Normal view

Received today — 13 December 2025

What aspects of Agentic AI security should get you excited?

12 December 2025 at 17:00

Are Non-Human Identities the Key to Strengthening Agentic AI Security? Where increasingly dominated by Agentic AI, organizations are pivoting toward more advanced security paradigms to protect their digital. Non-Human Identities (NHI) and Secrets Security Management have emerged with pivotal elements to fortify this quest for heightened cybersecurity. But why should this trend be generating excitement […]

The post What aspects of Agentic AI security should get you excited? appeared first on Entro.

The post What aspects of Agentic AI security should get you excited? appeared first on Security Boulevard.

Received before yesterday

2026 API and AI Security Predictions: What Experts Expect in the Year Ahead

11 December 2025 at 09:54

This is a predictions blog. We know, we know; everyone does them, and they can get a bit same-y. Chances are, you’re already bored with reading them. So, we’ve decided to do things a little bit differently this year.  Instead of bombarding you with just our own predictions, we’ve decided to cast the net far [...]

The post 2026 API and AI Security Predictions: What Experts Expect in the Year Ahead appeared first on Wallarm.

The post 2026 API and AI Security Predictions: What Experts Expect in the Year Ahead appeared first on Security Boulevard.

The Security Landscape of Mobile Apps in Africa

22 November 2025 at 03:36

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience

Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of common financial services apps used across Africa. After surveying 224 popular financial applications, the researchers found that 95 percent of these Android apps exposed secrets that can be used to reveal personal and financial data. Across these applications, approximately 272 million users have the potential to be victims of the security flaws.

The post The Security Landscape of Mobile Apps in Africa appeared first on Security Boulevard.

APIs Are the Retail Engine: How to Secure Them This Black Friday

21 November 2025 at 07:00

Can you ever imagine the impact on your business if it went offline on Black Friday or Cyber Monday due to a cyberattack?  Black Friday is the biggest day in the retail calendar. It’s also the riskiest. As you gear up for huge surges in online traffic, ask yourself: have you protected the APIs on [...]

The post APIs Are the Retail Engine: How to Secure Them This Black Friday appeared first on Wallarm.

The post APIs Are the Retail Engine: How to Secure Them This Black Friday appeared first on Security Boulevard.

Black Friday Fraud: The Hidden Threat in Mobile Commerce

19 November 2025 at 17:45

Every year, Black Friday drives a surge of online purchases—but it also opens the floodgates for fraud. While most conversations focus on phishing emails or sketchy websites, the real cybersecurity frontline for e-commerce lies behind the scenes: mobile apps. Developers, not consumers, hold the power to stop many of these attacks—but only if they understand how today’s fraudsters exploit mobile APIs.

The post Black Friday Fraud: The Hidden Threat in Mobile Commerce appeared first on Security Boulevard.

The Security Landscape of Mobile Apps in Africa

19 November 2025 at 17:43

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience

Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore the security of common financial services apps used across Africa. After surveying 224 popular financial applications, the researchers found that 95 percent of these Android apps exposed secrets that can be used to reveal personal and financial data. Across these applications, approximately 272 million users have the potential to be victims of the security flaws.

The Carnegie Mellon University Africa team included alumni and a current student who are all working as researchers with CyLab-Africa in Rwanda: Theoneste Byagutangaza (MSIT '23), Trevor Henry Chiboora (MSIT '23), Joel Jefferson Musiime (MSIT '24), and Lenah Chacha (MSIT '17). The project was part of a summer collaboration experience where the CyLab-Africa researchers received guidance and mentorship from Approov. CyLab-Africa co-directors Assane Gueye and Giulia Fanti served as advisors for this project

"Participating in this project was a rewarding yet challenging experience. It involved in-depth research into the consequences of secret key leaks, which proved to be a formidable task initially. However, collaborating with a diverse team enriched my problem-solving skills, honed during my time as a student at CMU, and made the project a valuable learning opportunity," says Byagutangaza.

The team selected and investigated Android applications from countries in North, Central, Eastern, Western, and Southern Africa and categorized the security threats into "high," "medium," and "low" severity. The majority of the threats fell into the high (18 percent) and medium (72 percent) categories. A high severity classification was used for vulnerabilities that could potentially lead to unauthorized access, data breaches, and compromised user privacy. Medium severity was used for secrets that if exposed, could potentially compromise the confidentiality of user data and application functionality.

The Carnegie Mellon University Africa team: Theoneste Byagutangaza (MSIT '23), Trevor Henry Chiboora (MSIT '23), Joel Jefferson Musiime (MSIT '24), and Lenah Chacha (MSIT '17).

"Being new in the field of mobile security, this project was a good learning experience as it gave me an understanding on the design and deployment of mobile apps from a security perspective," says Musiime. "Collaborating with the experienced team at Approov in the field of mobile security greatly aided my learning process, as they were always ready and willing to offer guidance and support throughout the research."

The work culminated in a report which draws comparisons between other regions and Africa, pinpointing trends, commonalities, and disparities pertaining to the exposure of secret keys in a mobile application’s binary package. For example, they found that apps deployed in West Africa were the most exposed in terms of high severity secret exposure (20 percent) and Southern Africa the least (only 6 percent).

"The project report holds significant value for a wide audience, including product owners, developers, and everyday users. It not only sheds light on security concerns related to secrets and API keys in Android packages but also provides valuable recommendations for mitigating these issues," says Chiboora.

The post The Security Landscape of Mobile Apps in Africa appeared first on Security Boulevard.

OWASP Top 10 Business Logic Abuse: What You Need to Know

13 November 2025 at 07:00

Over the past few years, API security has gone from a relatively niche concern to a headline issue. A slew of high-profile breaches and compliance mandates like PCI DSS 4.0 have woken security teams up to the reality that APIs are the front door to their data, infrastructure, and revenue streams. OWASP recently published its [...]

The post OWASP Top 10 Business Logic Abuse: What You Need to Know appeared first on Wallarm.

The post OWASP Top 10 Business Logic Abuse: What You Need to Know appeared first on Security Boulevard.

The Limitations of Google Play Integrity API (ex SafetyNet)

11 November 2025 at 16:04
Updated November 2025

This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. The imminent deprecation of Google SafetyNet Attestation API means this is a good time for a comprehensive evaluation of solutions in this space.

The post The Limitations of Google Play Integrity API (ex SafetyNet) appeared first on Security Boulevard.

Why API Security Will Drive AppSec in 2026 and Beyond 

6 November 2025 at 01:42
api, api sprawl, api security, pen testing, Salt Security, API, APIs, attacks, testing, PTaaS, API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

As LLMs, agents and Model Context Protocols (MCPs) reshape software architecture, API sprawl is creating major security blind spots. The 2025 GenAI Application Security Report reveals why continuous API discovery, testing and governance are now critical to protecting AI-driven applications from emerging semantic and prompt-based attacks.

The post Why API Security Will Drive AppSec in 2026 and Beyond  appeared first on Security Boulevard.

When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us

31 October 2025 at 07:00

Wallarm’s latest Q3 2025 API ThreatStats report [link placeholder] reveals that API vulnerabilities, exploits, and breaches are not just increasing; they’re evolving.  Malicious actors are shifting from code-level weaknesses to business logic flaws, from web apps to partner integrations, and from REST to AI-powered APIs. Here’s what stood out this quarter, and what security leaders [...]

The post When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us appeared first on Wallarm.

The post When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us appeared first on Security Boulevard.

Why “Secure Login” Isn’t Enough to Protect Your Mobile App Anymore

30 October 2025 at 02:57

mobile app security

Manish Mimani, founder and CEO of Protectt.ai For years, static passwords, dynamic One-time Passwords (OTPs), and Multi-factor Authentication (MFA) have been the foundation of mobile app security. They have helped users verify their identities and kept unauthorized access at bay. But today, that’s no longer enough. Modern fraudsters aren’t just trying to break through login screens — they are targeting what happens after you log in. Post-authentication fraud is rising at an alarming pace across mobile-first industries like BFSI, fintech, and digital commerce. Fraudsters bypass identity checks altogether by compromising runtime environments, targeting APIs, or exploiting device vulnerabilities, often without ever touching credentials. The biggest misconception in mobile app security today is: If the login is secure, the app is secure. That couldn’t be further from the truth!

Mobile App Security Risks Don’t Stop at Login

Runtime Blind Spots: Once users log in, most apps assume the environment is safe. It is not.
  • Malware, repackaged apps, and overlay attacks exploit runtime weaknesses.
  • Fraudsters hijack active sessions and execute transactions from within.
Compromised Devices: A secure app on a rooted or jailbroken device is vulnerable.
  • Malicious keyboard overlays, screen sharing, and unsafe environments open hidden backdoors.
Unsecured APIs: Many fraudsters bypass the UI entirely.
  • Weak APIs are prime targets for token replay, man-in-the-middle exploits, and automated fraud.
Result: Fraud happens after successful authentication — where most defences do not exist.

The Solution: Build Defence Inside the App

To counter post-authentication threats, security must be intrinsic; not just guard the login. Embed Protection with Runtime Application Self-Protection (RASP)
  • RASP sits inside the application, detecting and blocking malicious activity the moment it occurs.
  • It thwarts tampering, reverse engineering, overlay attacks, and session hijacking in real time.
  • Unlike static perimeter defences, RASP protects every user interaction across any network, device, or location. It transforms your app from a passive target into an active shield.
Enforce Continuous Device Integrity
  • Validate the trustworthiness of the device at every step.
  • Detect rooted or jailbroken devices, malicious tools, or unsafe conditions.
  • Apply adaptive responses — restrict high-risk functions or block sensitive actions entirely.
Secure the API Layer End-to-End
  • Treat APIs as critical attack surfaces.
  • Harden with encryption, authentication, behavioural monitoring, and anomaly detection.
  • Stop fraud before it can bypass the UI.
Authentication Is Just the Start Login protection is necessary, but no longer sufficient. True mobile app security is layered:
  • RASP for in-app runtime defence.
  • Device Integrity for trusted environments.
  • API Protection for invisible attack surfaces.
Fraudsters have evolved. Thus, security must be built inside, not just around. The challenge is no longer just about the OTP; it is also about what happens after the OTP is validated. For mobile-first industries like BFSI, fintech, and digital commerce, the mobile app security of their business empires depends entirely on this strategic shift. Authentication starts the journey; RASP ensures protection every step of the way.

API Attack Awareness: Business Logic Abuse — Exploiting the Rules of the Game

29 October 2025 at 07:00

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed Broken Object Level Authentication (BOLA), injection attacks, and authentication flaws; this week, we’re exploring business logic abuse (BLA).  Unlike technical flaws, business logic flaws exploit how an API is designed to behave. They are difficult [...]

The post API Attack Awareness: Business Logic Abuse — Exploiting the Rules of the Game appeared first on Wallarm.

The post API Attack Awareness: Business Logic Abuse — Exploiting the Rules of the Game appeared first on Security Boulevard.

❌