Application Security News and Articles


From Agent2Agent Prompt Injection to Runtime Self-Defense: How Wallarm Redefines Agentic AI Security

Is an AI-to-AI attack scenario a science fiction possibility only for blockbusters like the Terminator series of movies? Well, maybe not! Researchers recently discovered that one AI agent can “inject malicious instructions into a conversation, ...

3.5 Million Affected by University of Phoenix Data Breach

The University of Phoenix is one of the many victims of the recent Oracle EBS hacking campaign attributed to the Cl0p ransomware group. The post 3.5 Million Affected by University of Phoenix Data Breach appeared first on SecurityWeek.

Weak enforcement keeps PCI DSS compliance low

Payment card breaches continue to surface across industries, even after years of investment in security standards. A new study links this pattern to enforcement, showing that PCI DSS compliance trails behind HIPAA, GDPR, and the EU’s NIS2 ...

Formal proofs expose long standing cracks in DNSSEC

DNSSEC is meant to stop attackers from tampering with DNS answers. It signs records so resolvers can verify that data is authentic and unchanged. Many security teams assume that if DNSSEC validation passes, the answer can be trusted. New academic ...

AI code looks fine until the review starts

Software teams have spent the past year sorting through a rising volume of pull requests generated with help from AI coding tools. New research puts numbers behind what many reviewers have been seeing during work. The research comes from ...

Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

A cyberattack knocked France’s national postal service offline, blocking and delaying package deliveries and online payments. The post Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush appeared first on ...

Best API Vulnerability Scanner in 2026

APIs (Application Programming Interfaces) have become the digital backbone of modern enterprises, seamlessly linking mobile applications, cloud platforms, and partner ecosystems. As their adoption rapidly progresses, APIs have also emerged as one ...

Cloud security is stuck in slow motion

Cloud environments are moving faster than the systems meant to protect them. A new Palo Alto Networks study shows security teams struggling to keep up with development cycles, growing cloud sprawl, and attacker tactics that now compress breaches ...

Cybersecurity jobs available right now: December 23, 2025

Application Security Architect ARRISE | UAE | Hybrid – View job details As an Application Security Architect, you will define and mature the application security architecture strategy, standards, and guardrails across products and ...

Model Context Protocol (MCP) Vulnerability Assessment in a Post-Quantum Setting

Explore MCP vulnerabilities in a post-quantum world. Learn about PQC solutions, zero-trust architecture, and continuous monitoring for AI infrastructure security. The post Model Context Protocol (MCP) Vulnerability Assessment in a Post-Quantum ...

Can cyber attacks impact machine identities effectively

Are Your Machine Identities Safe from Cyber Attacks? Where digital footprints are rapidly expanding, the role of machine identities in cybersecurity has become increasingly significant. Machine identities, also known as non-human identities ...

What tools empower secure AI operation

How Essential is Non-Human Identity Management in Today’s Cybersecurity Landscape? Non-Human Identities (NHIs) are increasingly becoming pivotal. How effectively are organizations managing these machine identities to ensure secure AI operation? ...

How does NHIDR foster innovation in data security

How Are Non-Human Identities Transforming Data Security? What if the key to revolutionizing data security lies in machine identities rather than human vigilance? Non-Human Identities (NHIs) are reshaping cybersecurity by addressing the disconnect ...

How to confidently manage secrets in an AI-driven environment

Why Is Non-Human Identity Management Crucial in AI-Driven Environments? How do organizations ensure confident security for their AI-driven systems? With the surge in AI applications and cloud-based solutions, Non-Human Identities (NHIs) have ...

NDSS 2025 – ReDAN: An Empirical Study On Remote DoS Attacks Against NAT Networks

Session 7A: Network Security 2 Authors, Creators & Presenters: Xuewei Feng (Tsinghua University), Yuxiang Yang (Tsinghua University), Qi Li (Tsinghua University), Xingxiang Zhan (Zhongguancun Lab), Kun Sun (George Mason University), Ziqiang ...

Mend Leadership Update: Building on Our Momentum for the Next Phase of Growth

An update on Mend.io's leadership as we enter the next phase of growth. The post Mend Leadership Update: Building on Our Momentum for the Next Phase of Growth appeared first on Security Boulevard.

Vibe Coding Is Moving Faster Than Security – Market Research Agrees

  The post Vibe Coding Is Moving Faster Than Security – Market Research Agrees appeared first on Security Boulevard.

2026: Bringing Cyber Resiliency to Organizations

4 Surprising Truths from Verizon’s 2025 Data Breach Report That Change Everything  The annual release of the Verizon Data Breach Investigations Report (DBIR) is a major event in the cybersecurity calendar. For security professionals and ...

Randall Munroe’s XKCD ‘Chessboard Alignment’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Chessboard Alignment’ appeared first on Security Boulevard.

NDSS 2025 – GadgetMeter: Quantitatively And Accurately Gauging The Exploitability Of Speculative Gadgets

Session 6D: Software Security: Vulnerability Detection Authors, Creators & Presenters: Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci (University of Washington and Google), Shuwen ...