Application Security News and Articles
The total disclosed value for all the cybersecurity M&A deals announced in 2025 exceeded $84 billion.
The post 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025 appeared first on SecurityWeek.
The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor.
The post Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit appeared first on SecurityWeek.
Roughly 30,000 Korean Air employees had their data stolen by hackers in a breach at former subsidiary KC&D.
The post Korean Air Data Compromised in Oracle EBS Hack appeared first on SecurityWeek.
Air-gapped systems are meant to stay quiet. Remove network ports, lock down inputs, and the device should have nothing to hear. A new study shows that this breaks down when software control is lost. Embedded devices with no radios and no sensors ...
RoboForm is a password manager that helps users store and manage login credentials, identities, and other sensitive information in one place. The app is available on macOS, Windows, Android, and iOS. It uses AES-256-bit encryption and a master ...
Cybersecurity has moved from a technical problem to a boardroom concern tied to survival. A global Rimini Street study of senior executives shows security risk shaping decisions on technology, talent, and long term planning across industries that ...
Enterprises are grappling with an identity attack surface that keeps expanding and slipping out of reach, according to Veza. Permissions growth outstrips oversight Permissions now grow faster than teams can track them. Enterprises often operate ...
AI is reshaping how organizations operate, defend systems, and interpret risk. Reports reveal rising AI-driven attacks, hidden usage across enterprises, and widening gaps between innovation and security readiness. As adoption accelerates, ...
It took Sax well over a year to complete its investigation after detecting hackers on its network.
The post Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000 appeared first on SecurityWeek.
Tracked as CVE-2020-12812, the exploited FortiOS flaw allows threat actors to bypass two-factor authentication.
The post Fortinet Warns of New Attacks Exploiting Old Vulnerability appeared first on SecurityWeek.
The ecommerce giant will provide purchase vouchers to the 33.7 million individuals impacted by the incident.
The post Coupang to Issue $1.17 Billion in Vouchers Over Data Breach appeared first on SecurityWeek.
Hackers stole names, addresses, Social Security numbers, ID numbers, and medical and health insurance information from Aflac’s systems.
The post 22 Million Affected by Aflac Data Breach appeared first on SecurityWeek.
The ‘download’ button on the official EmEditor website served a malicious installer.
The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek.
“Security is not a product, but a process.” — Bruce SchneierContinue reading on Medium »
CISOs carry expanding responsibility as cybersecurity budgets rise, AI adoption spreads, and board expectations grow. Risk management now depends on faster decisions, stronger coordination, and better communication across leadership teams. This ...
Learn about auth tokens, token-based authentication, JWTs, and implementation strategies. Enhance security and user experience in enterprise SSO and CIAM.
The post What are Auth Tokens? Complete Guide to Token-Based Authentication & ...
Are Businesses Ready to Trust AI with Their Most Sensitive Data? The discussion around trusting AI with sensitive data is both inevitable and essential. With AI systems increasingly integrated into business processes, the question now revolves ...
Are You Effectively Managing Non-Human Identities in AI-Driven Cloud Security? Where technology underpins every business function, the security of machine identities—known as Non-Human Identities (NHIs)—has become paramount. But how well are ...
How Do Machine Identities Shape Cloud Security? What role do machine identities play, particularly within cloud environments? When organizations continue to transform digitally, the focus on securing machine identities, known as Non-Human ...
How Can Organizations Effectively Manage Non-Human Identities? Have you ever considered how the digital backbone of your organization is secured when it comes to managing the vast array of Non-Human Identities (NHIs)? With technology continues to ...