Application Security News and Articles


Finastra Starts Notifying People Impacted by Recent Data Breach

Financial software firm Finastra is notifying individuals whose personal information was stolen in a recent data breach. The post Finastra Starts Notifying People Impacted by Recent Data Breach appeared first on SecurityWeek.

Critical Vulnerability Patched in Juniper Session Smart Router

A critical vulnerability tracked as CVE-2025-21589 has been patched in Juniper Networks’ Session Smart Router. The post Critical Vulnerability Patched in Juniper Session Smart Router appeared first on SecurityWeek.

Secure AI deployment is complicated: 5 ways to get your ducks in a row

The practical and secure implementation of artificial intelligence systems within organizations — starting with the exploration of tools, applications, supply chains, and other components necessary to deploy AI successfully — is the focus of ...

Singulr Launches With $10M in Funding for AI Security and Governance Platform

Singulr AI announced its launch with $10 million in seed funding raised for an enterprise AI security and governance platform.  The post Singulr Launches With $10M in Funding for AI Security and Governance Platform appeared first on SecurityWeek.

Golang Backdoor Abuses Telegram for C&C Communication

A newly discovered Golang backdoor is abusing Telegram for communication with its command-and-control (C&C) server. The post Golang Backdoor Abuses Telegram for C&C Communication appeared first on SecurityWeek.

ProcessUnity accelerates third-party assessments

ProcessUnity announced the next generation of the Global Risk Exchange. This platform transforms the third-party assessment process, reducing friction for both organizations and their third parties while streamlining vendor onboarding and ...

Predicting the year of cybersecurity ahead (minus regulations)

S04 EP 02: Common themes we can expect to see in 2025 The post Predicting the year of cybersecurity ahead (minus regulations) appeared first on Security Boulevard.

Microsoft Warns of Improved XCSSET macOS Malware

Microsoft has observed a new variant of the XCSSET malware being used in limited attacks against macOS users. The post Microsoft Warns of Improved XCSSET macOS Malware appeared first on SecurityWeek.

Palo Alto Networks Confirms Exploitation of Firewall Vulnerability

Palo Alto Networks has confirmed that a recently patched firewall vulnerability tracked as CVE-2025-0108 is being actively exploited. The post Palo Alto Networks Confirms Exploitation of Firewall Vulnerability appeared first on SecurityWeek.

Facts, Schmacts – Meta Joins X in Ceasing Content Moderation

On January 6, 2025, Meta, formerly known as Facebook, formally announced that it would cease its “fact-checking” operations, and allow the internet itself, through comments posted, to be the final arbiter of what is true and false. The post ...

Ex-NSO Group CEO’s Security Firm Dream Raises $100M at $1.1B Valuation

Israeli cybersecurity startup Dream has raised $100 million in Series B funding and is now valued at $1.1 billion. The post Ex-NSO Group CEO’s Security Firm Dream Raises $100M at $1.1B Valuation appeared first on SecurityWeek.

Hardware Cryptographic Accelerators to Enhance Security Without Slowing Down

From smartphones to smart homes and even industrial applications, embedded systems are everywhere. But as these systems become more prevalent in our daily lives, the risks of cyber threats grow just as fast. That’s why it’s essential to build ...

The risks of autonomous AI in machine-to-machine interactions

In this Help Net Security, Oded Hareven, CEO of Akeyless Security, discusses how enterprises should adapt their cybersecurity strategies to address the growing need for machine-to-machine (M2M) security. According to Hareven, machine identities ...

Amazon Phish Hunts for Security Answers and Payment Information

Amazon Phish Hunts for Security Answers and Payment Information The post Amazon Phish Hunts for Security Answers and Payment Information appeared first on Security Boulevard.

Balancing cloud security with performance and availability

Your business can’t realize the many benefits of cloud computing without ensuring performance and availability in its cloud environments. Let’s look at some examples. Scalability: To scale your business’s cloud computing ...

Cybersecurity jobs available right now: February 18, 2025

Airport Cybersecurity Engineer II Salt Lake City Corporation | USA | On-site – View job details As an Airport Cybersecurity Engineer II, you will develop and implement policies, procedures, and training plans for security and ...

AI Code Assistant: Revolutionizing Software Development in 2025

The AI Code Assistant has become an indispensable tool for software developers in 2025.Continue reading on Medium »

Static Application Security Testing (SAST)

Modern development strives to simplify code while increasing its predictability and efficiency. Let’s explore how to transform the…Continue reading on Medium »

Cybersecurity as a Business Imperative: Embracing a Risk Management Approach

Cybersecurity is much more than just a technical challenge. It’s now a critical business imperative that requires a strategic risk management approach. By integrating cybersecurity into broader risk management frameworks, you can proactively ...

DEF CON 32 – Locksport Competitions: Compete in the Olympics of Locks

Authors/Presenters: Matt Burrough Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...