Application Security News and Articles
Open MPIC is an open-source framework designed to help Certificate Authorities (CAs) meet new Multi-Perspective Issuance Corroboration (MPIC) requirements from the CA/Browser Forum. Developed with contributions from Princeton and Sectigo, it ...
Eric Council Jr. was sentenced to prison for hacking SEC’s official X account and publishing fraudulent posts increasing Bitcoin value.
The post Prison Sentence for Man Involved in SEC X Account Hack appeared first on SecurityWeek.
Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.
The post Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 appeared first on SecurityWeek.
Roblox is accused of secretly tracking the data of children without consent, an activity that the plaintiffs say violates their privacy under federal law.
The post Tracking Accusations May Have Roblox Back in Court appeared first on Security ...
SK Telecom faces a major data breach affecting millions. Learn how to protect your USIM data and stay secure with our comprehensive guide.
The post SK Telecom USIM Data Compromise: Millions of Customers at Risk appeared first on Security Boulevard.
Cyble announced Cyble Titan, its next-generation Endpoint Security. Designed to meet the evolving threat landscape, Cyble Titan integrates into the Cyble’s AI-Native Security Cloud, bringing together asset visibility, intelligence-led ...
Latest Llama 4 models on AWS, DeepSeek AI integration, Luma AI's Ray2, and new evaluation capabilities. Transform your AI experience today!
The post New AI Models on Amazon Bedrock: Llama 4, Ray2, and More appeared first on Security Boulevard.
OpenJDK updates for JDK 25, including new JEPs, release schedules, and advancements in AI tools for Java development.
The post Java Development Updates: Key Features, Vulnerabilities & News appeared first on Security Boulevard.
Depending on who’s doing the talking, the new European Vulnerability Database (EUVD), set up by the European Union Agency for Cybersecurity (ENISA) and which recently went operational, is a much-needed alternative to EU dependency on MITRE. Or ...
AI systems can sometimes produce outputs that are incorrect or misleading, a phenomenon known as hallucinations. These errors can range from minor inaccuracies to misrepresentations that can misguide decision-making processes. Real world ...
In this Help Net Security interview, Full Professor at University of Leuven, unpacks the European Commission’s encryption agenda, urging a balanced, technically informed approach to lawful access that safeguards privacy, security, and ...
Hanko is an open-source, API-first authentication solution purpose-built for the passwordless era. “We focus on helping developers and organizations modernize their authentication flows by migrating users towards passkeys, while still ...
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent ...
In this Help Net Security video, Adam Pennington, MITRE ATT&CK Lead, breaks down what’s new in the ATT&CK v17 release. He highlights the addition of the ESXi platform, new and updated techniques for Linux, refinements to mitigation ...
How Can Advanced IAM Empower Operational Freedom? Have you ever wondered how to achieve operational freedom in rising cyber threats and complex cloud environments? The answer lies in adopting an advanced Identity and Access Management (IAM) ...
Why Non-Human Identities (NHIs) Management is Key in Data Protection Strategies? With cyber threats escalating at an alarming rate, Non-Human Identities (NHIs) management has become an indispensable part of comprehensive security strategies. But ...
Why is Risk Management Essential in Cybersecurity? Do you understand the critical role risk management plays in your organization’s cybersecurity framework? It is paramount for organizations to protect their Non-Human Identities (NHIs) and ...
Essential Considerations for Securing Cloud Infrastructure Have you ever paused to consider the potential vulnerabilities lurking in your cloud security? With businesses increasingly shift their operations towards cloud-based platforms, the ...
Author/Presenter: Glenn Thorpe
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...
What’s on the minds of top local government chief information security officers? In this interview, Michael Dent shares current security and technology priorities, career tips and more.
The post Fairfax County, Va., CISO Michael Dent on ...