Application Security News and Articles


364,000 Impacted by Data Breach at LexisNexis Risk Solutions

Data broker giant LexisNexis Risk Solutions says personal information was stolen from 364,000 people in a December 2024 data breach. The post 364,000 Impacted by Data Breach at LexisNexis Risk Solutions appeared first on SecurityWeek.

FTC Orders GoDaddy to Bolster Its Security After Years of Attacks

Web hosting giant GoDaddy for years has mislead customers about the strength of its security program, but after a series of data breaches, the FTC is ordering the company to implements robust defenses and stop lying about its cybersecurity ...

Your Mobile Apps May Not Be as Secure as You Think… – FireTail Blog

May 28, 2025 - Lina Romero - Your Mobile Apps May Not Be as Secure as You Think… Excerpt: Cybersecurity risks are too close for comfort. Recent data from the Global Mobile Threat Report reveals that our mobile phone applications are most likely ...

Czech Government Condemns Chinese Hack on Critical Infrastructure

The Czech government issues a blunt warning to China after APT31 hackers linked to intrusion at critical infrastructure network. The post Czech Government Condemns Chinese Hack on Critical Infrastructure appeared first on SecurityWeek.

How HealthTech Startups Can Build Scalable Data Governance Frameworks from Day One

Launching a HealthTech startup without data governance is like building a hospital with no patient records: risky, chaotic, and destined for regulatory headaches. In an...Read More The post How HealthTech Startups Can Build Scalable Data ...

BSidesLV24 – PasswordsCon – Zero Downtime Credential Rotation

Author/Presenter: Kenton McDonough Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; ...

The Evolution of Software Development: From Machine Code to AI Orchestration

Major tech companies now generate 30% of code with AI. Explore the dramatic shift from manual coding to AI orchestration—and why the next 3 years will transform who can build software. The post The Evolution of Software Development: From ...

How to Segment SSH and RDP for Zero Trust Success 

RDP and SSH remain top targets for attackers because they offer direct access to the systems that matter most. As covered in our earlier post (Why You Should Segment RDP & SSH), segmenting these high-risk protocols is one of the … Read ...

Gartner Market Guide for Supply Chain Security: Why You Need a Comprehensive Solution

The post Gartner Market Guide for Supply Chain Security: Why You Need a Comprehensive Solution appeared first on Security Boulevard.

Check Point Enhances Exposure Management with Veriti Acquisition

How Check Point's acquisition of Veriti enhances threat exposure management. Learn about the impact on cybersecurity strategies today! The post Check Point Enhances Exposure Management with Veriti Acquisition appeared first on Security Boulevard.

Apollo MCP Server: Bridging AI Agents and GraphQL APIs

Discover Apollo GraphQL's MCP Server, the gateway to seamless AI integration with existing APIs. Enhance your development process today! The post Apollo MCP Server: Bridging AI Agents and GraphQL APIs appeared first on Security Boulevard.

Mistral Launches Devstral: Open-Source LLM for Coding Agents

Discover Mistral's Devstral, an open-source LLM revolutionizing software engineering automation. Explore its features and download today! The post Mistral Launches Devstral: Open-Source LLM for Coding Agents appeared first on Security Boulevard.

Cerby Raises $40 Million for Identity Automation Platform

Identity security automation platform Cerby has raised $40 million in Series B funding to scale operations. The post Cerby Raises $40 Million for Identity Automation Platform appeared first on SecurityWeek.

Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites

Mandiant warns that a Vietnamese hacking group tracked as UNC6032 is distributing malware via fake AI video generator websites. The post Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites appeared first on SecurityWeek.

PlainID announces Policy Management for Agentic AI

PlainID introduced Policy Management for Agentic AI. Securing the future with a solution that brings identity-aware, policy-based access control to the next generation of AI systems. As organizations adopt AI and LLM-based systems, they are ...

RadiantOne platform enhancements prevent identity-based attacks

Radiant Logic announced its new Identity Observability features as part of the RadiantOne platform. As identity remains the dominant attack vector for cybercriminals, the latest enhancements to the RadiantOne platform deliver real-time visibility ...

How crypto is changing the game for financial scammers

Cryptocurrency has transformed how we save, spend, and invest money. But with this wave of innovation comes a new breed of scams—slick, high-tech, and harder to spot than ever.  The post How crypto is changing the game for financial scammers ...

The latest in phishing scams: stealing your information through fake online forms

Online threats have become increasingly sophisticated, and phishing attacks are no exception. Among the many tactics cybercriminals deploy, developing phishing campaigns by mimicking well-known companies and duplicating their online forms has ...

BalkanID IGA Lite reduces identity risk and ensures compliance

BalkanID has unveiled its self-service Identity Governance and Administration (IGA) Lite Platform, offering flexibility and transparent pricing. Consisting of three streamlined modules: User Access Reviews (UAR) Lite, IAM Risk Analyzer Lite, and ...

OneDrive Gives Web Apps Full Read Access to All Files

Security researchers warn that OneDrive’s file sharing tool may grant third-party web apps access to all your files—not just the one you choose to upload. The post OneDrive Gives Web Apps Full Read Access to All Files appeared first on ...