Application Security News and Articles
LevelBlue has announced plans to acquire Trustwave to create the largest pure-play managed security services provider (MSSP).
The post LevelBlue to Acquire Trustwave to Create Major MSSP appeared first on SecurityWeek.
Introduction You’ve probably seen those little one-time codes pop up when you’re logging into your bank, email, or some app […]
The post How OTP Works (Step-by-Step) — What Really Happens Behind Those One-Time Codes appeared first on ...
Data Breaches in June 2025 left behind a string of major incidents that exposed sensitive information and interrupted services across industries. From global airlines to municipal governments and investment platforms,...
The post Top 6 Data ...
Discover how Etsy reduced bot traffic, cut computing costs, and protected user experience by integrating DataDome's AI-powered bot protection with Google Cloud. A smart move for scale and savings.
The post Etsy Stops Unwanted Traffic & ...
The firewall was set up. Scanners were running. Everything looked fine. Until a routine network penetration test found an old staging server no one remembered. It was still connected, still...
The post What is Network Penetration Testing? ...
Google has released a security update for Chrome to address a zero‑day vulnerability (CVE-2025-6554) that its Threat Analysis Group (TAG) discovered and reported last week. “Google is aware that an exploit for CVE-2025-6554 exists in the ...
Esse Health says the personal information of over 263,000 individuals was stolen in an April 2025 cyberattack.
The post 263,000 Impacted by Esse Health Data Breach appeared first on SecurityWeek.
Many Citrix NetScaler systems are exposed to attacks exploiting the vulnerabilities tracked as CVE-2025-5777 and CVE-2025-6543.
The post Thousands of Citrix NetScaler Instances Unpatched Against Exploited Vulnerabilities appeared first on ...
The US government is again warning about potential Iranian cyberattacks as researchers find that hackers’ favorite ICS targets remain exposed.
The post Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning appeared ...
We are pleased to announce the release of our new penetration testing quote form, which is optimised to save you time. There is no need for a lengthy scoping call, or a long-winded series of technical questions. No excel scoping forms to fill ...
The US has made 29 searches of known or suspected laptop farms supporting North Korean individuals posing as US IT workers.
The post US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes appeared first on SecurityWeek.
Human trafficking tied to online scam centers is spreading across the globe, according to a new crime trend update from INTERPOL. Human trafficking victims by country of origin (Source: INTERPOL) By March 2025, people from 66 countries had been ...
CAPTCHAs are the most recognizable anti-bot mechanism on the web. Whether you're logging into a game, signing up for a new service, or checking out online, chances are you've been asked to click on traffic lights, solve a puzzle, or interpret ...
Google has released a Chrome 138 update that patches a high-severity vulnerability with an exploit in the wild.
The post Chrome 138 Update Patches Zero-Day Vulnerability appeared first on SecurityWeek.
For a long time now, traditional pentesting has served as the backbone of proactive cyberdefense strategies across all industries flourishing in the digital realm. Pacing with the time where technology is making history- speed, accuracy, and ...
Tracer AI launched Tracer Protect for ChatGPT, a solution that protects brands from the reputational harm being propagated at machine scale via AI chatbots by bad actors. The rising popularity of generative AI (genAI) engines is driving the ...
In this Help Net Security interview, Tammy Hornsby-Fink, CISO at Federal Reserve System, shares how the Fed approaches cyber risk with a scenario-based, intelligence-driven strategy. She explains how the Fed assesses potential disruptions to ...
In a recent case tracked by Flashpoint, a finance worker at a global firm joined a video call that seemed normal. By the end of it, $25 million was gone. Everyone on the call except the employee was a deepfake. Criminals had used AI-powered ...
DigitalOcean announced expanded capabilities for its identity management offerings with custom roles, the newest Role-Based Access Control (RBAC) offering for its cloud platform. This offering allows customers to create roles that are ...
Nearly three out of four European IT and cybersecurity professionals say staff are already using generative AI at work, up ten points in a year, but just under a third of organizations have put formal policies in place, according to new ISACA ...