Application Security News and Articles
Palo Alto, California, 17th July 2025, CyberNewsWire
The post SquareX Collaborates with Top Fortune 500 CISOs to Launch The Browser Security Field Manual at Black Hat appeared first on Security Boulevard.
Karen Serobovich Vardanyan pleaded not guilty to charges related to his alleged role in the Ryuk ransomware operation.
The post Armenian Man Extradited to US Over Ryuk Ransomware Attacks appeared first on SecurityWeek.
At the upcoming Black Hat USA 2025 in Las Vegas, Stellar Cyber will debut its Identity Threat Detection & Response (ITDR) capabilities, fully embedded into its open, unified, AI-driven SecOps platform. See Identity Threat Detection & ...
Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and location.
The post Mobile Forensics Tool Used by Chinese Law Enforcement Dissected appeared first on SecurityWeek.
Although there are many positives to new QC technology, we can’t ignore the fact that we’re entering an era of quantum computing that brings some serious cybersecurity threats.
The post Are We Truly Prepared for the Era of Quantum Computing? ...
An $8 billion class action investors’ lawsuit against Meta stemming from the 2018 privacy scandal involving the Cambridge Analytica political consulting firm.
The post Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook ...
Secure threat intelligence sharing reduces risk, accelerates response and builds resilience across entire ecosystems.
The post Collaboration is Key: How to Make Threat Intelligence Work for Your Organization appeared first on Security Boulevard.
Over the years, the number of services we use has exploded, and so has the need to protect our credentials. Back in what I like to call “the age of innocence,” we scribbled passwords on paper or reused “password123” across five different ...
Four CVEs disclosed at the Pwn2Own Berlin 2025 hacking competition have been patched in VMware products.
The post VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched appeared first on SecurityWeek.
Identity-based attacks have become the path of least resistance and it is the responsibility of all organizations to shore up their defenses to mitigate these threats.
The post I Hacked (Logged) In Through The Front Door appeared first on ...
Cisco has released patches for multiple vulnerabilities, including a critical flaw in Cisco ISE that leads to remote code execution (RCE).
The post Cisco Patches Another Critical ISE Vulnerability appeared first on SecurityWeek.
Oracle’s July 2025 Critical Patch Update contains 309 security patches that address approximately 200 unique CVEs.
The post Oracle Patches 200 Vulnerabilities With July 2025 CPU appeared first on SecurityWeek.
Socure launched Workforce Verification solution to address the growing threat of employee fraud. Socure’s Workforce Verification adapts its enterprise-grade identity verification and fraud prevention specific to hiring workflows, detecting ...
Legit Security announced enhanced capabilities for significant code change and workflow orchestration within its platform. These capabilities provide insight into changes in code, configuration, or infrastructure that can impact an ...
Akeyless has launched Akeyless SecretlessAI, a solution purpose-built to secure AI agents and Model Context Protocol (MCP) servers. As enterprises accelerate AI adoption, these autonomous systems are increasingly entrusted with accessing ...
In this Help Net Security interview, Cindy Segond von Banchet CC, Cybersecurity Lead at Yokogawa Europe, shares her insights on what defines a sustainable OT security program. She outlines the key differences between short-term fixes and ...
A statute that requires identity verification to read news articles or shop for groceries would be problematic; one that does so for pornography is catastrophic.
The post “Prove Your Age, Lose Your Privacy”: How Free Speech Coalition v. ...
Machine learning models are everywhere now, from chatbots to credit scoring tools, and they carry traces of the data they were trained on. When someone asks to have their personal data erased under laws like the GDPR, their data also needs to be ...
In this Help Net Security video, Andy Ulrich, CISO at Vonage, explains how silent authentication offers a smarter, seamless solution to the security and productivity challenges of BYOD. He breaks down how it works, why it matters, and how ...
Many companies say they can’t find enough cybersecurity professionals. But a new report suggests the real problem isn’t a lack of talent, but how those jobs are structured and advertised. Expel’s 2025 Enterprise Cybersecurity Talent Index ...