Application Security News and Articles


New infosec products of the week: June 20, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Dashlane, Sumsub, and Jumio. Dashlane’s AI model alerts businesses to phishing risks In contrast to rule-based filters or reliance on a threat ...

A New Identity Playbook for AI Agents: Securing the Agentic User Flow

Artificial intelligence has reached an inflection point. AI agents are no longer just service accounts or background processes. They’re decision-makers, workflow executors, and digital delegates—acting autonomously across APIs, clouds, and ...

The Identity Gaps in Agentic AI: 9 Problems We Must Solve to Secure the Future

AI agents have evolved from passive tools into proactive actors—making decisions, executing transactions, and interacting with APIs autonomously. Unlike traditional non-human identities (NHI) that serve narrow, static purposes, agentic ...

Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security | Impart Security

Understanding EchoLeak: What This Vulnerability Teaches Us About AI Security The recent disclosure of EchoLeak by Aim Labs marks a significant milestone in AI security research. As the first documented zero-click exploit targeting a production AI ...

Why AI Agents Deserve 1st Class Identity Management

Artificial intelligence is no longer just about passive assistants or chatbots that wait for human instructions. We’re in the agentic era—where AI agents reason, plan, take initiative, and act autonomously. These agents don’t just help ...

Agents Are People Too: The Identity Gaps That Put AI Agents—and Enterprises—at Risk

AI agents have crossed a threshold. They’re no longer just tools waiting for instructions. They reason, plan, act, and collaborate autonomously—often across systems and domains, without direct human oversight. Gartner predicts that by 2026, ...

Be Optimistic About the Future of Secrets Management

Can Optimism Shape the Future of Secrets Management? Secrets management has become vital to ensure the safety and integrity of precious information. We are addressing the future of secrets management through a lens of optimism. But why optimism? ...

LinuxFest Northwest: How To Linuxfest

Author/Presenter: Angela Fischer (Jupiter Broadcasting Co-Owner) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their ...

Juneteenth National Independence Day 2025

Juneteenth National Independence Day 2025 Permalink The post Juneteenth National Independence Day 2025 appeared first on Security Boulevard.

Smarter Data Center Capacity Planning for AI Innovation

The rise of advanced technologies like AI, IoT, and edge computing is reshaping data center operations, demanding greater efficiency, scalability, and sustainability. Data center managers must prioritize proactive strategies that ensure uptime, ...

How Financial Institutions Can Meet DORA Compliance with Crypto-Agility

Today’s financial systems are highly digital and deeply interconnected. That’s great until something breaks. Whether it’s ransomware paralyzing critical services or cryptographic vulnerabilities quietly eroding trust, disruptions are no ...

Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War

Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates. The post Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War appeared first on ...

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report

Alphabet Inc.’s Google’s proposed $32 billion acquisition of cloud security startup Wiz is drawing early-stage antitrust scrutiny from the Department of Justice. The all-cash deal, which would integrate Wiz into Google Cloud, has ...

Unpacking the Verizon 2025 Data Breach Investigations Report

Verizon released its annual Data Breach Investigations Report a few weeks ago, and as always, it has been a pleasure to read it. Not just for the facts and statistics but also the subtle humor that makes reading a 100-plus-page document ...

LinuxFest Northwest: Running WASM Workloads On k8s: The Future Of Cloud-Native Apps

Author/Presenter: Christopher Valerio (Senior Software Engineer, Veritas Automata) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for ...

The Complete Guide to Programmatic SEO

Programmatic SEO has emerged as the most powerful strategy for scaling organic traffic. Companies like Zapier (5.8M monthly visits) and Wise (60M+ visits) use automated page creation to dominate search results. This guide reveals how to implement ...

Data Resilience in a Post-Quantum World

As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting ...

New Campaigns Distribute Malware via Open Source Hacking Tools

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools. The post New Campaigns Distribute Malware via Open Source Hacking Tools appeared first on SecurityWeek.

Chain IQ, UBS Data Stolen in Ransomware Attack

A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies. The post Chain IQ, UBS Data Stolen in Ransomware Attack appeared first on SecurityWeek.

Encryption Backdoors: The Security Practitioners’ View

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high. The post Encryption Backdoors: The Security Practitioners’ View appeared ...