Application security coverage on artificial intelligence, vulnerabilities, and DevSecOps

CSO Online’s application security section tracks critical vulnerabilities, artificial intelligence driven threats and defenses, and the growing pressure on software supply chains and developer tooling.

The application security section of CSO Online brings together news, analysis, how tos, and features focused on securing modern software, with an emphasis on vulnerabilities in critical platforms, the impact of artificial intelligence tools on development, and the operational realities facing security leaders. Recent coverage highlights a critical vulnerability in IBM API Connect that is rated 9.8 out of 10 in severity and could allow a remote attacker to gain unauthorized access to applications, underscoring how exposed enterprises can be when core integration platforms are affected. Other news items spotlight issues such as hidden .NET HTTP proxy behavior that can create remote code execution exposure in applications, and a critical vulnerability in Apache Tika that was originally thought to be patched months earlier, illustrating how incomplete or misunderstood fixes can leave organizations at risk.

A strong thread through the page is the intersection of application security and artificial intelligence. A news analysis on managing agentic artificial intelligence risk uses the OWASP Top 10 as a lens for understanding how autonomous and semi autonomous systems can introduce novel failure modes. Another how to article lists key questions chief information security officers should ask before adopting artificial intelligence enabled cyber solutions, signaling that due diligence around vendor claims and model behavior is becoming core to application security practice. Features such as artificial intelligence powered bug hunting reshaping the bug bounty industry and research on artificial intelligence coding assistants amplifying deeper cybersecurity risks show how tools that promise developer productivity can simultaneously democratize vulnerability discovery, flood programs with false positives, and encourage insecure coding patterns or leaked secrets.

The coverage also tracks the software supply chain and cloud native landscape, including ongoing npm spam and malware issues, a wave of npm supply chain attacks that exposed thousands of enterprise developer credentials, and Chaos Mesh flaws that could allow operating system command injection and full Kubernetes cluster takeover from unprivileged pods. Articles on GitHub Copilot prompt injection leaking sensitive data from private repositories and an attack where data was stolen from Salesforce instances via a compromised artificial intelligence live chat tool outline how prompt injection and embedded assistants are becoming application level threats. Additional reporting on a critical Docker Desktop flaw that allows container escape, rogue MCP servers that can take over an integrated browser, and Fortinet criticism over silent patching of a second zero day in the same equipment ties endpoint, network, and cloud infrastructure issues back into the application security domain, emphasizing that defending applications now requires visibility across code, dependencies, tools, and the artificial intelligence systems woven through them.

57

Impact Score

Why new emotion words are reshaping how we feel

Researchers are tracking a surge of newly coined emotions, from “velvetmist” to “eco-anxiety,” which are changing how people understand and navigate their feelings in a networked world.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.