Application Security News and Articles
The threat group Scattered Lapsus$ Hunters, which last month said it was shutting down operations, is back with a data leak site listing dozens of high-profile Salesforce customers and claiming to have stolen almost 1 billion data files. The ...
Western Reserve Academy Balances Security and Privacy in Google Workspace and Microsoft 365 Western Reserve Academy is an independent boarding and day school in Hudson, Ohio that prides itself on providing a top-tier learning environment ...
Credential-based attacks happen in seconds. Learn how to block weak or stolen passwords instantly, safeguard accounts in real time, and reduce helpdesk headaches with automated defense. Enzoic delivers lightweight APIs that: Block weak or ...
Most orgs. felt secure, but 75% had a SaaS incident. Learn why, and how to bridge the SaaS security confidence gap.
The post 75% of Orgs. Had a SaaS Security Incident Despite High Confidence in Their Security. Here’s Why. appeared first on ...
The Cl0p extortion gang exploited multiple Oracle E-Business Suite (EBS) vulnerabilities, including one zero-day flaw (CVE-2025-61882), “to steal large amounts of data from several victim[s] in August 2025,” Charles Carmakal, CTO at ...
Salesforce says the extortion attempts are related to past or unsubstantiated incidents, and not to fresh intrusions.
The post Hackers Extorting Salesforce After Stealing Data From Dozens of Customers appeared first on SecurityWeek.
We are nearly one year out from the 2026 midterm elections, and it’s far too early to predict the outcomes. But it’s a safe bet that artificial intelligence technologies will once again be a major storyline.
The widespread fear that AI would ...
Cybersecurity should be guided by technical principles—not politics. Yet recent incidents in the U.S. highlight how cybersecurity decisions and dismissals are increasingly being used to advance partisan agendas. From cloud data migrations to ...
Doctors Imaging Group is informing customers about a cybersecurity incident nearly a year after it occurred.
The post Data Breach at Doctors Imaging Group Impacts 171,000 People appeared first on SecurityWeek.
Wiz has teamed up with Microsoft, Google and AWS and is inviting cloud security researchers to its Zeroday.Cloud competition.
The post $4.5 Million Offered in New Cloud Hacking Competition appeared first on SecurityWeek.
NSFOCUS is thrilled to announce our participation in GovWare 2025—taking place from 21 to 23 October 2025 at the Sands Expo and Convention Centre, Singapore. We invite all attendees to visit us at Booth D09, where we’ll showcase ...
Every unmanaged SSH key is a potential backdoor for unauthorized access. In most enterprises, there are thousands—and sometimes millions—of keys no one is actively tracking. That’s why AppViewX is announcing the general availability of AVX ...
Phishing remains one of the most persistent and dangerous cybersecurity threats, now amplified by AI and deepfake technologies. Despite decades of mitigation efforts, attackers continue to exploit human behavior through deception and social ...
The Illusion of Failure In the fast-moving world of technology and software product development, failure often gets blamed on execution. But what if the real...Read More
The post Sometimes Your Startup Hasn’t Failed, You’re Just Too Early ...
The brewing giant has reverted to manual order processing and shipment as operations at its Japanese subsidiaries are disrupted.
The post Beer Giant Asahi Says Data Stolen in Ransomware Attack appeared first on SecurityWeek.
Fast-track your code security if you’re on GitHubContinue reading on Medium »
Oracle has informed customers that it has patched a critical remote code execution vulnerability tracked as CVE-2025-61882.
The post Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks appeared first on SecurityWeek.
Imagine this: you’ve made it through the résumé screen, your skills look solid on paper, and now it’s interview day. The next hour will decide whether you move forward or go back to the job boards. What separates the candidates who land ...
Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another actor launches a network scan, and together those actions create a bigger risk than either one alone. Most ...
First released in 2005, the open-source Proxmox Mail Gateway has become a widely adopted mail proxy, positioned between the firewall and the internal mail server to stop threats before they reach users. The platform delivers anti-spam and ...