Application Security News and Articles
National Presto Industries says a cyberattack has resulted in a system outage and operational disruptions.
The post Cyberattack Disrupts National Presto Industries Operations appeared first on SecurityWeek.
NTT Communications Corporation has disclosed a data breach impacting the information of nearly 18,000 customer organizations.
The post 18,000 Organizations Impacted by NTT Com Data Breach appeared first on SecurityWeek.
Dozens of schools and thousands of individuals are impacted by a data breach resulting from a ransomware attack on Carruth Compliance Consulting.
The post Many Schools Report Data Breach After Retirement Services Firm Hit by Ransomware appeared ...
Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities.
The post New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance appeared ...
As businesses continue to shift their operations to the cloud, ensuring robust cloud security has never been more critical. While the cloud offers flexibility, scalability, and cost-effectiveness, it also introduces a host of new security ...
The number of Medusa ransomware attacks observed in the first two months of 2025 doubled compared to the same period last year.
The post Medusa Ransomware Attacks Increase appeared first on SecurityWeek.
Armis has acquired OTORIO, a provider of OT/ ICS cyber security solutions. This accelerates Armis’ roll out of an on premise version of its Cyber Exposure Management platform, Armis Centrix and cements its leadership in cyber physical systems ...
Multiple Mirai-based botnets are exploiting CVE-2025-1316, an Edimax IP camera vulnerability that allows remote command execution.
The post Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets appeared first on SecurityWeek.
Discover how DNS hijacking works, explore real-world examples and discover effective ways to detect, prevent, and fix DNS hijacking with actionable strategies.
The post What is DNS Hijacking: Detection, Prevention, and Mitigation appeared first ...
In the constantly evolving world of cybersecurity, hackers continuously seek out vulnerabilities, exploit misconfigurations, and attempt to breach IT infrastructures. To counter these threats, vulnerability scanning tools serve as a crucial ...
Traditional training often lacks the hands-on experience cybersecurity teams need to counter advanced threats. AI-powered gamified simulations combine artificial intelligence with interactive learning to enhance their skills. Conventional ...
In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a ...
The U.S. DOJ indicted a dozen Chinese nationals for their role in a years-long hacker-for-hire campaign that included the Chinese government using private companies and freelance hackers to steal data from U.S. and other governments while ...
Here’s a look at the most interesting products from the past week, featuring releases from Outpost24, Palo Alto Networks, Red Canary, and Sonatype. Outpost24 introduces CyberFlex to streamline attack surface management and pen testing Outpost24 ...
The transaction is valued in the range of $120 million and gives Armis an on-premises CPS solution
The post Armis Acquires Otorio to Expand OT and CPS Security Suite appeared first on SecurityWeek.
The $1.4 billion ByBit cryptocurrency heist combined social engineering, stolen AWS session tokens, MFA bypasses and a rigged JavaScript file.
The post How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist appeared ...
Agentic AI excels when APIs are impractical, but enterprise SOCs usually have robust APIs. Learn why unified solutions like Morpheus AI outperform agentic approaches.
The post Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security ...
Do Non-Human Identities Play a Significant Role in Our Security Strategy? Indeed, they do. Non-Human Identities (NHIs) are becoming increasingly crucial in the security scenario and their importance in corporate IT ecosystems can’t be ...
Why Should CISOs Consider Non-Human Identities Security Controls? Did you know NHIs represent a significant portion of all entities in a typical network environment? A lack of robust Non-Human Identities (NHIs) security controls can pose ...
Why is Non-Human Identities Management Critical for Digital Transformation? Have you ever considered the sheer quantity of non-human identities (NHIs) that exist within your corporate network? These NHIs, also known as machine identities, play an ...