Application Security News and Articles


560,000 People Impacted Across Four Healthcare Data Breaches

Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.  The post 560,000 People Impacted Across Four Healthcare Data Breaches appeared first on SecurityWeek.

How to Run Axivion Dashboard Server in Docker (Step-by-Step Guide)

In this blog, I’ll walk you through how to containerize and run Axivion Bauhaus Suite using Docker, providing easy access to its dashboard…Continue reading on DevOps.dev »

How to Run Axivion Dashboard Server in Docker (Step-by-Step Guide)

In this blog, I’ll walk you through how to containerize and run Axivion Bauhaus Suite using Docker, providing easy access to its dashboard…Continue reading on Medium »

GUEST ESSAY: Four essential strategies to bolster cyber resilience in critical infrastructure

In 2023, victims reported nearly 900,000 cybercrime complaints to the FBI. Altogether, losses eclipsed $12.5 billion — a significant 22% increase from the losses in 2022. Related: Closing the resiliency gap Unsurprisingly, experts predict this ...

March 2025 Patch Tuesday forecast: A return to normalcy

The February Patch Tuesday updates and activity during the month marked a return to normalcy for patch management. Following the January updates addressing 100+ vulnerabilities, we saw 37 CVEs fixed in Windows 11 and 33 CVEs in Windows 10. This ...

Email Strategy & DMARC: How to Stay Ahead of Competitors in 2025

A strong email strategy isn’t just about great content—it’s about ensuring your emails reach inboxes. Learn how DMARC improves deliverability and gives you a competitive edge in 2025. The post Email Strategy & DMARC: How to Stay Ahead ...

Hetty: Open-source HTTP toolkit for security research

Hetty is an open-source HTTP toolkit designed for security research, offering a free alternative to commercial tools like Burp Suite Pro. Built with the needs of penetration testers, security professionals, and bug bounty hunters in mind, Hetty ...

How to safely dispose of old tech without leaving a security risk

Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones, which creates security risks related to the data on these devices. The data can often still be recovered if devices are erased without proper ...

The Invisible Battlefield Behind LLM Security Crisis

Overview In recent years, with the wide application of open-source LLMs such as DeepSeek and Ollama, global enterprises are accelerating the private deployment of LLMs. This wave not only improves the efficiency of enterprises, but also increases ...

Industry Moves for the week of March 10, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of March 10, 2025. Stay updated with the latest industry trends and shifts.

Who’s in your digital house? The truth about third-party access

In this Help Net Security video, Fran Rosch, CEO at Imprivata, discusses organizations’ challenges in securing third-party access and offers valuable insights on how businesses can address these risks effectively. A recent report conducted ...

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we ...

What are the cost implications of advanced NHI protection?

What is the True Cost of Not Investing in Non-Human Identities Protection? Non-Human Identities (NHIs) are increasingly significant where automated operations and cloud-based infrastructures dominate. But what happens when businesses overlook the ...

How do I measure the effectiveness of our NHI security measures?

A Perplexing Dilemma or a Solvable Query? Have you ever puzzled over how to measure the effectiveness of Non-Human Identities (NHIs) security in your organization? You understand the importance of NHIs. But quantifying their security ...

UK Cybersecurity Weekly News Roundup – 9 March 2025

Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. Microsoft Engineer's Transition to Cybersecurity Ankit Masrani, a 36-year-old software engineer, ...

BSides Exeter 2024 – Keynote: Matt Broomhall & Richard DeVere

Authors/Presenters: Matt Broomhall & Richard DeVere Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The ...

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work and how to protect yourself While QR codes are convenient, they also present significant risks. In the past few years, ...

How can NHI risks be reduced without compromising system performance?

Are your Non-Human Identities (NHIs) and Secrets effectively managed? NHIs and Secrets have emerged as crucial elements. However, the question looms: are these entities being effectively managed to reduce risks without compromising system ...

BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of Risk

Author/Presenter: Thom Langford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter ...

Cruel And Vindictive By Design

(This post originally published on 47 Watch) Recent administrative changes at the Social Security Administration (SSA) reveal a concerning pattern of decisions that disproportionately impact vulnerable populations while being implemented in ways ...