Application Security News and Articles


Four Tips for Optimizing Data Backup and Recovery Costs

By taking simple steps like choosing a cost-effective backup storage strategy and minimizing recovery infrastructure costs, you can protect your business without bloating your budget.  The post Four Tips for Optimizing Data Backup and Recovery ...

Vulnerabilities Patched by Ivanti, VMware, Zoom 

Ivanti, VMware, and Zoom released fixes for dozens of vulnerabilities in their products on April 2025 Patch Tuesday. The post Vulnerabilities Patched by Ivanti, VMware, Zoom  appeared first on SecurityWeek.

RCE flaw in MSP-friendly file sharing platform exploited by attackers (CVE-2025-30406)

A critical RCE vulnerability (CVE-2025-30406) affecting the Gladinet CentreStack file-sharing/remote access platform has been added to CISA’s Known Exploited Vulnerabilities catalog on Tuesday. According to the vulnerability’s entry ...

Fortinet Patches Critical FortiSwitch Vulnerability

Fortinet fixes a critical-severity bug in FortiSwitch that could allow an attacker to modify administrative passwords. The post Fortinet Patches Critical FortiSwitch Vulnerability appeared first on SecurityWeek.

The Invisible Data Battle: How AI Became a Cybersec Professional’s Biggest Friend and Foe

It comes as no surprise that as the incidence of cybercrime increases, cybersec teams are becoming faster at detecting threats.  The post The Invisible Data Battle: How AI Became a Cybersec Professional’s Biggest Friend and Foe appeared first ...

Oracle Faces Mounting Criticism as It Notifies Customers of Hack

Oracle is sending out written notifications to customers over the recent hack after it initially appeared to completely deny a data breach. The post Oracle Faces Mounting Criticism as It Notifies Customers of Hack appeared first on SecurityWeek.

ICS Patch Tuesday: Vulnerabilities Addressed by Rockwell, ABB, Siemens, Schneider

Industrial giants Siemens, Rockwell, Schneider and ABB have released their March 2025 Patch Tuesday ICS security advisories. The post ICS Patch Tuesday: Vulnerabilities Addressed by Rockwell, ABB, Siemens, Schneider appeared first on SecurityWeek.

Furl introduces AI-powered remediation platform

Furl launched AI-powered remediation platform, designed to revolutionize how security teams tackle the ever-growing backlog of endpoint and server vulnerabilities. By leveraging automation and AI-driven remediation, Furl enables organizations to ...

OpenSSL prepares for a quantum future with 3.5.0 release

The OpenSSL Project has released version 3.5.0 of its widely used open-source cryptographic library, introducing new features and notable changes that signal its evolution toward future-ready cryptography. This feature release includes support ...

Index Engines CyberSense 8.10 strengthens AI-driven cyber resilience

Index Engines announced CyberSense 8.10, fully integrated with Dell PowerProtect Cyber Recovery, which provides new capabilities to enhance cyber resilience and streamline recovery from ransomware attacks. CyberSense’s highly-trained AI ...

PCI DSS 4.0: Time to Pay Up, Securely 

PCI DSS 4.0 compliance raises the regulatory bar with stricter authentication, continuous monitoring and tighter third-party oversight. The post PCI DSS 4.0: Time to Pay Up, Securely  appeared first on Security Boulevard.

Fortinet unveils FortiAI innovations enhancing threat protection and security operations

Fortinet has unveiled FortiAI innovations embedded across the Fortinet Security Fabric platform to enhance protection against new and emerging threats, simplify and automate security and network operations, and secure employee use of AI-enabled ...

Why Intelligent Continuous Security is the Future of Cyber Defense

Cyber defense is no longer about hard perimeters or checklists. It’s about adaptability, intelligence, and integration. ICS offers that path forward. It’s time to move beyond SecOps and DevSecOps—the future of cybersecurity is Intelligent ...

Fastly DDoS Attack Insights helps reveal and explain the unfolding of a DDoS attack

Fastly announced key updates to Fastly DDoS Protection that deliver visibility into attack mitigation. Fastly DDoS Protection can mitigate attacks in seconds. Now with Fastly DDoS Protection’s Attack Insights, security teams gain real-time ...

Tufin Orchestration Suite R25-1 brings expanded device coverage and boosts cloud security

Tufin releases Tufin Orchestration Suite (TOS) R25-1, bringing expanded device coverage, deeper visibility, and stronger cloud security to today’s modern hybrid and multi-cloud networks. As enterprises expand their networks across multiple ...

Identity as a Service (IDaaS): The Future of Scalable, Secure Identity in the AI Era

As digital identities become the new perimeter, IDaaS is no longer a “nice-to-have” but a mission-critical service for any modern website or online business. It centralizes identity operations, supports rapid scaling, and helps organizations ...

Why CISOs are doubling down on cyber crisis simulations

Cyber threats aren’t going away, and CISOs know prevention isn’t enough. Being ready to respond is just as important. Cyber crisis simulations offer a way to test that readiness. They let teams walk through real-world scenarios in a ...

Transforming cybersecurity into a strategic business enabler

In this Help Net Security interview, Kevin Serafin, CISO at Ecolab, discusses aligning security strategy with long-term business goals, building strong partnerships across the organization, and approaching third-party risk with agility. How do ...

APTRS: Open-source automated penetration testing reporting system

APTRS is an open-source reporting tool built with Python and Django. It’s made for penetration testers and security teams who want to save time on reports. Instead of writing reports by hand, users can create PDF and Excel files directly in the ...

AI is challenging the geopolitical status quo

AI-powered cyberattacks are becoming powerful new weapons. Organizations need to act fast to close the gap between today’s defenses and tomorrow’s threats. These attacks are only going to grow. New data from Armis Labs shows that the threat ...