Application Security News and Articles


Rethinking Salesforce Risk: From Misconfigurations to SaaS Supply-Chain Attacks

For most of its life inside the enterprise, Salesforce was treated as “just” a critical application, a powerful CRM that needed strong profiles, roles, and sharing rules, and maybe some Shield features if you had the budget. That ...

Best of 2025: Microsoft’s January 2025 Patch Tuesday Addresses 157 CVEs (CVE-2025-21333, CVE-2025-21334, CVE-2025-21335)

10Critical 147Important 0Moderate 0Low Microsoft addresses 157 CVEs in the first Patch Tuesday release of 2025 and the largest Patch Tuesday update ever with three CVEs exploited in the wild, and five CVEs publicly disclosed prior to patches ...

Best of 2025: Blue Shield of California Data Breach Exposes 4.7M Members’ Info

Discover the Blue Shield of California data breach affecting 4.7M members. Learn about the risks and essential security measures to protect your data. The post Best of 2025: Blue Shield of California Data Breach Exposes 4.7M Members’ Info ...

The Engine Behind Santa’s Operation Center (SOC)

The post The Engine Behind Santa’s Operation Center (SOC) appeared first on AI Security Automation. The post The Engine Behind Santa’s Operation Center (SOC) appeared first on Security Boulevard.

ServiceNow to Acquire Armis for $7.75 Billion in Cash

Rumors of a possible buyout surfaced earlier this month, with the official announcement coming just weeks after Armis announced raising $435 million. The post ServiceNow to Acquire Armis for $7.75 Billion in Cash appeared first on SecurityWeek.

How to sanitize production data for use in testing

Explore data sanitization techniques and discover how proper sanitization improves test accuracy, protects privacy, and supports secure software development. The post How to sanitize production data for use in testing appeared first on Security ...

The 3% Rule: How To Silence 97% of Your Cloud Alerts and Be More Secure

Prioritizing what to fix first and why that really matters Key takeaways The 97% distraction: Discover why the vast majority of your "Critical" alerts are just theoretical noise, and how focusing strictly on the 3% of findings that represent ...

Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits

Malware peddlers are targeting infosec enthusiasts, budding security professionals, and aspiring hackers with the Webrat malware, masquerading the threat as proof-of-concept (PoC) exploits for known vulnerabilities. Delivering the malware The ...

Nissan Confirms Impact From Red Hat Data Breach

The personal information of 21,000 customers was stolen after hackers compromised Red Hat’s GitLab instances. The post Nissan Confirms Impact From Red Hat Data Breach appeared first on SecurityWeek.

Feds Seize Password Database Used in Massive Bank Account Takeover Scheme

The cybercriminals attempted to steal $28 million from compromised bank accounts through phishing. The post Feds Seize Password Database Used in Massive Bank Account Takeover Scheme appeared first on SecurityWeek.

NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data

The package provides legitimate functionality to evade detection, while stealing users’ data and deploying a backdoor. The post NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data appeared first on SecurityWeek.

Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces Appeal

Italy’s antitrust authority fined Apple $116 million after determining that operating one of its privacy features restricted App Store competition. The post Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces ...

574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings

Authorities in Senegal, Ghana, Benin, and Cameroon dismantled BEC, ransomware, and other cyber-fraud networks. The post 574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings appeared first on SecurityWeek.

Building Secure User Portals for Content-Heavy SaaS Applications

Learn how to build secure user portals for content-heavy SaaS using passwordless authentication, RBAC, session security, and CDN protection. The post Building Secure User Portals for Content-Heavy SaaS Applications appeared first on Security ...

Episode 3: Bought the wrong proxies again, did an unboxing anyway

If you have been following this series (post 1 and post 2), you know the ritual by now. I buy proxies, they are not exactly what I expected, and instead of quietly moving on with my life, I decide to turn it into… whatever this has become. When ...

Firewalla expands AP7 control and MSP management with app 1.67 update

Firewalla has announced Firewalla App version 1.67, a major upgrade that focuses on enterprise-grade Wi-Fi security, deeper access point control, and more flexible management for MSPs, small businesses, and advanced home users. The new release ...

From Agent2Agent Prompt Injection to Runtime Self-Defense: How Wallarm Redefines Agentic AI Security

Is an AI-to-AI attack scenario a science fiction possibility only for blockbusters like the Terminator series of movies? Well, maybe not! Researchers recently discovered that one AI agent can “inject malicious instructions into a conversation, ...

3.5 Million Affected by University of Phoenix Data Breach

The University of Phoenix is one of the many victims of the recent Oracle EBS hacking campaign attributed to the Cl0p ransomware group. The post 3.5 Million Affected by University of Phoenix Data Breach appeared first on SecurityWeek.

Weak enforcement keeps PCI DSS compliance low

Payment card breaches continue to surface across industries, even after years of investment in security standards. A new study links this pattern to enforcement, showing that PCI DSS compliance trails behind HIPAA, GDPR, and the EU’s NIS2 ...

Formal proofs expose long standing cracks in DNSSEC

DNSSEC is meant to stop attackers from tampering with DNS answers. It signs records so resolvers can verify that data is authentic and unchanged. Many security teams assume that if DNSSEC validation passes, the answer can be trusted. New academic ...