Application Security News and Articles
UNFInished business: We were warned this would happen. And now here we are.
The post Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again? appeared first on Security Boulevard.
The National Institute of Standards and Technology (NIST) has released a long-awaited update to its incident response guidance: Special Publication 800-61 Revision 3 (SP 800-61r3). This new version, titled “Incident Response Recommendations and ...
Yazılım geliştirme dünyasında, özellikle “Time-to-Market” baskısı altında çalışırken, güvenlik genellikle “daha sonra bakarız” ...
Ryan Goldberg and Kevin Martin have admitted being affiliates of the BlackCat/Alphv ransomware group.
The post Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks appeared first on SecurityWeek.
404 Media has the story:
Unlike many of Flock’s cameras, which are designed to capture license plates as people drive by, Flock’s Condor cameras are pan-tilt-zoom (PTZ) cameras designed to record and track people, not vehicles. Condor ...
In December, the botnet’s operators focused on weaponizing the flaw to compromise vulnerable Next.js servers.
The post RondoDox Botnet Exploiting React2Shell Vulnerability appeared first on SecurityWeek.
Introduction: Why MSSPs Need a New Security Backbone Managed Security Service Providers (MSSPs) are operating in one of the most demanding environments in cybersecurity today. They are expected to defend multiple organizations simultaneously, ...
The Qilin ransomware group hacked the healthcare organization and stole data from its systems in May 2025.
The post Covenant Health Data Breach Impacts 478,000 Individuals appeared first on SecurityWeek.
GreyNoise has observed thousands of requests targeting a dozen vulnerabilities in Adobe ColdFusion during the Christmas 2025 holiday.
The post Adobe ColdFusion Servers Targeted in Coordinated Campaign appeared first on SecurityWeek.
December 2025 was a brutal reality check for security teams. While most were winding down for the holidays, threat actors weaponized a tectonic shift in the landscape, headlined by the...
The post Top CVEs of December 2025 appeared first on ...
Explore key cybersecurity predictions for 2026, from AI-powered phishing to DMARC enforcement, BIMI adoption, SPF and DKIM limits, Zero Trust, and automation.
The post Email-first cybersecurity predictions for 2026 appeared first on Security ...
In this Help Net Security video, Jaime Blasco, CTO at Nudge Security, discusses why shadow AI matters to security teams. He describes how AI adoption happens in two ways, through company led programs and through employees choosing tools on their ...
AI-generated code is already running inside devices that control power grids, medical equipment, vehicles, and industrial plants. AI moves from experiment to production AI tools have become standard in embedded development workflows. More than ...
Managing security across 1000+ endpoints is no longer a scale problem alone; it is a complexity problem. Modern enterprise environments are dynamic, hybrid, and API-driven. Cloud workloads, remote employees, containerized services, and ...
Healthcare is facing a rise in cyber threats driven by vulnerable medical devices, growing data exposure, and AI adoption. This article outlines the pressures, gaps, and decisions shaping healthcare’s security future. Data brokers are exposing ...
Secure your AI infrastructure with post-quantum identity and access management. Protect MCP deployments from quantum-enabled threats using PQC and zero-trust.
The post Post-Quantum Identity and Access Management for AI Agents appeared first on ...
Explore various types of authentication methods including MFA, SSO, and Biometrics. Learn how to secure enterprise apps and prevent data breach.
The post Types of Authentication: Complete Guide to Authentication Methods & Mechanisms appeared ...
Explore the readiness of passkeys for enterprise use. Learn about FIDO2, WebAuthn, phishing resistance, and the challenges of legacy IT integration.
The post Are Passkeys Ready for Use in Enterprises? appeared first on Security Boulevard.
“Your database connection is a bridge — don’t let attackers rebuild it mid-crossing.”Continue reading on Medium »
When security vulnerabilities appear in popular frameworks, they can affect thousands of websites overnight. That’s exactly what’s happening with a newly discovered vulnerability in Next.js – one of the most...
The post CVE-2025-29927 – ...