Application Security News and Articles


WhatsApp’s New Private Processing: Revolutionizing AI Features While Ensuring Privacy

WhatsApp is setting new standards for privacy with its recent feature, Private Processing. This innovative approach allows WhatsApp to enhance its AI capabilities, such as smart replies, message suggestions, and content filtering, while ensuring ...

Account Takeovers: A Growing Threat to Your Business and Customers

Account Takeovers (ATOs) are becoming one of the most dangerous and costly threats to businesses and their customers. These attacks are not only financially devastating, but they also have the potential to severely damage an organization’s ...

SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers

SentinelOne has shared some information on the types of threat actors that have targeted the security firm recently. The post SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers appeared first on SecurityWeek.

The Rising Threat of Zero-Day Exploits Targeting Enterprise Security Products

Zero-day exploits continue to pose one of the most significant and evolving cybersecurity threats to businesses worldwide. According to a recent report, 75 zero-day vulnerabilities were exploited this year, with 44% of these attacks targeting ...

Why SMEs can no longer afford to ignore cyber risk

In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small and medium-sized businesses (SMEs) must reassess their risk exposure and prioritize resilience to safeguard ...

Preparing for the next wave of machine identity growth

Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy Wu, CMO at SailPoint, explains why machine identity security matters, where most companies go wrong, how ...

Hottest cybersecurity open-source tools of the month: April 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. GoSearch: Open-source OSINT tool for uncovering digital footprints GoSearch is an ...

Top solutions to watch after RSAC 2025

RSAC 2025 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs in identity protection, this year’s conference delivered a glimpse into the future. ...

Online fraud peaks as breaches rise

Data breaches played a key role in significant financial losses faced by consumers due to fraud. In this Help Net Security video, Steve Yin, Global Head of Fraud at TransUnion, and Brad Daughdrill, VP, Data Science, Head of Global Fraud ...

Low-tech phishing attacks are gaining ground

Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based on an analysis of global real-world data and highlights the most significant email ...

Unlocking GenAI: Real-World Use Cases & Innovations Across Industries

How Uber's GenAI-powered invoice automation boosts efficiency, cutting manual effort by 70% and ensuring 90% data accuracy. Learn more! The post Unlocking GenAI: Real-World Use Cases & Innovations Across Industries appeared first on Security ...

AI and GPUs Make Your Passwords Easier to Crack: A Study

How AI and GPUs are revolutionizing password cracking. Learn how to safeguard your passwords with effective strategies. Read more! The post AI and GPUs Make Your Passwords Easier to Crack: A Study appeared first on Security Boulevard.

F5 Extends Security Reach to Large Language Models

F5 has extended and added support for web application scanning that is capable of identifying vulnerabilities in large language models (LLMs) to its application delivery and security platform (ADSP). The post F5 Extends Security Reach to Large ...

Homeland Secretary Noem Vows to Put CISA ‘Back to Focusing on its Core Mission’

Homeland Security Secretary Kristi Noem vowed to refocus CISA, especially in defense of critical systems threats from China. The post Homeland Secretary Noem Vows to Put CISA ‘Back to Focusing on its Core Mission’ appeared first on ...

Salt Security Embraces MCP to Improve Cybersecurity in the Age of AI

Salt Security this week at the 2025 RSA Conference made available an early preview of an ability to secure Model Context Protocol (MCP) servers that are emerging as a de facto standard for integrating artificial intelligence (AI) models and ...

Justifying Investments in Machine Identity Management

Why is Investment Justification in Machine Identity Management Essential? Companies across industries are heavily investing in cybersecurity. One such area of investment is machine identity management, a powerful cybersecurity strategy. But why ...

How Can NHIs Safeguard Your Cloud Operations?

What Makes Non-Human Identities (NHIs) Essential for Cloud Security? Organizations are continually seeking ways to enhance their protective measures against potential breaches. One vital aspect that often gets overlooked in this battle is the ...

Cybersecurity That Fits Your Budget—How?

Is Affordable Cybersecurity a Reality? Could an affordable, budget-friendly solution be the key to ensuring your organization’s cybersecurity? The answer is a resounding yes! However, understanding how to implement these solutions requires an ...

Are You Confident in Your IAM Solutions?

Is Your Trust in IAM Solutions Justified? Have you ever wondered if your existing cybersecurity measures adequately protect your non-human identities (NHIs)? The importance of robust, dynamic identity and access management (IAM) solutions comes ...

Israel’s 77 Years Of Independence

Permalink The post Israel’s 77 Years Of Independence appeared first on Security Boulevard.