Application Security News and Articles
The Interlock ransomware group has leaked data allegedly stolen from Kettering Health in a recent cyberattack.
The post Ransomware Gang Leaks Alleged Kettering Health Data appeared first on SecurityWeek.
China issued warrants for 20 Taiwanese people it said carried out hacking missions in the Chinese mainland on behalf of the island’s ruling party.
The post China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for ...
Universities have always been places of learning and innovation. Yet, in today’s digital world, they’re also prime targets for cybercriminals. From online learning platforms to student records, from research databases to financial systems, ...
FIPS 140-3 and You, Part Three
divya
Thu, 06/05/2025 - 07:00
Last spring, in the second installment of this blog series, we were excited to announce that our Luna HSM product line was the first HSM in the industry to achieve FIPS 140-3 level 3 ...
Germany fined Vodafone $51 million for failing to protect user data from partners and unauthorized third-parties.
The post Vodafone Germany Fined $51 Million Over Privacy, Security Failures appeared first on SecurityWeek.
Pinterest is addressing AWS EC2 network throttling and AI-generated content issues to enhance user experience. Learn more now!
The post Pinterest Enhances Reliability and Quality Amid AI Content Flood appeared first on Security Boulevard.
Fortinet has enhanced its data and productivity security portfolio, expanding FortiMail with the launch of the FortiMail Workspace Security suite. These new capabilities extend protection not only to email but also to browser and collaboration ...
According to the Wallarm Q1 2025 ThreatStats report, 70% of all application attacks target APIs. The industry can no longer treat API security as a sidenote; it’s time to treat it as the main event. NIST seems to be on board with this view, ...
Meta has released an open source AI tool called Automated Sensitive Document Classification. It was originally built for internal use and is designed to find sensitive information in documents and apply security labels automatically. The tool ...
Security teams are overwhelmed by a flood of alerts, most of which lack the context needed to accurately assess and espond to threats, according to ARMO. Respondents report receiving an average of 4,080 security alerts per month – or 136 alerts ...
If it seems like scams are popping up everywhere lately, you’re not wrong. A new survey from Google shows most Americans feel the same, and they’re starting to change how they handle things online because of it. But different age groups are ...
In this Help Net Security video, Jonathan Stross, SAP Security Analyst at Pathlock, examines why managing SAP security updates is so complex for enterprises. From highly customized, interconnected environments to the pressure of real-time ...
32% of healthcare executives say their organization suffered a breach in the past 12 months, and 46% say they are experiencing a higher volume of attacks, according to LevelBlue. AI brings hope and concern As AI promises healthcare organizations ...
By Dakshitaa Babu, Security Researcher, SquareX
In a candid letter that Joshua Miller, CEO of Arc Browser, wrote to the community, he revealed a truth the tech industry has been dancing around: “the dominant operating system on desktop ...
Outdated secrets managers can't keep up with modern development. Learn why centralized, automated solutions are becoming the new standard.
The post Secrets management in 2025: Why teams are moving on from traditional tools appeared first on ...
We need to apply the principles of DevSecOps to the new world of AI development
The post AISecOps: The Next ‘Shift Left’ for Securing AI Applications appeared first on Security Boulevard.
DMARC isn’t hard. It’s just not obvious.
The post Top 10 Challenges Implementing DMARC for Microsoft 365 appeared first on Security Boulevard.
Are You Navigating the Compliance Landscape Successfully? Compliance challenges where stringent data protection regulations reign supreme can indeed be daunting. Are companies adequately prepared to satisfy these demands? The potent mix of ...
Why is the Management of Cloud Secrets Crucial for Security Independence? The relentless pace of digital expansion adds complexity, making managing cloud secrets a necessity for achieving security independence. But why is securing Non-Human ...
Are You Securing Your Cloud Environment Effectively? When it comes to building an impenetrable defense, the strategic management of Non-Human Identities (NHIs) plays an integral role. Where businesses are increasingly shifting their operations to ...