Application Security News and Articles


Suspected Scattered Spider Hacker Pleads Guilty

A 20-year-old arrested last year and charged alongside others believed to be members of Scattered Spider has pleaded guilty. The post Suspected Scattered Spider Hacker Pleads Guilty appeared first on SecurityWeek.

DeepSeek Breach Yet Again Sheds Light on Dangers of AI 

AI isn’t waiting for security teams to catch up. It’s running full steam ahead, without any regard for what may stand in its way.  The recent security debacle surrounding DeepSeek — where Wiz researchers uncovered extensive ...

Exploring the EU Cybersecurity Certification Scheme: A Guide to Common Criteria

What is the EU Cybersecurity Certification Scheme? The EU Cybersecurity Certification Scheme is designed to simplify and harmonize cybersecurity certifications across the EU. With varying national-level rules and regulations creating barriers to ...

Corporate Layoffs Put Company IP at Risk 

With corporate layoffs and government workforce reductions frequently making headlines, leaders often underestimate the potential for massive data loss and intellectual property liability. The post Corporate Layoffs Put Company IP at Risk  ...

What are Verified Mark Certificates & how do they help authenticate emails?

Digital certificates are a vital part of securing online communications, including email. While they primarily safeguard sensitive data, they can also enhance trust and brand recognition. Verified mark certificates (VMCs) are a specialized type ...

N-able Vulnerability Management identifies vulnerabilities across all major operating systems

N-able announced the upcoming launch of its Vulnerability Management feature for their UEM (Unified Endpoint Management) products, N-central and N-sight. The new built-in feature will allow organizations to identify, prioritize, remediate, and ...

Symmetry Systems Appoints Dr. Anand Singh as Chief Security and Strategy Officer

Symmetry Systems Appoints Dr. Anand Singh as Chief Security and Strategy Officer San Mateo, CA – April 7, 2024 –... The post Symmetry Systems Appoints Dr. Anand Singh as Chief Security and Strategy Officer appeared first on Symmetry ...

CISOs battle security platform fatigue

It starts with good intentions. A tool to stop phishing. Another to monitor endpoints. One more for cloud workloads. Soon, a well-meaning CISO finds themselves managing dozens of products across teams, each with its own dashboard, alerts, and ...

The shift to identity-first security and why it matters

In this Help Net Security interview, Arun Shrestha, CEO at BeyondID, discusses how AI is transforming secure access management for both attackers and defenders. He discusses the shift toward identity-first security, and the role of contextual and ...

YES3 Scanner: Open-source S3 security scanner for public access, ransomware protection

YES3 Scanner is an open-source tool that scans and analyzes 10+ different configuration items for your S3 buckets in AWS. This includes access such as public access via ACLs and bucket policies – including the complex combinations of ...

The 23andMe Collapse, Signal Gate Fallout

In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on ...

The rise of compromised LLM attacks

In this Help Net Security video, Sohrob Kazerounian, Distinguished AI Researcher at Vectra AI, discusses how the ongoing rapid adoption of LLM-based applications has already introduced new cybersecurity risks. These vulnerabilities will not be in ...

Industry Moves for the week of April 7, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of April 7, 2025. Stay updated with the latest industry trends and shifts.

Achieving Independent Control Over NHIs

Is Independent Control over Non-Human Identities Possible? The challenge of managing Non-Human Identities (NHIs) effectively is significantly increasing. With the rapid expansion of cloud technologies and the multiplying scale of machine ...

NHI Solutions That Fit Your Budget

Why Non-Human Identities (NHIs) and Secrets Management Matter? Have you ever considered how seemingly non-interactive entities can pose a significant threat to your business’ security? NHIs and secrets management are two terms that are gaining ...

Ensuring Your NHIs Remain Free From Threats

How Can You Secure Your Organization’s NHIs? You may be pondering about the best practices for protecting your company’s Non-Human Identities (NHIs) and their secrets. To ensure your NHIs are free from threats, it’s essential to understand ...

BSidesLV24 – HireGround – How Living And Quilting History Made Me A Better Cybersecurity Professional

Author/Presenter: Mea Clift Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via ...

Where Is Government When It Comes to Cloud in 2025?

A new report just released by Forrester highlights the growing cloud footprint in the public sector globally, along with challenges ahead in areas such as security and modernizing core applications. The post Where Is Government When It Comes to ...

Week in review: Probing activity on Palo Alto Networks GlobalProtect portals, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are probing Palo Alto Networks GlobalProtect portals Cybersecurity company GreyNoise is warning about a significant increase of ...

Smart Strategies for Managing Machine Identities

Why is Smart Machine Identity Management Crucial? What comes to your mind when you think about cybersecurity? Most often, we conceptualize cybersecurity as a measure to protect user data, financial information, and other forms of human-associated ...