Application Security News and Articles


AI and Wearable Health Tech: Real-Time Insights for Preventive Care

What if your smartwatch could spot a heart condition before your doctor did? That’s not science fiction, it’s today’s reality. Powered by artificial intelligence, wearable...Read More The post AI and Wearable Health Tech: Real-Time Insights ...

Cybersecurity Insights with Contrast CISO David Lindner | 06/06/25

Insight No. 1 — Fixing threat actor names Microsoft and CrowdStrike announced that they’ll work together on the headache of multiple  names for the same threat actors. But what matters most is who did it (if we know), what they accessed and ...

Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the ...

OAuth Tokens: The Danger Behind the Commvault Breach

Discover what went wrong in the Commvault breach: How AppOmni’s powerful SaaS security platform steps in to stop threats before they strike. The post OAuth Tokens: The Danger Behind the Commvault Breach appeared first on AppOmni. The post OAuth ...

Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?

Millions of Internet-of-Things (IoT) devices running the open-source version of the Android operating system are part of the Badbox 2.0 botnet, the FBI has warned. Cyber criminals are using the botnet to perform ad fraud and click fraud. Access ...

Cybersecurity M&A Roundup: 42 Deals Announced in May 2025

The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025. The post Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 appeared first on SecurityWeek.

MIND Raises $30 Million for Data Loss Prevention

Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams. The post MIND Raises $30 Million for Data Loss Prevention appeared first on SecurityWeek.

How Mature Is Your PKI? Find Out the Smart Way with the PKI Maturity Model

Assess. Improve. Future-Proof Your PKI Strategy The Need to Give Legacy PKI a Serious Makeover From securing communications and authenticating users to ensuring data integrity, Public key infrastructure (PKI) plays a vital role in keeping ...

Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure

A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine. The post Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure appeared ...

3 Reasons to Visit IRONSCALES at Pax8 Beyond 2025

Pax8 Beyond is far from your average MSP conference. It’s the premier event for MSP professionals who want to learn, collaborate, and walk away with actionable insights to grow their business. From hands-on tech labs to game-changing breakout ...

145 criminal domains linked to BidenCash Marketplace seized

Approximately 145 darknet and conventional internet domains, along with cryptocurrency funds linked to the BidenCash marketplace, have been seized by the U.S. Attorney’s Office for the Eastern District of Virginia. The operators of the ...

Cisco Patches Critical ISE Vulnerability With Public PoC

Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE). The post Cisco Patches Critical ISE Vulnerability With Public PoC appeared first on SecurityWeek.

Top AI-Driven Pentest Tools 2025

Artificial Intelligence, known to simplify complexities, is trending among organizations. Hence, AI being a buzzword is no more relevant in the context when looking at the near and far future of cybersecurity. The intricacy of cyber threats ...

HPE Patches Critical Vulnerability in StoreOnce

An HPE StoreOnce vulnerability allows attackers to bypass authentication, potentially leading to remote code execution. The post HPE Patches Critical Vulnerability in StoreOnce appeared first on SecurityWeek.

US Offering $10 Million Reward for RedLine Malware Developer

A reward is being offered for Maxim Alexandrovich Rudometov, who is accused of developing and managing the RedLine malware. The post US Offering $10 Million Reward for RedLine Malware Developer appeared first on SecurityWeek.

June 2025 Patch Tuesday forecast: Second time is the charm?

Microsoft has been busy releasing more out-of-band (OOB) patches than usual throughout May. The May Patch Tuesday release of updates was typical in number of vulnerabilities addressed with 41 in both Windows 10 and 11, and their associated ...

Pathlock helps organizations protect their SAP environments from development to deployment

Pathlock announced a major expansion of its SAP cybersecurity offerings, introducing a new portfolio of value-driven and easy-to-deploy SAP cybersecurity solutions, including a Free Edition. Designed to deliver maximum value and fast ...

Claroty enhances xDome platform with Device Purpose and Risk Benchmarking capabilities

Claroty announced new capabilities in its SaaS-based Claroty xDome platform that provide organizations with an impact-centric view of their CPS environment. The new additions, Device Purpose and Risk Benchmarking, allow users to see how the ...

Why IAM should be the starting point for AI-driven cybersecurity

In this Help Net Security interview, Benny Porat, CEO at Twine Security, discusses applying AI agents to security decisions. He explains why identity and access management (IAM) is the ideal starting point for both augmentation and automation, ...

Protecting patient data starts with knowing where it’s stored

Patient data is often stored or processed outside the country where it was collected. When that happens, the data falls under the laws of the country where it resides. Depending on those laws, local governments may have legal access to that data. ...