Application Security News and Articles


8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025

The total disclosed value for all the cybersecurity M&A deals announced in 2025 exceeded $84 billion. The post 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025 appeared first on SecurityWeek.

Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor. The post Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit appeared first on SecurityWeek.

Korean Air Data Compromised in Oracle EBS Hack

Roughly 30,000 Korean Air employees had their data stolen by hackers in a breach at former subsidiary KC&D. The post Korean Air Data Compromised in Oracle EBS Hack appeared first on SecurityWeek.

Radio signals could give attackers a foothold inside air-gapped devices

Air-gapped systems are meant to stay quiet. Remove network ports, lock down inputs, and the device should have nothing to hear. A new study shows that this breaks down when software control is lost. Embedded devices with no radios and no sensors ...

Product showcase: RoboForm password manager for iOS

RoboForm is a password manager that helps users store and manage login credentials, identities, and other sensitive information in one place. The app is available on macOS, Windows, Android, and iOS. It uses AES-256-bit encryption and a master ...

Executives say cybersecurity has outgrown the IT department

Cybersecurity has moved from a technical problem to a boardroom concern tied to survival. A global Rimini Street study of senior executives shows security risk shaping decisions on technology, talent, and long term planning across industries that ...

Non-human identities push identity security into uncharted territory

Enterprises are grappling with an identity attack surface that keeps expanding and slipping out of reach, according to Veza. Permissions growth outstrips oversight Permissions now grow faster than teams can track them. Enterprises often operate ...

Security teams debate how much to trust AI

AI is reshaping how organizations operate, defend systems, and interpret risk. Reports reveal rising AI-driven attacks, hidden usage across enterprises, and widening gaps between innovation and security readiness. As adoption accelerates, ...

Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000

It took Sax well over a year to complete its investigation after detecting hackers on its network. The post Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000 appeared first on SecurityWeek.

Fortinet Warns of New Attacks Exploiting Old Vulnerability

Tracked as CVE-2020-12812, the exploited FortiOS flaw allows threat actors to bypass two-factor authentication. The post Fortinet Warns of New Attacks Exploiting Old Vulnerability appeared first on SecurityWeek.

Coupang to Issue $1.17 Billion in Vouchers Over Data Breach

The ecommerce giant will provide purchase vouchers to the 33.7 million individuals impacted by the incident. The post Coupang to Issue $1.17 Billion in Vouchers Over Data Breach appeared first on SecurityWeek.

22 Million Affected by Aflac Data Breach

Hackers stole names, addresses, Social Security numbers, ID numbers, and medical and health insurance information from Aflac’s systems. The post 22 Million Affected by Aflac Data Breach appeared first on SecurityWeek.

Infostealer Malware Delivered in EmEditor Supply Chain Attack

The ‘download’ button on the official EmEditor website served a malicious installer. The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek.

.NET File Operation Security Vulnerabilities — SSC Fortify Security Findings Analysis — Part 2

“Security is not a product, but a process.” — Bruce SchneierContinue reading on Medium »

CISOs are managing risk in survival mode

CISOs carry expanding responsibility as cybersecurity budgets rise, AI adoption spreads, and board expectations grow. Risk management now depends on faster decisions, stronger coordination, and better communication across leadership teams. This ...

What are Auth Tokens? Complete Guide to Token-Based Authentication & Implementation

Learn about auth tokens, token-based authentication, JWTs, and implementation strategies. Enhance security and user experience in enterprise SSO and CIAM. The post What are Auth Tokens? Complete Guide to Token-Based Authentication & ...

How can businesses trust AI to handle sensitive data

Are Businesses Ready to Trust AI with Their Most Sensitive Data? The discussion around trusting AI with sensitive data is both inevitable and essential. With AI systems increasingly integrated into business processes, the question now revolves ...

Can AI-driven cloud security assure full data protection

Are You Effectively Managing Non-Human Identities in AI-Driven Cloud Security? Where technology underpins every business function, the security of machine identities—known as Non-Human Identities (NHIs)—has become paramount. But how well are ...

What support is available for implementing Agentic AI systems

How Do Machine Identities Shape Cloud Security? What role do machine identities play, particularly within cloud environments? When organizations continue to transform digitally, the focus on securing machine identities, known as Non-Human ...

Is the security for Non-Human Identities getting better

How Can Organizations Effectively Manage Non-Human Identities? Have you ever considered how the digital backbone of your organization is secured when it comes to managing the vast array of Non-Human Identities (NHIs)? With technology continues to ...