Application Security News and Articles


What is Zero Data Retention and Why it May Be the Future of Secure Automation

Zero Data Retention offers a new path forward. One that enables intelligent automation, deep integrations and real-time workflows — without the baggage of persistent data storage The post What is Zero Data Retention and Why it May Be the Future ...

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking

Multiple vulnerabilities in Ruckus Wireless management products could be exploited to fully compromise the managed environments. The post Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking appeared first on SecurityWeek.

A Practical Guide to Building a Red Teaming Strategy for AI

Start your red teaming journey with intent, not ambition. Designate a lead with both AI literacy and a security mindset. The post A Practical Guide to Building a Red Teaming Strategy for AI appeared first on Security Boulevard.

Canadian Electric Utility Says Power Meters Disrupted by Cyberattack

Nova Scotia Power is notifying individuals affected by the recent data breach, including in the United States. The post Canadian Electric Utility Says Power Meters Disrupted by Cyberattack appeared first on SecurityWeek.

23andMe…and Everyone Else: All Eyes are on the Most Personal Data 

As tempting as it is to find out if you descended from some grand poobah in Scandinavia or if your real great (x10) grandmother was Catherine the Great, the implications of a fine recently levied against 23andMe might coax you into keeping your ...

Ivanti, Fortinet, Splunk Release Security Updates

Ivanti, Fortinet, and Splunk have released patches for critical- and high-severity vulnerabilities in their products. The post Ivanti, Fortinet, Splunk Release Security Updates appeared first on SecurityWeek.

Barracuda protects Microsoft Entra ID environment from data loss

Barracuda Networks launched Barracuda Entra ID Backup Premium – a comprehensive, cost-effective solution to safeguard Microsoft Entra ID environments from accidental and malicious data loss. With fast, reliable recovery of vital identity data, ...

Zenni ID Guard disrupts unwanted infrared facial tracking

Zenni Optical introduces Zenni ID Guard, a privacy-focused lens technology that reflects near-infrared light to help disrupt unwanted tracking. It’s a shield for your face, built right into your everyday glasses, all at an accessible price. ...

IPinfo boosts privacy detection capabilities with Residential Proxy Detection API

IPinfo launched Residential Proxy Detection API, extending its privacy detection capabilities to help security and fraud prevention teams identify one of the most evasive forms of anonymized IP traffic. Residential Proxy Detection is also ...

Alleged Chinese State Hacker Wanted by US Arrested in Italy

Xu Zewei has been arrested on charges that he is a member of the Chinese state-sponsored hacking group Hafnium (Silk Typhoon). The post Alleged Chinese State Hacker Wanted by US Arrested in Italy appeared first on SecurityWeek.

Why your security team feels stuck

Cybersecurity friction usually gets framed as a user problem: password policies that frustrate employees, MFA that slows down logins, or blocked apps that send workers into the arms of shadow IT. But there’s a different kind of friction ...

It’s time to give AI security its own playbook and the people to run it

In this Help Net Security interview, Dr. Nicole Nichols, Distinguished Engineer in Machine Learning Security at Palo Alto Networks, discusses why existing security models need to evolve to address the risks of AI agents. She explains how ...

Kanvas: Open-source incident response case management tool

Kanvas is an open-source incident response case management tool with a simple desktop interface, built in Python. It gives investigators a place to work with SOD (Spreadsheet of Doom) or similar files, so they can handle key tasks without jumping ...

Chinese Hacker Linked to Silk Typhoon Charged with Stealing COVID Data

A 33-year-old Chinese national linked to the Silk Typhoon espionage group was arrested in Italy on a U.S. warrant that accuses him of conspiring with others in hacks of U.S. COVID-19 vaccine researchers and exploiting flaws in Microsoft Exchange ...

6 eye-opening books on AI’s rise, risks, and realities

AI is changing how we detect, prevent, and respond to cyber threats. From traditional networks to emerging spaces, it is shaping security operations, identity management, and threat response. This collection of AI books offers diverse ...

Adobe Patches Critical Code Execution Bugs

Adobe patches were also released for medium-severity flaws in After Effects, Audition, Dimension, Experience Manager Screens, FrameMaker, Illustrator, Substance 3D Stager, and Substance 3D Viewer. The post Adobe Patches Critical Code Execution ...

Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday

Patch Tuesday July 2025: Microsoft rolled out fixes for 130 vulnerabilities, including a zero-day in SQL Server. The post Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday appeared first on SecurityWeek.

Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials

The warning came after the department discovered that an impostor attempted to reach out to at least three foreign ministers, a U.S. senator and a governor. The post Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials ...

Legitimate Shellter Pen-Testing Tool Used in Malware Attacks

A stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail. The post Legitimate Shellter Pen-Testing Tool Used in Malware Attacks appeared first on SecurityWeek.

New Bert Ransomware Evolves With Multiple Variants

An emerging ransomware group that calls itself Bert is quickly evolving after hitting the cybercrime scene in April, targeting both Windows and Linux systems used by organizations in the health care, tech, and other industries in the United ...