Application Security News and Articles


UNC6395 and the Salesloft Drift Attack: Why Salesforce OAuth Integrations are a Growing Risk

A recent UNC6395 Salesloft Drift breach reveals Salesforce SaaS risks. Learn how to simplify breach detection, prevention, and visibility. The post UNC6395 and the Salesloft Drift Attack: Why Salesforce OAuth Integrations are a Growing Risk ...

Broadcom Extends Reach and Scope of Cybersecurity Portfolio

Broadcom today added a slew of cybersecurity updates, including a technology preview of an update to VMware vDefend that secures communications between artificial intelligence (AI) agents, promising to improve overall resiliency and automate ...

TDL003 | Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen

Summary This episode of the Defender’s Log features special guest Tommy Jensen, an internet technologist specializing in IPv6, Zero Trust, and standards. Jensen’s career path, from an AppleCare contractor to a key figure in advancing internet ...

Staying Ahead with Advanced NHI Detection?

Why is Advanced NHI Detection the Game Changer in Cybersecurity? Have you ever considered how Non-Human Identities (NHIs) impact your organization’s cybersecurity strategy? Protecting your business extends far beyond securing your employees’ ...

Is Your Secrets Vault Truly Impenetrable?

Unlocking the Real Value of Secrets Vault Security How much credence does your organization assign to secrets vault security? If you are operating in the cloud, the bulletproof protection of Non-Human Identities (NHIs) and their associated ...

BSidesSF 2025: State Of (Absolute) AppSec

Creator, Author and Presenter: Seth Law, Ariel Shin, Lakshmi Sudheer, Ken Johnson Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. ...

Zero Trust Security Is a Mindset, Not a Technology

Zero Trust security isn’t something you buy. It’s something you do. Or more accurately, it’s something you commit to doing every day, across every part of your network. If that... The post Zero Trust Security Is a Mindset, Not a Technology ...

What is Security Automation? Why Your Business Can’t Afford to Ignore It

The post What is Security Automation? Why Your Business Can’t Afford to Ignore It appeared first on AI Security Automation. The post What is Security Automation? Why Your Business Can’t Afford to Ignore It appeared first on Security Boulevard.

Microsoft’s New AI Risk Assessment Framework – A Step Forward

  Microsoft recently introduced a new framework designed to assess the security of AI models. It’s always encouraging to see developers weaving cybersecurity considerations into the design and deployment of emerging, disruptive technologies. ...

CVE-2025-7775: Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organizations are urged to patch immediately. Background On August 26, Citrix published a ...

Zero Trust Microsegmentation with ColorTokens’ Progressive Segmentation for IT and OT Convergence in Industry 4.0

The convergence of Information Technology (IT) and Operational Technology (OT) in Industry 4.0 (allows for smart manufacturing and the creation of intelligent factories) environments, such as manufacturing, energy, and critical infrastructure, ...

Farmers Group Loses 1.111M PII Rows: It’s Salesforce Again

ShinyHunters Hunt Again: Scattered Spider claims another Salesforce instance—albeit three months ago. The post Farmers Group Loses 1.111M PII Rows: It’s Salesforce Again appeared first on Security Boulevard.

BSidesSF 2025: WHOIS Your Daddy: Tracking Iranian-Backed Cyber Operations With Passive DNS

Creator, Author and Presenter: Austin Northcutt Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...

Beyond the Prompt: Building Trustworthy Agent Systems

Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight. The post Beyond the Prompt: Building Trustworthy Agent Systems appeared first on SecurityWeek.

When Connecting Your Security Data: Simplicity is Key

In this blog, you’ll learn how to add a source, route data to your destinations, and apply AI-recommended filtering rules in clicks, giving your team faster visibility and measurable cost savings. The post When Connecting Your Security Data: ...

Why Enterprises are Betting on Agile PODs to Build Their Next Billion-Dollar Product

Every enterprise claims they want to build the “next Tesla” or “next Amazon.” But here’s the uncomfortable truth: most of them are still running product...Read More The post Why Enterprises are Betting on Agile PODs to Build Their Next ...

SpyCloud Consumer IDLink unifies fragmented identity exposures

SpyCloud released the Consumer IDLink solution, designed to help financial institutions and other consumer-facing organizations reduce risk and prevent fraud stemming from consumer identity exposures. Consumer IDLink, delivered via API, uses ...

Cloud and IoT Security Platform

In today’s digital landscape, hybrid cloud security and IoT/OT cybersecurity are mission-critical. Gartner predicts that 90% of organizations will adopt a hybrid cloud approach by 2027, and industry reports show that roughly one in three data ...

NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)

Three new vulnerabilities affecting (Citrix) NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of which (CVE-2025-7775) has been targeted in zero-day attacks. “Exploits of CVE-2025-7775 on ...

The Foundation Is Cracking: Why Hardware Security Can’t Be an Afterthought Anymore

I was scrolling through my security feeds this morning when I came across news that MITRE has finally updated their Most Important Hardware Weaknesses List. While this should have been cause for celebration, I found myself feeling more frustrated ...