Application Security News and Articles
What if your smartwatch could spot a heart condition before your doctor did? That’s not science fiction, it’s today’s reality. Powered by artificial intelligence, wearable...Read More
The post AI and Wearable Health Tech: Real-Time Insights ...
Insight No. 1 — Fixing threat actor names
Microsoft and CrowdStrike announced that they’ll work together on the headache of multiple names for the same threat actors. But what matters most is who did it (if we know), what they accessed and ...
Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the ...
Discover what went wrong in the Commvault breach: How AppOmni’s powerful SaaS security platform steps in to stop threats before they strike.
The post OAuth Tokens: The Danger Behind the Commvault Breach appeared first on AppOmni.
The post OAuth ...
Millions of Internet-of-Things (IoT) devices running the open-source version of the Android operating system are part of the Badbox 2.0 botnet, the FBI has warned. Cyber criminals are using the botnet to perform ad fraud and click fraud. Access ...
The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025.
The post Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 appeared first on SecurityWeek.
Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams.
The post MIND Raises $30 Million for Data Loss Prevention appeared first on SecurityWeek.
Assess. Improve. Future-Proof Your PKI Strategy The Need to Give Legacy PKI a Serious Makeover From securing communications and authenticating users to ensuring data integrity, Public key infrastructure (PKI) plays a vital role in keeping ...
A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine.
The post Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure appeared ...
Pax8 Beyond is far from your average MSP conference. It’s the premier event for MSP professionals who want to learn, collaborate, and walk away with actionable insights to grow their business. From hands-on tech labs to game-changing breakout ...
Approximately 145 darknet and conventional internet domains, along with cryptocurrency funds linked to the BidenCash marketplace, have been seized by the U.S. Attorney’s Office for the Eastern District of Virginia. The operators of the ...
Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE).
The post Cisco Patches Critical ISE Vulnerability With Public PoC appeared first on SecurityWeek.
Artificial Intelligence, known to simplify complexities, is trending among organizations. Hence, AI being a buzzword is no more relevant in the context when looking at the near and far future of cybersecurity. The intricacy of cyber threats ...
An HPE StoreOnce vulnerability allows attackers to bypass authentication, potentially leading to remote code execution.
The post HPE Patches Critical Vulnerability in StoreOnce appeared first on SecurityWeek.
A reward is being offered for Maxim Alexandrovich Rudometov, who is accused of developing and managing the RedLine malware.
The post US Offering $10 Million Reward for RedLine Malware Developer appeared first on SecurityWeek.
Microsoft has been busy releasing more out-of-band (OOB) patches than usual throughout May. The May Patch Tuesday release of updates was typical in number of vulnerabilities addressed with 41 in both Windows 10 and 11, and their associated ...
Pathlock announced a major expansion of its SAP cybersecurity offerings, introducing a new portfolio of value-driven and easy-to-deploy SAP cybersecurity solutions, including a Free Edition. Designed to deliver maximum value and fast ...
Claroty announced new capabilities in its SaaS-based Claroty xDome platform that provide organizations with an impact-centric view of their CPS environment. The new additions, Device Purpose and Risk Benchmarking, allow users to see how the ...
In this Help Net Security interview, Benny Porat, CEO at Twine Security, discusses applying AI agents to security decisions. He explains why identity and access management (IAM) is the ideal starting point for both augmentation and automation, ...
Patient data is often stored or processed outside the country where it was collected. When that happens, the data falls under the laws of the country where it resides. Depending on those laws, local governments may have legal access to that data. ...