Application Security News and Articles
Orange was targeted by hackers in an attack that resulted in the disruption of services offered to corporate and individual customers.
The post Telecom Giant Orange Hit by Cyberattack appeared first on SecurityWeek.
An annual global analysis of 113,620 data breaches published by IBM today finds the cost of the average data breach decreased by 9% year over year, thanks mainly to faster discovery and containment.
The post IBM Report Sees Drop in Global Data ...
The Israeli startup helps organizations identify, monitor, and control AI agents across their environments.
The post Cyata Emerges From Stealth With $8.5 Million in Funding appeared first on SecurityWeek.
Ohio District Uses Cloud Monitor and Content Filter to Keep Students Safe, Gain Visibility, and Improve Response Times Riverdale Local Schools serves approximately 860 students and 85 staff members in Mount Blanchard, Ohio. The district provides ...
The cybersecurity and risk management landscape is evolving at an unprecedented rate. As digital transformation accelerates, regulatory demands multiply, and threats become increasingly sophisticated, organizations can no longer afford to rely on ...
The global average cost of a breach fell to $4.44 million (the first decline in five years), but the average US cost rose to a record $10.22 million.
The post Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report appeared ...
Base44 owner Wix quickly patched a critical authentication bypass vulnerability discovered by researchers at Wiz.
The post Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications appeared first on SecurityWeek.
Minnesota Governor Tim Walz called in the National Guard to assist the City of Saint Paul in responding to a cyberattack.
The post Minnesota Activates National Guard in Response to Cyberattack appeared first on SecurityWeek.
Protecting Programmatic API Endpoints Before It’s Too Late The explosive growth of APIs in your global enterprise suggests that you’re probably missing a critical security gap. And you’re not alone. With 25% of businesses reporting that the ...
Discover the essential principles of Ethical AI, including fairness, transparency, privacy, and accountability. Learn how organizations can navigate AI ethics and build responsible, human-centered systems
The post Ethical AI: What Is It & Key ...
Tonic Security has emerged from stealth mode to tackle the complexity of exposure and vulnerability management.
The post Tonic Security Launches With $7 Million in Seed Funding appeared first on SecurityWeek.
Tracked as CVE-2025-6558, the flaw was found in Chrome’s ANGLE and GPU components and was flagged as exploited by Google TAG.
The post Apple Patches Safari Vulnerability Flagged as Exploited Against Chrome appeared first on SecurityWeek.
AI bots, AI scrapers, AI agents—you’ve seen these terms thrown around in product announcements, Hacker News posts, and marketing decks. But behind the hype, what do these bots actually do? And more importantly, how are they changing the fraud ...
Axonius has acquired Cynerio for $100 million in cash and stock to accelerate its expansion into the healthcare market.
The post Axonius Acquires Medical Device Security Firm Cynerio in $100 Million Deal appeared first on SecurityWeek.
Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned. “The most ...
It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, ...
Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity ...
Although 79% of organizations are already running AI in production, only 6% have put in place a comprehensive security strategy designed specifically for AI. As a result, most enterprises remain exposed to threats they are not yet prepared to ...
Corporate boards are adjusting to a more uncertain proxy landscape, according to EY’s 2025 Proxy Season Review. The report highlights four key 2025 proxy season trends shaping governance this year: more oversight of technology, fewer ...
Tea has said about 72,000 images were leaked online in the initial incident, and another 59,000 images publicly viewable in the app from posts, comments and direct messages were also accessed.
The post Tea App Takes Messaging System Offline After ...