Tag: Application Security
-
Why Data Security and Privacy Need to Start in Code
AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing …
-
Article: Trustworthy Productivity: Securing AI Accelerated Development
Autonomous AI agents amplify productivity but can cause severe damage without safeguards. Defend the ReAct loop—context, reasoning, …
-
Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
A critical security flaw has been disclosed in Apache Tika that could result in an XML external entity (XXE) injection attack. The …
-
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
The challenge facing security leaders is monumental: Securing environments where failure is not an …
-
7 Best Application Security Tools
Scroll through any technology news feed and you’ll find headlines blaring about the latest data breach, a sudden zero-day exploit, or …
-
GitHub Rolls Out Post-Quantum SSH Security to Protect Code from Future Threats
GitHub has introduced a hybrid post-quantum secure key-exchange algorithm for SSH access, marking one of the first major steps by a …
-
Layered Defences Are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds
The Cloud Native Computing Foundation have published an analysis of modern cybersecurity practices, finding that attacks using Artificial …
-
Google Cloud KMS Launches Post-Quantum KEM Support to Combat “Harvest Now, Decrypt Later” Threat
Google Cloud recently announced a new capability in its Key Management Service (Cloud KMS), introducing support for post-quantum Key …
-
NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks
The Node Package Manager (npm) ecosystem has suffered from two major supply chain attacks in recent months, affecting hundreds of packages …
-
AWS Introduces EC2 Instance Attestation
AWS has introduced EC2 instance attestation, a new security feature that enables customers to verify that their virtual machines are …
-
Pixnapping: Side-Channel Vulnerability Allows Android Apps to Capture Sensitive Screen Data
A newly discovered class of attacks targets Android devices, allowing malicious apps to steal on-screen information from other apps using a …
-
Linux Security Tools Bypassed by io_uring Rootkit Technique, ARMO Research Reveals
Security researchers at ARMO have uncovered a significant vulnerability in Linux runtime security tools that stems from the io_uring …
●●●
