As LLMs, agents and Model Context Protocols (MCPs) reshape software architecture, API sprawl is creating major security blind spots. The 2025 GenAI Application Security Report reveals why continuous API discovery, testing and governance are now critical to protecting AI-driven applications…
Category: Security Boulevard
Using FinOps to Detect AI-Created Security Risks
As AI investments surge toward $1 trillion by 2027, many organizations still see zero ROI due to hidden security and cost risks. Discover how aligning FinOps with security practices helps identify AI-related vulnerabilities, control cloud costs, and build sustainable, secure…
Survey: Organizations Are Too Confident in Their Cyber Resiliency
A global survey of 1,773 C-level executives, security professionals and security and technical directors finds nearly all (95%) are confident in their ability to recover from a ransomware attack. Conducted by OpenText, the survey also notes that 40% of respondents…
Survey: Cybersecurity Leaders Much More Concerned About AI Generated Code
A survey of 400 cybersecurity leaders in the U.S. and United Kingdom published today finds all respondents reporting that AI tools are now generating code in their organization’s code base, with just under a third now seeing those tools being…
Best Application Security Testing Services to Know
Discover the best Application Security Testing (AST) services in 2025. The post Best Application Security Testing Services to Know appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Best Application Security Testing…
Rethinking Cyber Resilience in the Age of AI
AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion,…
NDSS 2025 – Safety Misalignment Against Large Language Models
SESSION Session 2A: LLM Security Authors, Creators & Presenters: Yichen Gong (Tsinghua University), Delong Ran (Tsinghua University), Xinlei He (Hong Kong University of Science and Technology (Guangzhou)), Tianshuo Cong (Tsinghua University), Anyu Wang (Tsinghua University), Xiaoyun Wang (Tsinghua University) PAPER…
Kasada Named Finalist in AFR BOSS Most Innovative Companies List
Honored by The Australian Financial Review’s 14th annual awards in the Technology category The post Kasada Named Finalist in AFR BOSS Most Innovative Companies List appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
How penetration testing services prove security and build client trust
In a world where data breaches continue to rise, organisations have become more discerning about who they trust with their information. It is no longer enough to claim that security is a priority — businesses must be able to prove…
The Hidden Authorization Tax: Why Your Permissions System Costs More Than You Think
Every application needs authorization. It’s the backbone that decides who can access what, when, and under which conditions. But the hard part isn’t granting permissions, it’s getting them right. If permissions are too coarse, users lose confidence that their data…
Security Experts Charged with Launching BlackCat Ransomware Attacks
Two former cybersecurity pros were indicted with conspiring with a third unnamed co-conspirator of using the high-profile BlackCat ransomware to launch attacks in 2023 against five U.S. companies to extort payment in cryptocurrency and then splitting the proceeds. The post…
Scientists Need a Positive Vision for AI
For many in the research community, it’s gotten harder to be optimistic about the impacts of artificial intelligence. As authoritarianism is rising around the world, AI-generated “slop” is overwhelming legitimate media, while AI-generated deepfakes are spreading misinformation and parroting extremist…
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms. Key takeaways: Tenable Research has discovered multiple new and persistent vulnerabilities in…
Hackers Targeting Freight Operators to Steal Cargo: Proofpoint
Threat actors are working with organized crime groups to target freight operators and transportation companies, infiltrate their systems through RMM software, and steal cargo, which they then sell online or ship to Europe, according to Proofpoint researchers, who saw similar…
In an AI World, Every Attack is a Social Engineering Attack
AI-driven social engineering is transforming cyberattacks from costly, targeted operations into scalable, automated threats. As generative models enable realistic voice, video, and text impersonation, organizations must abandon stored secrets and move toward cryptographic identity systems to defend against AI-powered deception.…
Salesloft Drift Breaches: Your Complete Response Guide
The Salesloft Drift OAuth token breach compromised Salesforce data across hundreds of enterprises, including Cloudflare, Zscaler, and Palo Alto Networks. Learn how attackers exploited OAuth tokens, the risks of connected app misuse, and key steps to strengthen Salesforce and multi-cloud…
Centraleyes AI Framework (CAIF)
What is the CAIF? The Centraleyes AI Framework (CAIF) is a comprehensive compliance and governance tool designed to help organizations meet the diverse and rapidly evolving regulatory requirements surrounding artificial intelligence. It consolidates questions and controls from multiple AI laws…
Enterprise Ready SaaS Application Guide to Product Security
Learn how to build secure, enterprise-ready SaaS applications. This guide covers development, ops, and product security best practices for meeting enterprise requirements. The post Enterprise Ready SaaS Application Guide to Product Security appeared first on Security Boulevard. This article has…
Adapting to New Cybersecurity Challenges with NHIs
Are Your Machine Identities Truly Secure in the Cloud Ecosystem? With organizations strive to protect their digital assets, one critical yet sometimes overlooked area is the management of Non-Human Identities (NHIs) and Secrets Security Management. These machine identities, essential for…
Staying Ahead of Threats with Smart NHIs
How Can Smart NHI Management Enhance Cybersecurity? Managing Non-Human Identities (NHIs) may seem like an abstract task, yet its significance in bolstering cybersecurity cannot be overstated. With the shift towards digital transformation, NHIs have become an integral part of many…