Application Security News and Articles


Scattered Lapsus$ Hunters Extorts Victims, Demands Salesforce Negotiate

The threat group Scattered Lapsus$ Hunters, which last month said it was shutting down operations, is back with a data leak site listing dozens of high-profile Salesforce customers and claiming to have stolen almost 1 billion data files. The ...

Cloud Monitor Provides Affordable Visibility and Control at Western Reserve Academy

Western Reserve Academy Balances Security and Privacy in Google Workspace and Microsoft 365 Western Reserve Academy is an independent boarding and day school in Hudson, Ohio that prides itself on providing a top-tier learning environment ...

eBook: Defending Identity Security the Moment It’s Threatened

Credential-based attacks happen in seconds. Learn how to block weak or stolen passwords instantly, safeguard accounts in real time, and reduce helpdesk headaches with automated defense. Enzoic delivers lightweight APIs that: Block weak or ...

75% of Orgs. Had a SaaS Security Incident Despite High Confidence in Their Security. Here’s Why.

Most orgs. felt secure, but 75% had a SaaS incident. Learn why, and how to bridge the SaaS security confidence gap. The post 75% of Orgs. Had a SaaS Security Incident Despite High Confidence in Their Security. Here’s Why. appeared first on ...

Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)

The Cl0p extortion gang exploited multiple Oracle E-Business Suite (EBS) vulnerabilities, including one zero-day flaw (CVE-2025-61882), “to steal large amounts of data from several victim[s] in August 2025,” Charles Carmakal, CTO at ...

Hackers Extorting Salesforce After Stealing Data From Dozens of Customers

Salesforce says the extortion attempts are related to past or unsubstantiated incidents, and not to fresh intrusions. The post Hackers Extorting Salesforce After Stealing Data From Dozens of Customers appeared first on SecurityWeek.

AI in the 2026 Midterm Elections

We are nearly one year out from the 2026 midterm elections, and it’s far too early to predict the outcomes. But it’s a safe bet that artificial intelligence technologies will once again be a major storyline. The widespread fear that AI would ...

The Political Weaponization of Cybersecurity

Cybersecurity should be guided by technical principles—not politics. Yet recent incidents in the U.S. highlight how cybersecurity decisions and dismissals are increasingly being used to advance partisan agendas. From cloud data migrations to ...

Data Breach at Doctors Imaging Group Impacts 171,000 People

Doctors Imaging Group is informing customers about a cybersecurity incident nearly a year after it occurred.  The post Data Breach at Doctors Imaging Group Impacts 171,000 People appeared first on SecurityWeek.

$4.5 Million Offered in New Cloud Hacking Competition

Wiz has teamed up with Microsoft, Google and AWS and is inviting cloud security researchers to its Zeroday.Cloud competition. The post $4.5 Million Offered in New Cloud Hacking Competition appeared first on SecurityWeek.

GovWare 2025: Join NSFOCUS at Booth D09!

NSFOCUS is thrilled to announce our participation in GovWare 2025—taking place from 21 to 23 October 2025 at the Sands Expo and Convention Centre, Singapore. We invite all attendees to visit us at Booth D09, where we’ll showcase ...

AVX ONE SSH: Comprehensive SSH Key Lifecycle Management for Enterprise Security

Every unmanaged SSH key is a potential backdoor for unauthorized access. In most enterprises, there are thousands—and sometimes millions—of keys no one is actively tracking. That’s why AppViewX is announcing the general availability of AVX ...

From Deception to Defense: Understanding and Combating Phishing

Phishing remains one of the most persistent and dangerous cybersecurity threats, now amplified by AI and deepfake technologies. Despite decades of mitigation efforts, attackers continue to exploit human behavior through deception and social ...

Sometimes Your Startup Hasn’t Failed, You’re Just Too Early

The Illusion of Failure In the fast-moving world of technology and software product development, failure often gets blamed on execution. But what if the real...Read More The post Sometimes Your Startup Hasn’t Failed, You’re Just Too Early ...

Beer Giant Asahi Says Data Stolen in Ransomware Attack

The brewing giant has reverted to manual order processing and shipment as operations at its Japanese subsidiaries are disrupted. The post Beer Giant Asahi Says Data Stolen in Ransomware Attack appeared first on SecurityWeek.

GitHub Advanced Security (GHAS)— Part 1

Fast-track your code security if you’re on GitHubContinue reading on Medium »

Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks

Oracle has informed customers that it has patched a critical remote code execution vulnerability tracked as CVE-2025-61882. The post Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks appeared first on SecurityWeek.

How to succeed at cybersecurity job interviews

Imagine this: you’ve made it through the résumé screen, your skills look solid on paper, and now it’s interview day. The next hour will decide whether you move forward or go back to the job boards. What separates the candidates who land ...

Meet ARGUS, the robot built to catch hackers and physical intruders

Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another actor launches a network scan, and together those actions create a bigger risk than either one alone. Most ...

Proxmox Mail Gateway: Open-source email security solution reaches version 9.0

First released in 2005, the open-source Proxmox Mail Gateway has become a widely adopted mail proxy, positioned between the firewall and the internal mail server to stop threats before they reach users. The platform delivers anti-spam and ...