Application Security News and Articles
Northwest Radiologists says the personal information of 350,000 Washington State residents was stolen in a January 2025 data breach.
The post Northwest Radiologists Data Breach Impacts 350,000 Washingtonians appeared first on SecurityWeek.
A trusted name in open-source privacy software is facing tough questions after a recent data breach exposed donor names and email addresses. Here’s what happened, why it matters, and what you need to know. What Happened? On July 28, 2025, ...
As July 2025 winds down, we’re back with this month’s roundup of newly released AWS privileged permissions — and this time, several new services have made their debut, each arriving with permissions that could reshape your cloud security ...
Attackers could silently modify sensitive MCP files to trigger the execution of arbitrary code without requiring user approval.
The post Several Vulnerabilities Patched in AI Code Editor Cursor appeared first on SecurityWeek.
Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws.
The post Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities appeared first on ...
In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to security issues that conventional tools fail to detect. He explains how ...
IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organizations experiencing an AI-related breach is a small representation of the researched ...
Unmanaged machine identities have continued to tick up at a rapid clip, furthering a trend that finds non-human identities (NHIs) outpacing human accounts — and, to the chagrin of security experts, exposing credentials, new research on the ...
Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators across Linux, Windows, and macOS, and includes features ...
Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The study reveals a troubling gap between what organizations believe about their identity security programs and how ...
Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according to a new report from Gartner. The firm’s second-quarter Emerging Risk Report, based on a survey of 223 senior ...
This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the ...
Does Your Cloud Security Truly Address Non-Human Identities? Every organization wishes for a robust cybersecurity strategy, but have you ever wondered if yours truly addresses non-human identities (NHIs)? This essential, often overlooked element ...
Why is NHI Management so Crucial in Modern Security Strategies? Where the utilization of machine identities is becoming increasingly commonplace, it’s essential to ask: How prominent is NHI management in shaping modern security strategies? ...
How Effective are Your Cybersecurity Measures? Is your organization taking the adequate security measures to protect itself from digital threats? With digital becomes increasingly sophisticated, so too does cybersecurity. For businesses operating ...
Creator/Author/Presenter: Daniel Popescu
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held ...
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s Handbook For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. ...
Just How Safe are Your Machine Identities? Ever wondered just how secure your Non-Human Identities (NHIs) are where data breaches are increasingly common? This question should be at the forefront of your mind. Why the Focus on NHIs? NHIs form an ...
Creator/Author/Presenter: Jaime Blasco
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at ...
Operational Technology (OT) security encompasses a set of practices and procedures aimed at protecting cyber-physical systems and industrial control systems (ICS) from cyber threats and exploitation. ICS are essential OT components widely used ...