Application Security News and Articles


Foxit Smart Redact Server automates the redaction of sensitive data

Foxit launched Smart Redact Server, a new AI-driven platform built to automate the redaction of sensitive data at scale across enterprise environments. Designed for organizations that manage large volumes of regulated content, the solution ...

McAfee’s Scam Detector identifies scams across text, email, and video

McAfee is introducing McAfee’s Scam Detector, a new feature that automatically identifies scams across text, email, and video. Available now in all core McAfee plans at no extra cost, it arrives at a critical moment: nearly 1 in 3 Americans say ...

Mail relays – Part 2 | Problems with forwarded mail?

Forwarded mail can be more trouble than it’s worth - especially when it’s done without checks, validation, or spam filtering. Typos, spamtraps, and forged senders can quickly snowball into blocklistings and delivery failures. In this second ...

Obsidian’s browser extension manages shadow SaaS and AI tools

Obsidian Security has launched a new browser extension to help businesses safely use SaaS and AI apps online. The extension automatically finds and manages shadow SaaS and AI tools, blocks advanced spear-phishing attacks targeting access tokens, ...

Mail relays – Part 1 | Authenticate your outgoing mail!

Email authentication used to be something only big players worried about. Not anymore. While small senders may not feel the heat yet, it’s only a matter of time before it reaches them. In this blog, we explore how authentication can be ...

The OWASP LLM Top 10 and Sonatype: Supply chain security

The rise of AI has unlocked unprecedented opportunities across industries, from automating tedious tasks to accelerating software development and transforming how applications are built and maintained. However, AI has also exposed critical ...

Kosovar Administrator of Cybercrime Marketplace Extradited to US

Kosovo citizen Liridon Masurica has appeared in a US court, facing charges for his role in operating the cybercrime marketplace BlackDB.cc. The post Kosovar Administrator of Cybercrime Marketplace Extradited to US appeared first on SecurityWeek.

Strengthening Cloud Security: API Posture Governance, Threat Detection, and Attack Chain Visibility with Salt Security and Wiz

Introduction In the current cloud-centric environment, strong API security is essential. Google's acquisition of Wiz underscores the urgent necessity for all-encompassing cloud security solutions. Organizations should focus on both governing API ...

How One Leaked Credential Can Expose a Threat Actor

The Power of One: From Leaked Credential to Campaign Attribution Attribution has always been the elusive prize in threat intelligence. The question every CISO wants answered after an attack: “Who did this?” Historically, attribution required ...

EU Cybersecurity Agency ENISA Launches European Vulnerability Database

Experts say the European Vulnerability Database, or EUVD, should be a good resource, but only if ENISA manages to maintain it properly. The post EU Cybersecurity Agency ENISA Launches European Vulnerability Database appeared first on SecurityWeek.

Vulnerabilities Patched by Juniper, VMware and Zoom 

Juniper Networks, VMware, and Zoom have announced patches for dozens of vulnerabilities across their products. The post Vulnerabilities Patched by Juniper, VMware and Zoom  appeared first on SecurityWeek.

INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense

Cary, North Carolina, 14th May 2025, CyberNewsWire The post INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense appeared first on Security Boulevard.

DMARC’s Future: Ignoring Email Authentication is No Longer an Option

If you caught our recent post, What Microsoft’s New DMARC Policy Means for High-Volume Senders, you’re already familiar with the major changes Microsoft has made to tighten DMARC enforcement as of May 5, 2025. As a reminder, any mass sender ...

Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances

Fortinet has patched a dozen vulnerabilities, including a critical flaw exploited in the wild against FortiVoice instances. The post Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances appeared first on SecurityWeek.

Cyberattacks on Long Island Schools Highlight Growing Threat

In a concerning development, over 20 school districts across Long Island have fallen victim to cyberattacks, compromising the personal data of more than 10,000 students. According to state education records, 28 incidents were reported in 2024 ...

Retail in the Crosshairs: The M&S Data Breach and the Rising Cost of Customer Trust

Retail giant Marks & Spencer (M&S) has confirmed that customer information was compromised in a recent cyberattack involving one of its third-party service providers. According to Reuters, the breach did not impact M&S’s internal ...

“Dance of the Hillary” and the Expanding Use of Malware in Regional Cyber Conflict

A recent advisory from the Punjab Police’s cybercrime wing warns of a new wave of malware attacks potentially originating from Pakistan, with a tool known as “Dance of the Hillary” at the center of the campaign. Targeting users through ...

Operation Sindoor Fallout: Lessons from the Mass Website Defacement Campaign

A recent cyber onslaught has drawn global attention: more than 1.5 million Indian websites were defaced or disrupted in retaliation for the alleged “Operation Sindoor,” a reported counterterrorism operation. According to The Times of India, ...

Nobara Linux 42 brings performance boost and better hardware support

The Nobara Project has released a new version of its Linux distribution, bringing updated packages, performance improvements, and a few visual tweaks aimed at making life easier for users who want a system that works well out of the box. Nobara ...

Advancing Security Training With Human Risk Management

Cybersecurity education is evolving from simple knowledge transfer to measurable risk reduction as the human risk factor is recognized. The post Advancing Security Training With Human Risk Management appeared first on Security Boulevard.