Application Security News and Articles


News alert: INE Security spotlights healthcare companies facing rising exposure to costly breaches

Cary, NC, Mar. 24, 2025, CyberNewswire –– INE Security, a global provider of cybersecurity training and certification, today announced its initiative to spotlight the increasing cyber threats targeting healthcare institutions. In recognition ...

DEF CON 32 – Recon Village – Bastardo Grande: Hunting the Largest Black Market Bike Fence

Speaker: Bryan Hance Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

News alert: Arsen introduces new AI-based phishing tests to improve social engineering resilience

Paris, France, Mar. 24, 2025, CyberNewswire — Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full release of Conversational Phishing, a groundbreaking feature embedded in its phishing ...

Cyber Guardians: INE Security Champions Cybersecurity Training During National Physicians Week 2025

Cary, NC, 24th March 2025, CyberNewsWire The post Cyber Guardians: INE Security Champions Cybersecurity Training During National Physicians Week 2025 appeared first on Security Boulevard.

Cato Uses LLM-Developed Fictional World to Create Jailbreak Technique

A Cato Networks threat researcher with little coding experience was able to convince AI LLMs from DeepSeek, OpenAI, and Microsoft to bypass security guardrails and develop malware that could steal browser passwords from Google Chrome. The post ...

Randall Munroe’s XKCD ‘Planet Definitions’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Planet Definitions’ appeared first on Security Boulevard.

NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD

The effects of the backlog is already being felt in vulnerability management circles where NVD data promises an enriched source of truth. The post NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD appeared first on SecurityWeek.

Protecting your personal information from data brokers

How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this? So, these companies, called data brokers, collect everything they can ...

Oracle Denies Cloud Breach After Hacker Offers to Sell Data 

Oracle has denied that Cloud systems have been breached after a hacker claimed to have stolen millions of records. The post Oracle Denies Cloud Breach After Hacker Offers to Sell Data  appeared first on SecurityWeek.

Keeping Secrets Out of Logs: Strategies That Work

tl;dr: There's no silver bullet for keeping secrets out of logs, but if we put several "lead bullets" in the right places, we have a good chance of success. The post Keeping Secrets Out of Logs: Strategies That Work appeared first on Security ...

DEF CON 32 – Recon Village – Bypassing WHOIS Rate Limiting & Tracking Fresh Domains

Speaker: Willis Vandevanter Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Russian Firm Offers $4 Million for Telegram Exploits

A Russian exploit acquisition firm says it is willing to pay up to $4 million for full-chain exploits targeting the popular messaging service Telegram. The firm, Operation Zero, is known for selling zero-day exploits exclusively to Russian ...

Code Commits Are Not a Measure of Software Success, Customer Delight Is

Too often, we hear engineering teams proudly claim, “We push code commits every day.” It sounds impressive, continuous work, constant output, relentless progress. But here’s...Read More The post Code Commits Are Not a Measure of Software ...

We raised a $35M Series B. Here’s what’s next for fake data.

Today, we're excited to announce that Tonic.ai has raised $35 million in Series B funding led by global venture capital and private equity firm Insight Partners. A milestone that serves as further proof of the value of mimicking production data ...

Report: Fortune 500 employee-linked account exposure

A backbone of our economy, Fortune 500 companies employ more than 31 million people worldwide. According to data analyzed by the Enzoic research team, over the past three years of 2022, 2023, and 2024, more than three million employee-linked ...

Eclypsium Earns Spot on Coveted 2025 CRN Partner Program Guide

Global Partner Program empowers partners to deliver top-tier supply chain security solutions to enterprise customers Portland, OR – March 24, 2025 – Eclypsium, a leader in infrastructure supply chain security, is proud to announce that it has ...

Webinar Tomorrow: Which Security Testing Approach is Right for You?

Understand whether BAS, Automated Penetration Testing, or the combined approach of Adversarial Exposure Validation (AEV) aligns best with your organization’s unique security needs. The post Webinar Tomorrow: Which Security Testing Approach is ...

Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)

A critical vulnerability (CVE-2025-29927) in the open source Next.js framework can be exploited by attackers to bypass authorization checks and gain unauthorized access to web pages they should no have access to (e.g., the web app’s admin ...

Privacy Roundup: Week 12 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 16 MAR 2025 - 22 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due ...

US Lifts Sanctions Against Crypto Mixer Tornado Cash

The US Department of the Treasury has removed sanctions against the fully decentralized cryptocurrency mixer service Tornado Cash. The post US Lifts Sanctions Against Crypto Mixer Tornado Cash appeared first on SecurityWeek.