Application Security News and Articles


How Financial Institutions Can Meet DORA Compliance with Crypto-Agility

Today’s financial systems are highly digital and deeply interconnected. That’s great until something breaks. Whether it’s ransomware paralyzing critical services or cryptographic vulnerabilities quietly eroding trust, disruptions are no ...

Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War

Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates. The post Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War appeared first on ...

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report

Alphabet Inc.’s Google’s proposed $32 billion acquisition of cloud security startup Wiz is drawing early-stage antitrust scrutiny from the Department of Justice. The all-cash deal, which would integrate Wiz into Google Cloud, has ...

Unpacking the Verizon 2025 Data Breach Investigations Report

Verizon released its annual Data Breach Investigations Report a few weeks ago, and as always, it has been a pleasure to read it. Not just for the facts and statistics but also the subtle humor that makes reading a 100-plus-page document ...

LinuxFest Northwest: Running WASM Workloads On k8s: The Future Of Cloud-Native Apps

Author/Presenter: Christopher Valerio (Senior Software Engineer, Veritas Automata) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for ...

The Complete Guide to Programmatic SEO

Programmatic SEO has emerged as the most powerful strategy for scaling organic traffic. Companies like Zapier (5.8M monthly visits) and Wise (60M+ visits) use automated page creation to dominate search results. This guide reveals how to implement ...

Data Resilience in a Post-Quantum World

As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting ...

New Campaigns Distribute Malware via Open Source Hacking Tools

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools. The post New Campaigns Distribute Malware via Open Source Hacking Tools appeared first on SecurityWeek.

Chain IQ, UBS Data Stolen in Ransomware Attack

A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies. The post Chain IQ, UBS Data Stolen in Ransomware Attack appeared first on SecurityWeek.

Encryption Backdoors: The Security Practitioners’ View

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high. The post Encryption Backdoors: The Security Practitioners’ View appeared ...

Cloud Privilege Is a Mess. Legacy PAM Can’t Fix It.

For years, organizations have tried to retrofit Privileged Access Management (PAM) tools into the public cloud. Jump boxes. Vaults. Session recording. Manual provisioning. None of it scales and it doesn’t scratch the surface of the cloud ...

Krispy Kreme Confirms Data Breach After Ransomware Attack

Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024. The post Krispy Kreme Confirms Data Breach After Ransomware Attack appeared first on SecurityWeek.

Choosing a Clear Direction in the Face of Growing Cybersecurity Demands

In a rapidly changing AI environment, CISOs are worried about investing in the wrong solution or simply not investing because they can’t decide what the best option is. The post Choosing a Clear Direction in the Face of Growing Cybersecurity ...

Spamhaus’ take on Cold Emailing…AKA spam

Cold emailing, as it’s practiced today, is spam — for inboxes, businesses, and the internet. It’s a thriving industry, but one raising concerns in the email community. In this article we define cold emailing from our perspective, share ...

How the New HIPAA Regulations 2025 Will Impact Healthcare Compliance

The U.S. Department of Health and Human Services (HHS) is rolling out new HIPAA regulations in 2025. It’s designed to strengthen patient privacy and security in the face of these changes. These HIPAA updates are a response to the rise of ...

The benefits of automating certificate management for the 47-day lifecycle

TLS certificate lifecycles are shrinking again and fast. By 2029, the CA/B Forum will require certificates to expire every 47 days. Manual management isn’t sustainable at that pace. Enterprises must adopt automated certificate lifecycle ...

Five Uncomfortable Truths About LLMs in Production

Many tech professionals see integrating large language models (LLMs) as a simple process -just connect an API and let it run. At Wallarm, our experience has proved otherwise. Through rigorous testing and iteration, our engineering team uncovered ...

High-Severity Vulnerabilities Patched by Cisco, Atlassian

Cisco has resolved a high-severity vulnerability in Meraki MX and Meraki Z devices. Atlassian pushed patches for multiple third-party dependencies. The post High-Severity Vulnerabilities Patched by Cisco, Atlassian appeared first on SecurityWeek.

Swedish Truck Giant Scania Investigating Hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited. The post Swedish Truck Giant Scania Investigating Hack appeared first on SecurityWeek.

Why AI code assistants need a security reality check

In this Help Net Security interview, Silviu Asandei, Security Specialist and Security Governance at Sonar, discusses how AI code assistants are transforming development workflows and impacting security. He explains how these tools can boost ...