<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Application Security on BSG Blog — Cybersecurity Insights</title><link>https://bsg.tech/blog/categories/application-security/</link><description>Recent content in Application Security on BSG Blog — Cybersecurity Insights</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 15 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://bsg.tech/blog/categories/application-security/index.xml" rel="self" type="application/rss+xml"/><item><title>AI Is Changing AppSec: Agentic Security Tools in 2026</title><link>https://bsg.tech/blog/ai-appsec-agentic-security-tools-2026/</link><pubDate>Wed, 04 Mar 2026 11:56:21 +0000</pubDate><guid>https://bsg.tech/blog/ai-appsec-agentic-security-tools-2026/</guid><description>&lt;p&gt;February 2026 was a month that made the application security world pay attention. Anthropic launched &lt;a href="https://www.anthropic.com/news/claude-code-security"&gt;Claude Code Security&lt;/a&gt; — a system that had already found over 500 zero-day vulnerabilities in production open-source codebases before it shipped. Days earlier, the open-source Raptor framework showed that a properly orchestrated LLM could autonomously run Semgrep scans, execute CodeQL queries, validate whether findings are exploitable, generate proof-of-concept exploits, and produce patches. All in a single workflow.&lt;/p&gt;</description></item><item><title>AI Agent Security: Malicious Skills Threatening Dev Environments</title><link>https://bsg.tech/blog/ai-agent-security-malicious-skills-threat/</link><pubDate>Sat, 24 Jan 2026 14:57:24 +0000</pubDate><guid>https://bsg.tech/blog/ai-agent-security-malicious-skills-threat/</guid><description>&lt;p&gt;AI coding assistants like Claude, GitHub Copilot, and Cursor have transformed how developers work. But with great power comes a new attack surface: &lt;strong&gt;executable skills&lt;/strong&gt; that can turn your trusted AI assistant into a threat actor.&lt;/p&gt;
&lt;p&gt;Recent security research has uncovered a concerning pattern. Skills—the plugins and extensions that give AI agents their capabilities—can harbor malicious code that executes with your permissions, accesses your credentials, and spreads across your infrastructure. This isn’t theoretical: researchers have demonstrated &lt;a href="https://blog.lukaszolejnik.com/supply-chain-risk-of-agentic-ai-infecting-infrastructures-via-skill-worms/"&gt;skill worms&lt;/a&gt; that propagate through SSH configurations, exfiltrate secrets via base64-encoded curl commands, and persist across sessions.&lt;/p&gt;</description></item><item><title>OWASP LLM Top 10 (2025): Vulnerabilities &amp; Mitigations</title><link>https://bsg.tech/blog/owasp-llm-top-10/</link><pubDate>Mon, 12 Jan 2026 18:20:19 +0000</pubDate><guid>https://bsg.tech/blog/owasp-llm-top-10/</guid><description>&lt;p&gt;Every organisation seems to be integrating large language models into their products and workflows. Chatbots, code assistants, document analysers, customer service agents—generative AI is everywhere. But security hasn’t kept pace with adoption.&lt;/p&gt;
&lt;p&gt;OWASP recognised this gap and released a dedicated Top 10 for LLM Applications. Unlike traditional web vulnerabilities that developers have been battling for decades, LLM risks are fundamentally different. These systems process natural language, generate unpredictable outputs, and often have access to sensitive data and powerful actions. The attack surface is unlike anything we’ve seen before.&lt;/p&gt;</description></item><item><title>OWASP Top 10 2025: What Changed and Why It Matters</title><link>https://bsg.tech/blog/owasp-top-10/</link><pubDate>Mon, 12 Jan 2026 01:23:41 +0000</pubDate><guid>https://bsg.tech/blog/owasp-top-10/</guid><description>&lt;p&gt;The OWASP Top 10 is the definitive benchmark for web application security. The 2025 release brings the most significant changes in years: two entirely new vulnerability categories and major ranking shifts that reflect how modern attacks have evolved.&lt;/p&gt;
&lt;p&gt;These changes aren’t academic—they shape security policies, &lt;a href="https://bsg.tech/blog/penetration-testing/"&gt;penetration testing requirements&lt;/a&gt;, and development practices across the industry. Understanding what changed helps security teams prioritise resources and protect what matters most.&lt;/p&gt;</description></item><item><title>DevSecOps Pipeline Security: Essential Guide | BSG</title><link>https://bsg.tech/blog/devsecops-pipeline-security/</link><pubDate>Fri, 09 Jan 2026 16:28:38 +0000</pubDate><guid>https://bsg.tech/blog/devsecops-pipeline-security/</guid><description>&lt;p&gt;Your CI/CD pipeline has become one of the most valuable targets in your organization. It has access to source code, production credentials, deployment keys, and the ability to push code directly to your customers. If attackers compromise your pipeline, they compromise everything downstream.&lt;/p&gt;</description></item><item><title>Why Every Developer Should Learn Secure Coding in 2026</title><link>https://bsg.tech/blog/why-every-developer-should-learn-secure-coding-in-2026/</link><pubDate>Thu, 08 Jan 2026 13:57:23 +0000</pubDate><guid>https://bsg.tech/blog/why-every-developer-should-learn-secure-coding-in-2026/</guid><description>&lt;p&gt;Security vulnerabilities cost businesses billions annually. From the &lt;a href="https://bsg.tech/blog/preventing-crypto-exchange-hacks-lessons-from-bybit-heist/"&gt;Bybit crypto heist&lt;/a&gt; to countless data breaches affecting millions of users, the pattern is clear: most security incidents trace back to preventable coding mistakes. Yet despite this, secure coding remains an afterthought in most development workflows.&lt;/p&gt;</description></item><item><title>Unforgivable Software Vulnerabilities</title><link>https://bsg.tech/blog/unforgivable-software-vulnerabilities/</link><pubDate>Fri, 04 Apr 2025 16:27:14 +0000</pubDate><guid>https://bsg.tech/blog/unforgivable-software-vulnerabilities/</guid><description>&lt;p&gt;Every piece of software has bugs. Many have vulnerabilities. But not all software vulnerabilities are created equal.&lt;/p&gt;
&lt;p&gt;Some are complicated, buried deep in obscure logic, or made possible by bleeding-edge exploit techniques. Others—well, others are glaringly obvious. These are the ones that make security professionals shake their heads and ask: &lt;em&gt;How did this ever make it to production?&lt;/em&gt;&lt;/p&gt;</description></item><item><title>The Future of Authentication: Passkeys vs Passwords and 2FA</title><link>https://bsg.tech/blog/the-future-of-authentication-when-passkeys-beat-passwords-and-2fa/</link><pubDate>Wed, 22 Jan 2025 11:22:47 +0000</pubDate><guid>https://bsg.tech/blog/the-future-of-authentication-when-passkeys-beat-passwords-and-2fa/</guid><description>&lt;p&gt;Passwords have been around for decades, but they come with plenty of headaches. Many people use weak passwords or reuse the same ones across different sites. This makes them easy targets for hackers. Phishing attacks, where scammers trick you into giving up your password, are still very common. And even if you have a strong password, it’s no good if it gets stolen in a data breach.&lt;/p&gt;</description></item><item><title>SAMMY: Free Tool to Implement OWASP SAMM Security</title><link>https://bsg.tech/blog/enhance-software-security-with-sammy-and-owasp-samm/</link><pubDate>Mon, 04 Nov 2024 16:48:46 +0000</pubDate><guid>https://bsg.tech/blog/enhance-software-security-with-sammy-and-owasp-samm/</guid><description>&lt;p&gt;In today’s rapidly evolving digital landscape, ensuring the &lt;a href="https://bsg.tech/blog/software-product-security-where-to-start/"&gt;security of software applications&lt;/a&gt; is paramount. The OWASP Software Assurance Maturity Model (SAMM) provides organizations with a structured framework to assess and enhance their software &lt;a href="https://bsg.tech/blog/cyber-security/"&gt;security practices&lt;/a&gt;. To effectively implement SAMM, organizations can leverage SAMMY, a comprehensive management tool developed by Codific.&lt;/p&gt;</description></item><item><title>Why Is Software Supply Chain Security Important?</title><link>https://bsg.tech/blog/why-is-it-supply-chain-security-so-important/</link><pubDate>Tue, 02 Nov 2021 20:47:26 +0000</pubDate><guid>https://bsg.tech/blog/why-is-it-supply-chain-security-so-important/</guid><description>&lt;p&gt;Supply chain cyber security is so hot right now. According to the &lt;a href="https://www.enisa.europa.eu/news/enisa-news/hackers-for-hire-drive-the-evolution-of-the-new-enisa-threat-landscape"&gt;ENISA Threat Landscape&lt;/a&gt; 2021 report, software supply chain attacks are at #9 of the most common cyberattack vectors. CISA and NIST have issued guidance on &lt;a href="https://www.cisa.gov/publication/software-supply-chain-attacks"&gt;Defending Against Software Supply Chain Attacks&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Software Product Security: Where To Start?</title><link>https://bsg.tech/blog/software-product-security-where-to-start/</link><pubDate>Wed, 29 Sep 2021 17:37:12 +0000</pubDate><guid>https://bsg.tech/blog/software-product-security-where-to-start/</guid><description>&lt;p&gt;There is plenty of publicly available information about how software development teams can make their products more secure. However, this knowledge is often obscure to software engineers. Developers get stuck in their routine jobs following the usual development cycle with no incentive to learn about security. From initial design specifications to basic functionality and prototype, to an MVP, to regular customer feature requests, to fixing bugs… On and on goes the feature-centric development cycle, with little or no effort for securing the product. Until there is a breach, or the regulator unleashes wrath on the management, a big client demands the actual proof of product security, or an M&amp;amp;A requires a demonstration of due diligence, etc.&lt;/p&gt;</description></item><item><title>Bringing Your Appsec Report To The Next Level</title><link>https://bsg.tech/blog/bringing-your-appsec-report-to-the-next-level-from-basecamp-to-the-summit/</link><pubDate>Thu, 30 Jul 2020 10:00:10 +0000</pubDate><guid>https://bsg.tech/blog/bringing-your-appsec-report-to-the-next-level-from-basecamp-to-the-summit/</guid><description>&lt;p&gt;It’s pretty understandable that a tech person likes hands-on work and doesn’t like any related overhead, including documentation. Similarly, &lt;a href="https://bsg.tech/penetration-testing/"&gt;penetration testers&lt;/a&gt; love finding vulnerabilities and much less like reporting them. However, the business value comes not from the finding itself, but from its proper communication to the client and actionable remediation measures that may help fix it. So, the report is as important as the finding, not saying that it’s, in fact, the only tangible deliverable of an &lt;a href="https://bsg.tech/application-security/"&gt;appsec assessment&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>How to check your website security online</title><link>https://bsg.tech/blog/how-to-check-your-website-security-online/</link><pubDate>Sat, 27 Jun 2020 14:00:33 +0000</pubDate><guid>https://bsg.tech/blog/how-to-check-your-website-security-online/</guid><description>&lt;p&gt;In Berezha Security, we provide high-quality &lt;a href="https://bsg.tech/application-security/"&gt;Application Security services&lt;/a&gt;, and web application security assessments are a large portion of what we do. However, a full-scale &lt;a href="https://bsg.tech/application-security/"&gt;web app pentest&lt;/a&gt; is not what all our website visitors seek; some are looking for a quick and straightforward way to check their website security without the need to hire security experts. It may seem that we are in a position to ignore those requests; however, we think it would be irresponsible. Here you are with a bunch of simple tips and tricks you can use to quickly check your website security.&lt;/p&gt;</description></item></channel></rss>