Application Security News and Articles


Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities

Wiz warns that threat actors are chaining two recent Ivanti vulnerabilities to achieve unauthenticated remote code execution. The post Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities appeared first on SecurityWeek.

Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st. The post Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit appeared first on SecurityWeek.

Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers

Many of the industrial control system (ICS) instances seen in internet scanning are likely or possibly honeypots, not real devices. The post Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers appeared first on SecurityWeek.

Strategic Defense Innovation: Israel and South Korea’s Technological Partnership 

The Israel-South Korea defense partnership has evolved from basic procurement relationships into a sophisticated technological alliance. The post Strategic Defense Innovation: Israel and South Korea’s Technological Partnership  appeared ...

Ransomware Attack Forces Kettering Health to Cancel Procedures

Kettering Health has canceled inpatient and outpatient procedures as it deals with a system-wide outage caused by a ransomware attack. The post Ransomware Attack Forces Kettering Health to Cancel Procedures appeared first on SecurityWeek.

Over 1.5 Million Indian Websites Targeted in Coordinated Attacks

In a significant escalation of cyber warfare, over 1.5 million Indian websites have been targeted in a series of coordinated cyberattacks attributed to seven Advanced Persistent Threat (APT) groups, primarily based in Pakistan. These attacks, ...

Hackers Target Australia’s Biggest Pension Funds, May Have Breached Over 20,000 Accounts

In a significant cybersecurity breach, multiple Australian pension funds were targeted in coordinated attacks, compromising over 20,000 accounts and resulting in the theft of approximately A$500,000 from members’ retirement savings. This ...

Navigating the Digital Seas: Addressing Cybersecurity Challenges in Maritime Shipping

The maritime industry is undergoing a significant digital transformation, integrating advanced technologies to enhance efficiency and connectivity. However, this digital evolution brings forth escalating cybersecurity risks that cannot be ...

Qatar National Bank Breach Explained: How the Attack Happened and What’s Next

In a significant cybersecurity incident, Qatar National Bank (QNB), Trend Micro reports that one of the Middle East’s largest financial institutions, suffered a data breach attributed to the Turkish hacker group Bozkurt Hackers. The attackers ...

Attaxion Becomes the First EASM Platform to Integrate ENISA’s EU Vulnerability Database (EUVD)

Dover, United States, 21st May 2025, CyberNewsWire The post Attaxion Becomes the First EASM Platform to Integrate ENISA’s EU Vulnerability Database (EUVD) appeared first on Security Boulevard.

Veeam Kasten for Kubernetes v8 unifies VM and container data protection

Veeam Software launched Veeam Kasten for Kubernetes v8, designed to bring data resilience to both traditional virtual machines (VMs) and cloud-native environments, delivering security and operational efficiency. Veeam Kasten for Kubernetes v8 ...

Strider Spark protects organizations from state-sponsored threats

Strider announced new capabilities for Spark, the company’s proprietary AI-powered intelligence engine that is transforming how organizations identify and mitigate risks associated with state-sponsored threats. Industry, government, and ...

Critical OpenPGP.js Vulnerability Allows Spoofing

An OpenPGP.js vulnerability tracked as CVE-2025-47934 allows message signature verification to be spoofed.  The post Critical OpenPGP.js Vulnerability Allows Spoofing appeared first on SecurityWeek.

What good threat intelligence looks like in practice

In this Help Net Security interview, Anuj Goel, CEO of Cyware, discusses how threat intelligence is no longer a nice to have, it’s a core cyber defense requirement. But turning intelligence into action remains a challenge for many ...

AutoPatchBench: Meta’s new way to test AI bug fixing tools

AutoPatchBench is a new benchmark that tests how well AI tools can fix code bugs. It focuses on C and C++ vulnerabilities found through fuzzing. The benchmark includes 136 real bugs and their verified fixes, taken from the ARVO dataset. Patch ...

Third-party cyber risks and what you can do

When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director ...

Nation-state APTs ramp up attacks on Ukraine and the EU

Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive ...

How to get AirSwap (sAST) Rewards and Maximize APY

A Beginner's Guide To Staking $sAST from AirSwapContinue reading on Medium »

Fitting Cybersecurity Investments into Your Budget

How Can You Make Cybersecurity Budget Allocations Effective? How do organizations allocate effective funds to cybersecurity? The million-dollar question remains unanswered for many businesses, irrespective of their sizes. It’s not just a matter ...

Free to Choose the Right Security for Your Cloud

Is Choosing Cloud Security a Complex Task? From financial services and healthcare to DevOps and SOC teams, businesses across sectors are grappling with the complexity of managing Non-Human Identities (NHIs). NHIs, essentially machine identities, ...