Application Security News and Articles


Empowering Teams with Better Secrets Management

Why is Secrets Management a Strategic Imperative? Why are global businesses increasingly focusing on secrets management? Intricate digital and growing cyber threats have led to an urgent need for better security protocols. And secrets management ...

De-identifying test data: K2View’s entity modeling vs Tonic’s native modeling

The process of de-identifying test databases can be approached in a variety of ways, and we’re often asked how our approach differs as compared to others. In this article, we’ll explore how our approach differs from that of “Data Product ...

BSidesSF 2025: Shadow IT Battlefield: The CyberHaven Breach And Defenses That Worked

Creators, Authors and Presenters: Rohit Bansal, Zach Pritchard Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

The Coding Personalities of Leading LLMs—GPT-5 update

GPT-5’s arrival on the scene adds an important new dimension to the landscape, so we have updated our analysis to include it. The post The Coding Personalities of Leading LLMs—GPT-5 update appeared first on Security Boulevard.

Emulating the Expedited Warlock Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by Warlock ransomware, which emerged in June 2025. Beginning in July, Warlock operators have primarily targeted internet-exposed, unpatched on-premises Microsoft ...

Critical Flaws in Base44 Exposed Sensitive Data and Allowed Account Takeovers

Our research uncovered multiple critical vulnerabilities in Base44, an AI-powered platform that lets you turn any idea into a fully functional custom app. These flaws ranged from an open redirect that leaked access tokens, to stored cross-site ...

TDL001 | Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski

Summary “The Defenders Log” Episode 1 features host David Redekop and guest Chet Wisniewski discussing the dynamic world of cybersecurity. Wisniewski, with decades of experience, traces his journey from early BBS and phone network exploration ...

DigiCert Discloses Details of Two Massive DDoS Attacks

DigiCert revealed today that over the last month it has thwarted two separate distributed denial of service (DDoS) attacks that peaked at more than 2.4 and 3.7 terabits per second (Tbps). Carlos Morales, senior vice president and general manager ...

Randall Munroe’s XKCD ‘Where Babies Come From’

via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Where Babies Come From’ appeared first on Security Boulevard.

Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect

AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication. The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek.

Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign

Google says the hackers systematically exported corporate data, focusing on secrets such as AWS and Snowflake keys. The post Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign appeared first on SecurityWeek.

The Nx “s1ngularity” Attack: Inside the Credential Leak

On August 26, 2025, Nx, the popular build platform with millions of weekly downloads, was compromised with credential-harvesting malware. Using GitGuardian's monitoring data, we analyzed the exfiltrated credentials and reconstructed a fuller ...

China-Linked Hackers Hijack Web Traffic to Deliver Backdoor

Google researchers say China-linked UNC6384 combined social engineering, signed malware, and adversary-in-the-middle attacks to evade detection. The post China-Linked Hackers Hijack Web Traffic to Deliver Backdoor appeared first on SecurityWeek.

BSidesSF 2025: Shadow IT Battlefield: The CyberHaven Breach And Defenses That Worked

Creators, Authors and Presenters: Rohit Bansal, Zach Pritchard Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...

Hundreds of Salesforce customer orgs hit in clever attack with potentially huge blast radius

A threat group Google tracks as UNC6395 has pilfered troves of data from Salesforce corporate instances, in search of credentials that can be used to compromise those organizations’ environments. “[Google Threat Intelligence Group] ...

AI is becoming a core tool in cybercrime, Anthropic warns

A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings suggest that AI is now embedded across the full attack cycle, from reconnaissance and malware development to fraud and extortion. ...

AI, Malware, and the Rise of Software Development Infiltration

For years, security teams focused on defending against malicious code injected into open source projects and package repositories. At Sonatype, we've tracked espionage campaigns, shadow downloads, and targeted malware designed to compromise ...

Email Security’s Blind Spot: Hidden Threats in Attachments

The post Email Security’s Blind Spot: Hidden Threats in Attachments appeared first on Votiro. The post Email Security’s Blind Spot: Hidden Threats in Attachments appeared first on Security Boulevard.

How to Assess Your Organization’s Cyberfraud Protection Maturity & Readiness

Discover how to assess and advance your cyberfraud protection maturity with practical strategies and the Cyberfraud Protection Maturity Model for CISOs. The post How to Assess Your Organization’s Cyberfraud Protection Maturity & Readiness ...

Nevada State Offices Closed Following Disruptive Cyberattack

State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected. The post Nevada State Offices Closed Following Disruptive Cyberattack appeared first on SecurityWeek.