Application Security News and Articles


Webinar recap: The security mistakes everyone makes in M&A

Discover exactly how to avoid the common security pitfalls during M&A from our panel of experts, who are drawing from decades of experience in the field. The post Webinar recap: The security mistakes everyone makes in M&A appeared first ...

In Defense of Oversight – The President and the PCLOB

In late January 2025, President Trump fired the Democratically (big D) appointed members of the Privacy and Civil Liberties Oversight Board (PCLOB), an independent watchdog entity designed to provide input and oversight to the Intelligence ...

The Future of Automation in Cybersecurity

The future of cybersecurity is not about choosing between AI and human expertise, but rather how to harness both to create a more secure digital world.  The post The Future of Automation in Cybersecurity appeared first on Security Boulevard.

Navigating Security Challenges in the Age of Data Complexity 

Organizations need to embrace the transformative powers of AI but do so with a vigilant eye toward the data security and privacy challenges it presents. The post Navigating Security Challenges in the Age of Data Complexity  appeared first on ...

ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens

Industrial giants Schneider Electric and Siemens have released February 2025 Patch Tuesday ICS security advisories. The post ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens appeared first on SecurityWeek.

Thales launches OneWelcome FIDO Key Lifecycle Management

Thales launched OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. OneWelcome FIDO Key Lifecycle Management combines an interoperable management ...

Armor Nexus reduces an organization’s attack surface

Armor unveiled Nexus, a platform designed to provide transparency, proactive risk reduction, and intelligent support for large, complex organizations to ensure an adaptable, comprehensive, and unified cybersecurity strategy. With Nexus, Armor ...

Thales unveils OneWelcome FIDO Key Management for scalable passkey security

Thales has announced the launch of OneWelcome FIDO Key Lifecycle Management, a new solution to help large organizations successfully deploy and manage FIDO security passkeys at scale. OneWelcome FIDO Key Lifecycle Management combines an ...

EchoMark’s API detects, investigates, and identifies the source of data leaks

EchoMark launched its new API. The API seamlessly integrates EchoMark’s watermarking and leak detection capabilities directly into workflows and applications, protecting sensitive information without disrupting current operations. EchoMark ...

Stolen Information Used in Personalized Immigration-Themed Attack

Stolen Information Used in Personalized Immigration-Themed Attack  The post Stolen Information Used in Personalized Immigration-Themed Attack appeared first on Security Boulevard.

It’s time to secure the extended digital supply chain

Organizations’ increasing reliance on third-party software and services has created an environment with more vulnerabilities and harder-to-detect risks. Attackers know they can increase efficiency and profitability by compromising the supply ...

SysReptor: Open-source penetration testing reporting platform

SysReptor is a customizable open-source penetration testing reporting platform built for pentesters, red teamers, and cybersecurity professionals. You can optimize your workflow by simplifying, automating, and personalizing your reports. ...

Silent breaches are happening right now, most companies have no clue

The breaches and ransomware attacks of 2024 highlighted systemic vulnerabilities, demonstrating how third-party and fourth-party dependencies amplify risks across industries, according to a Black Kite report. Researchers revealed how silent ...

CEOs must act now to embrace AI or risk falling behind

While 4 out of 5 CEOs recognize AI’s potential, many worry gaps in their understanding will impact strategic decisions, risking missed opportunities and falling behind competitors, according to Cisco. Yet, CEOs are not standing still. With ...

Cybercrime Threatens National Security, Google Threat Intel Team Says

On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups. The post Cybercrime Threatens National Security, Google Threat Intel Team ...

Product Update | Cloud Monitor + Content Filter

NEW! In Cloud Monitor: Policy Enhancements We’re thrilled to introduce our latest Cloud Monitor policy updates! We designed these enhancements to make it easier than ever for administrators to keep students safe and secure in the classroom. ...

10 Questions to Help You Decide Whether to Hire an SRE or Managed KaaS

Deciding between managing Kubernetes in-house or partnering with a managed service provider can be a difficult choice for organizations seeking to optimize their cloud infrastructure. Over the past several years at Fairwinds, I’ve been part of ...

Authorities Seize 8Base Ransomware Infrastructure, Arrest Four Russians

With "Operation Phobos Aetor," international law enforcement, including the US DOJ and Europol, arrest four Russian nationals and seize infrastructure connected to the 8Bbase ransomware group, the largest affiliate of the prolific Phobos RaaS ...

Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)

February 2025 Patch Tuesday is here, and Microsoft has delivered fixes for 56 vulnerabilities, including two zero-days – CVE-2025-21418 and CVE-2025-21391 – under active exploitation. CVE-2025-21418 and CVE-2025-21391 CVE-2025-21418 ...

Microsoft Patches ‘Wormable’ Windows Flaw and File-Deleting Zero-Day

The Microsoft Patch Tuesday machine hummed loudly this month urgent fixes for a pair of already-exploited Windows zero-days. The post Microsoft Patches ‘Wormable’ Windows Flaw and File-Deleting Zero-Day appeared first on SecurityWeek.