Application Security News and Articles


Ransomware Gang Leaks Alleged Kettering Health Data

The Interlock ransomware group has leaked data allegedly stolen from Kettering Health in a recent cyberattack. The post Ransomware Gang Leaks Alleged Kettering Health Data appeared first on SecurityWeek.

China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links

China issued warrants for 20 Taiwanese people it said carried out hacking missions in the Chinese mainland on behalf of the island’s ruling party. The post China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for ...

Top Cybersecurity Tools for Higher Education: Protecting Institutions

Universities have always been places of learning and innovation. Yet, in today’s digital world, they’re also prime targets for cybercriminals. From online learning platforms to student records, from research databases to financial systems, ...

FIPS 140-3 and You, Part Three

FIPS 140-3 and You, Part Three divya Thu, 06/05/2025 - 07:00 Last spring, in the second installment of this blog series, we were excited to announce that our Luna HSM product line was the first HSM in the industry to achieve FIPS 140-3 level 3 ...

Vodafone Germany Fined $51 Million Over Privacy, Security Failures

Germany fined Vodafone $51 million for failing to protect user data from partners and unauthorized third-parties. The post Vodafone Germany Fined $51 Million Over Privacy, Security Failures appeared first on SecurityWeek.

Pinterest Enhances Reliability and Quality Amid AI Content Flood

Pinterest is addressing AWS EC2 network throttling and AI-generated content issues to enhance user experience. Learn more now! The post Pinterest Enhances Reliability and Quality Amid AI Content Flood appeared first on Security Boulevard.

FortiMail Workspace Security expands protection beyond email to web and collaboration tools

Fortinet has enhanced its data and productivity security portfolio, expanding FortiMail with the launch of the FortiMail Workspace Security suite. These new capabilities extend protection not only to email but also to browser and collaboration ...

Addressing API Security with NIST SP 800-228

According to the Wallarm Q1 2025 ThreatStats report, 70% of all application attacks target APIs. The industry can no longer treat API security as a sidenote; it’s time to treat it as the main event. NIST seems to be on board with this view, ...

Meta open-sources AI tool to automatically classify sensitive documents

Meta has released an open source AI tool called Automated Sensitive Document Classification. It was originally built for internal use and is designed to find sensitive information in documents and apply security labels automatically. The tool ...

The cloud security crisis no one’s talking about

Security teams are overwhelmed by a flood of alerts, most of which lack the context needed to accurately assess and espond to threats, according to ARMO. Respondents report receiving an average of 4,080 security alerts per month – or 136 alerts ...

Google survey shows Americans are changing how they fight scams

If it seems like scams are popping up everywhere lately, you’re not wrong. A new survey from Google shows most Americans feel the same, and they’re starting to change how they handle things online because of it. But different age groups are ...

Why SAP security updates are a struggle for large enterprises

In this Help Net Security video, Jonathan Stross, SAP Security Analyst at Pathlock, examines why managing SAP security updates is so complex for enterprises. From highly customized, interconnected environments to the pressure of real-time ...

Healthcare organizations are at a turning point with AI

32% of healthcare executives say their organization suffered a breach in the past 12 months, and 46% say they are experiencing a higher volume of attacks, according to LevelBlue. AI brings hope and concern As AI promises healthcare organizations ...

What the Arc Browser Story Reveals About the Future of Browser Security

By Dakshitaa Babu, Security Researcher, SquareX In a candid letter that Joshua Miller, CEO of Arc Browser, wrote to the community, he revealed a truth the tech industry has been dancing around: “the dominant operating system on desktop ...

Secrets management in 2025: Why teams are moving on from traditional tools

Outdated secrets managers can't keep up with modern development. Learn why centralized, automated solutions are becoming the new standard. The post Secrets management in 2025: Why teams are moving on from traditional tools appeared first on ...

AISecOps: The Next ‘Shift Left’ for Securing AI Applications

We need to apply the principles of DevSecOps to the new world of AI development The post AISecOps: The Next ‘Shift Left’ for Securing AI Applications appeared first on Security Boulevard.

Top 10 Challenges Implementing DMARC for Microsoft 365

DMARC isn’t hard. It’s just not obvious. The post Top 10 Challenges Implementing DMARC for Microsoft 365 appeared first on Security Boulevard.

Satisfying Compliance Demands with Enhanced Cloud Security

Are You Navigating the Compliance Landscape Successfully? Compliance challenges where stringent data protection regulations reign supreme can indeed be daunting. Are companies adequately prepared to satisfy these demands? The potent mix of ...

Independence in Managing Cloud Secrets Safely

Why is the Management of Cloud Secrets Crucial for Security Independence? The relentless pace of digital expansion adds complexity, making managing cloud secrets a necessity for achieving security independence. But why is securing Non-Human ...

Building an Impenetrable Defense with NHIs

Are You Securing Your Cloud Environment Effectively? When it comes to building an impenetrable defense, the strategic management of Non-Human Identities (NHIs) plays an integral role. Where businesses are increasingly shifting their operations to ...