Application Security News and Articles


Northwest Radiologists Data Breach Impacts 350,000 Washingtonians

Northwest Radiologists says the personal information of 350,000 Washington State residents was stolen in a January 2025 data breach. The post Northwest Radiologists Data Breach Impacts 350,000 Washingtonians appeared first on SecurityWeek.

Pi-hole Data Breach Exposes Donor Emails Through WordPress Plugin Flaw

A trusted name in open-source privacy software is facing tough questions after a recent data breach exposed donor names and email addresses. Here’s what happened, why it matters, and what you need to know. What Happened? On July 28, 2025, ...

July Recap: New AWS Services and Privileged Permissions

As July 2025 winds down, we’re back with this month’s roundup of newly released AWS privileged permissions — and this time, several new services have made their debut, each arriving with permissions that could reshape your cloud security ...

Several Vulnerabilities Patched in AI Code Editor Cursor 

Attackers could silently modify sensitive MCP files to trigger the execution of arbitrary code without requiring user approval. The post Several Vulnerabilities Patched in AI Code Editor Cursor  appeared first on SecurityWeek.

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities

Illumina will pay $9.8 million to settle accusations that products provided to the US government were affected by cybersecurity flaws. The post Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities appeared first on ...

AIBOMs are the new SBOMs: The missing link in AI risk management

In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to security issues that conventional tools fail to detect. He explains how ...

Average global data breach cost now $4.44 million

IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organizations experiencing an AI-related breach is a small representation of the researched ...

NHIs Continue to Outpace Human Identities and Bump Up Security Risk 

Unmanaged machine identities have continued to tick up at a rapid clip, furthering a trend that finds non-human identities (NHIs) outpacing human accounts — and, to the chagrin of security experts, exposing credentials, new research on the ...

Open-source password recovery utility Hashcat 7.0.0 released

Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators across Linux, Windows, and macOS, and includes features ...

The surprising truth about identity security confidence

Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The study reveals a troubling gap between what organizations believe about their identity security programs and how ...

What’s keeping risk leaders up at night? AI, tariffs, and cost cuts

Enterprise risk leaders are most concerned about rising tariffs and trade tensions heading into the second half of 2025, according to a new report from Gartner. The firm’s second-quarter Emerging Risk Report, based on a survey of 223 senior ...

Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis

This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the ...

Stay Proactive: Secure Your Cloud Identities

Does Your Cloud Security Truly Address Non-Human Identities? Every organization wishes for a robust cybersecurity strategy, but have you ever wondered if yours truly addresses non-human identities (NHIs)? This essential, often overlooked element ...

Controlling NHIs: Strategy for Modern Security

Why is NHI Management so Crucial in Modern Security Strategies? Where the utilization of machine identities is becoming increasingly commonplace, it’s essential to ask: How prominent is NHI management in shaping modern security strategies? ...

Are Your Security Measures Capable Enough?

How Effective are Your Cybersecurity Measures? Is your organization taking the adequate security measures to protect itself from digital threats? With digital becomes increasingly sophisticated, so too does cybersecurity. For businesses operating ...

BSidesSF 2025: Service Mesh Security: Shifting Focus To The Application Layer

Creator/Author/Presenter: Daniel Popescu Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held ...

Week in review: Food sector cybersecurity risks, cyber threats to space infrastructure

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s Handbook For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. ...

How Secure Are Your Non-Human Identities?

Just How Safe are Your Machine Identities? Ever wondered just how secure your Non-Human Identities (NHIs) are where data breaches are increasingly common? This question should be at the forefront of your mind. Why the Focus on NHIs? NHIs form an ...

BSidesSF 2025: Mapping The SaaS Attack Surface

Creator/Author/Presenter: Jaime Blasco Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at ...

OT Security: Guide For Critical Infrastructure

Operational Technology (OT) security encompasses a set of practices and procedures aimed at protecting cyber-physical systems and industrial control systems (ICS) from cyber threats and exploitation. ICS are essential OT components widely used ...