Application Security News and Articles


Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations

Misconfigurations are the cause of most cloud breaches. Aryon is on a mission to prevent them. The post Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations appeared first on SecurityWeek.

eBook: What does it take to be a full-fledged virtual CISO?

Virtual Chief Information Security Officer (vCISO) services are in high demand. Even though it is clear to all that this trend is growing, most service providers only offer a portion of overall CISO duties. Many ask themselves “Can we offer ...

Creating Elegant Azure Custom Roles: Putting NotActions into Action!

Creating custom Roles in Azure can be a complex process that may yield long and unwieldy Role definitions that are difficult to manage. However, it doesn’t have to be that way. Read on to learn how you can simplify this process using the Azure ...

Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates

NOTE:  This article discusses proposed changes to existing regulations.  These changes are not in effect as of this article’s date […] The post Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates appeared first on ...

Polish Space Agency Hit by Cyberattack

The Polish space agency POLSA says it has disconnected its network from the internet to contain a cyberattack. The post Polish Space Agency Hit by Cyberattack appeared first on SecurityWeek.

Jamf to Acquire Identity Automation for $215 Million

Apple device management firm Jamf has entered into an agreement to acquire IAM platform Identity Automation. The post Jamf to Acquire Identity Automation for $215 Million appeared first on SecurityWeek.

Vulnerabilities Patched in Qualcomm, Mediatek Chipsets

Chip makers Qualcomm and Mediatek have released patches for many vulnerabilities across their products. The post Vulnerabilities Patched in Qualcomm, Mediatek Chipsets appeared first on SecurityWeek.

Broadcom Patches 3 VMware Zero-Days Exploited in the Wild

Broadcom patched VMware zero-days CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226 after Microsoft warned it of exploitation. The post Broadcom Patches 3 VMware Zero-Days Exploited in the Wild appeared first on SecurityWeek.

Veriti Research Uncovers Malware Exploiting Cloud Services 

Veriti Research has identified a growing trend – attackers leveraging cloud infrastructure to facilitate malware distribution and command-and-control (C2) operations. This evolving tactic not only makes detection more challenging but also ...

Google Patches Pair of Exploited Vulnerabilities in Android

Android’s March 2025 security update addresses over 40 vulnerabilities, including two actively exploited in the wild. The post Google Patches Pair of Exploited Vulnerabilities in Android appeared first on SecurityWeek.

Exploitation Long Known for Most of CISA’s Latest KEV Additions

Exploitation has been known for months or years for most of the latest vulnerabilities added by CISA to its KEV catalog. The post Exploitation Long Known for Most of CISA’s Latest KEV Additions appeared first on SecurityWeek.

Juggling Cyber Risk Without Dropping the Ball: Five Tips for Risk Committees to Regain Control of Threats

By dismantling silos and enabling continuous visibility, organizations can strengthen their cybersecurity posture and align risk management with long-term business success.  The post Juggling Cyber Risk Without Dropping the Ball: Five Tips for ...

DPRK IT Fraud Network Uses GitHub to Target Global Companies

Nisos DPRK IT Fraud Network Uses GitHub to Target Global Companies Nisos is tracking a network of likely North Korean (DPRK)-affiliated IT workers posing as Vietnamese, Japanese, and Singaporean nationals with the goal of obtaining employment in ...

Immuta AI and Copilot enhance data governance at scale

Immuta announced Immuta AI, a new foundational layer within the Immuta Platform, designed to infuse AI across the platform to enhance data governance at scale – including seamless integration with Immuta’s Data Marketplace to further ...

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

In this Help Net Security interview, Matthew Darlage, CISO at Citizens, discusses key strategies for strengthening cyber resilience in banks. He underlines that adherence to frameworks like NIST is essential for continuous improvement and that ...

CISO vs. CIO: Where security and IT leadership clash (and how to fix it)

The dynamic between CISOs and CIOs has always been complex. While both roles are essential to an organization’s success, their priorities often put them at odds. The CIO focuses on IT efficiency, innovation, and business enablement, while the ...

Why a push for encryption backdoors is a global security risk

Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create a backdoor to encrypted iCloud data is just one example, one that ...

Cybersecurity jobs available right now: March 4, 2025

Application Security Engineer Via | Israel | Hybrid – View job details As a Application Security Engineer, you will perform security assessments, including penetration testing, vulnerability scanning, and code reviews, to identify ...