecraft ...

Cursor Remote Code Execution Vulnerability (CVE-2025-54135)

Overview Recently, NSFOCUS CERT detected that Cursor issued a security bulletin and fixed the Cursor remote code execution vulnerability (CVE-2025-54135); Because Cursor allows files to be written to the workspace without user approval, when an ...

Why the lifecycle of secrets defines your security posture

Over 39 million secrets were leaked on GitHub in 2024. Discover why most teams fail at secrets management and how lifecycle-aware practices can help. The post Why the lifecycle of secrets defines your security posture appeared first on Security ...

Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe

Why a secrets management strategy is now critical for modern security. The post Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe appeared first on Security Boulevard.

Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation

Zenity has shown how AI assistants such as ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein can be abused using specially crafted prompts. The post Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation appeared first ...

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities

CyberArk has patched several vulnerabilities that could be chained for unauthenticated remote code execution. The post Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities appeared first on SecurityWeek.

Project Red Hook: Chinese Gift Card Fraud at Scale

Project Red Hook is a Homeland Security Investigations operation examining how Chinese Organized Crime is committing wholesale Gift Card Fraud by using Chinese illegal immigrants to steal gift cards, reveal their PIN, reseal the cards, and return ...