Application Security News and Articles


Social data puts user passwords at risk in unexpected ways

Many CISOs already assume that social media creates new openings for password guessing, but new research helps show what that risk looks like in practice. The findings reveal how much information can be reconstructed from public profiles and how ...

New observational auditing framework takes aim at machine learning privacy leaks

Machine learning (ML) privacy concerns continue to surface, as audits show that models can reveal parts of the labels (the user’s choice, expressed preference, or the result of an action) used during training. A new research paper explores a ...

Why password management defines PCI DSS success

Most CISOs spend their days dealing with noisy dashboards and vendor pitches that all promise a shortcut to compliance. It can be overwhelming to sort out what matters. When you dig into real incidents involving payment data, a surprising ...

Fragmented tooling slows vulnerability management

Security leaders know vulnerability backlogs are rising, but new data shows how quickly the gap between exposures and available resources is widening, according to a new report by Hackuity. Fragmented detection and slow remediation Organizations ...

Infosec products of the month: November 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1touch.io, Action1, Barracuda Networks, Bedrock Data, Bitdefender, Cyware, Firewalla, Forescout, Immersive, Kentik, Komodor, Minimus, Nokod Security, ...

Asahi Data Breach Impacts 2 Million Individuals

Hackers stole the personal information of customers and employees before deploying ransomware and crippling Asahi’s operations in Japan. The post Asahi Data Breach Impacts 2 Million Individuals appeared first on SecurityWeek.

One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM

Alisa Viejo, CA, USA, 27th November 2025, CyberNewsWire The post One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM appeared first on Security Boulevard.

Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Tel Aviv, Israel, 27th November 2025, CyberNewsWire The post Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0 appeared first on Security Boulevard.

Detego DFIR Platform centralizes evidence, workflows, and real-time case insights

Detego Global has announced the launch of Detego Case Manager for DFIR, a purpose-built platform designed to meet the evolving demands of digital forensics and incident response (DFIR) teams. Developed in close collaboration with investigative ...

OpenAI User Data Exposed in Mixpanel Hack

Multiple Mixpanel customers were impacted by a recent cyberattack targeting the product analytics company.  The post OpenAI User Data Exposed in Mixpanel Hack appeared first on SecurityWeek.

Clover raises $36 million to scale product security through AI-native design

Clover announced $36 million in funding to secure the AI-native product wave. The company’s funding round was led by Notable Capital and Team8 with participation from SVCI. Clover Security is also backed by industry heavy weights, including ...

Hottest cybersecurity open-source tools of the month: November 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Heisenberg: Open-source software supply chain health check tool Heisenberg is an ...

Your critical infrastructure is running out of time

Cyber attackers often succeed not because they are inventive, but because the systems they target are old. A new report by Cisco shows how unsupported technology inside national infrastructure creates openings that attackers can exploit ...

The identity mess your customers feel before you do

Customer identity has become one of the most brittle parts of the enterprise security stack. Teams know authentication matters, but organizations keep using methods that frustrate users and increase risk. New research from Descope shows how ...

Criminal networks industrialize payment fraud operations

Fraud operations are expanding faster than payment defenses can adjust. Criminal groups function like coordinated businesses that develop tools, automate tasks, and scale attacks. New data from a Visa report shows how these shifts are reshaping ...

FBI: Account Takeover Scammers Stole $262 Million this Year

The FBI says that account takeover scams this year have resulted in 5,100-plus complaints in the U.S. and $262 million in money stolen, and Bitdefender says the combination of the growing number of ATO incidents and risky consumer behavior is ...

NDSS 2025 – VoiceRadar: Voice Deepfake Detection Using Micro-Frequency And Compositional Analysis

Session 4B: Audio Security Authors, Creators & Presenters: PAPER VoiceRadar: Voice Deepfake Detection using Micro-Frequency And Compositional Analysis Recent advancements in synthetic speech generation, including text-to-speech (TTS) and ...

Randall Munroe’s XKCD ‘Heart Mountain’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Heart Mountain’ appeared first on Security Boulevard.

The Trust Crisis: Why Digital Services Are Losing Consumer Confidence

According to the Thales Consumer Digital Trust Index 2025, global confidence in digital services is slipping fast. After surveying more than 14,000 consumers across 15 countries, the findings are clear: no sector earned high trust ratings from ...

How to Protect from Online Fraud This Holiday Season

Peak e-commerce season hits retailers every year just as the Halloween decorations start to come down. Unsurprisingly, cyber criminals see this time as an opportunity to strike, and criminal activity online spikes alongside sales. Shockingly, ...