Application Security News and Articles


Princeton University Data Breach Impacts Alumni, Students, Employees

Hackers accessed a database containing information about alumni, donors, faculty, students, parents, and other individuals. The post Princeton University Data Breach Impacts Alumni, Students, Employees appeared first on SecurityWeek.

Richland County CUSD Finds “More Bang for the Buck” with ManagedMethods

Choosing Cloud Monitor Provides Stronger Safety Alerts, Cybersecurity Protection, and Peace of Mind—All Within Budget At Richland County Community Unit School District #1 in Illinois, Technology Coordinator Ryan Roark has spent 17 years ...

Data Stolen in Eurofiber France Hack

A threat actor exploited a vulnerability, exfiltrated data, and attempted to extort Eurofiber. The post Data Stolen in Eurofiber France Hack appeared first on SecurityWeek.

AI and Voter Engagement

Social media has been a familiar, even mundane, part of life for nearly two decades. It can be easy to forget it was not always that way. In 2008, social media was just emerging into the mainstream. Facebook reached 100 million users that summer. ...

Google patches yet another exploited Chrome zero-day (CVE-2025-13223)

Google has shipped an emergency fix for a Chrome vulnerability (CVE-2025-13223) reported as actively exploited in the wild by its Threat Analysis Group (TAG). About CVE-2025-13223 CVE-2025-13223 is a type confusion vulnerability in V8, the ...

AI Application Vulnerability Remediation: Why AI Vulnerability Fixes Fail Without Runtime Context

TL;DR AI-powered vulnerability remediation often fails because it lacks context about how your applications actually work. Runtime intelligence solves this by providing AI with real-world application behavior data, architecture insights, and ...

What is PKI Automation? Benefits and Role of Certificate Lifecycle Automation 

Introduction PKI is one of the most important facets of current data protection and the foundation of secure communication and data exchange. Just like any other Information Technology (IT) asset, PKI poses a management headache in large ...

What the DoD’s Missteps Teach Us About Cybersecurity Fundamentals for 2026 

As organizations enter 2026, the real threat isn’t novel exploits but blind spots in supply chain security, proximity attack surfaces, and cross-functional accountability. This piece explains why fundamentals must become continuous, operational ...

Governing the Unseen Risks of GenAI: Why Bias Mitigation and Human Oversight Matter Most  

From prompt injection to cascading agent failures, GenAI expands the enterprise attack surface. A governance-first, security-focused approach—rooted in trusted data, guardrails, and ongoing oversight—is now critical for responsible AI ...

330 custom email domains, and what this tells us about how attackers build infrastructure for fake account creation

We recently detected and blocked a large-scale fake account creation campaign. The attacker attempted to register tens of thousands of accounts using bots, automating the entire signup process through a modified version of Chrome. To evade ...

Master how to report a breach for fast and effective cyber incident response

For every organization, no matter the size or industry, the integrity and security of data is more crucial than ever as it faces the possibility of a cyber breach everyday. But what separates a company that bounces back quickly from one that ...

The Battle Over The Search of a Cell Phone – Feds v. Locals

As state and federal authorities seek broad access to a seized phone, a Virginia prosecutor argues for narrowly tailored digital searches — a clash that could redefine Fourth Amendment protections for modern devices. The post The Battle Over ...

Chrome 142 Update Patches Exploited Zero-Day

The flaw was reported by Google's Threat Analysis Group and was likely exploited by a commercial spyware vendor. The post Chrome 142 Update Patches Exploited Zero-Day appeared first on SecurityWeek.

Understanding India’s Digital Personal Data Potection Act 2025: A Complete Overview

India’s Digital Personal Data Protection Act (DPDP), 2023, signaled the country’s commitment to building a modern and globally aligned privacy framework. But as with any legislation, the true operational impact becomes clear only when ...

Dr. Richard Zhao from NSFOCUS Selected into 2025 Top 10 Cybersecurity Professionals by Leading Consulting Company

SANTA CLARA, Calif., Nov 18, 2025 — International Data Corporation (IDC) officially released the “2025 IDC China Top 10 Cybersecurity Professionals” at the 10th IDC China CIO Summit last month. This honor is intended to recognize ...

Boost your cyber defense with unified cybersecurity and GRC strategies

Cybersecurity is no longer just an IT issue; it is a strategic imperative that touches every aspect of modern business. In today’s digital landscape, organizations face increasingly sophisticated threats that can disrupt operations, tarnish ...

What security pros should know about insurance coverage for AI chatbot wiretapping claims

AI-powered chatbots raise profound concerns under federal and state wiretapping and eavesdropping statutes that is being tested by recent litigation, creating greater exposure to the companies and developers that use this technology. Security ...

How attackers use patience to push past AI guardrails

Most CISOs already assume that prompt injection is a known risk. What may come as a surprise is how quickly those risks grow once an attacker is allowed to stay in the conversation. A new study from Cisco AI Defense shows how open weight models ...

Agentic AI puts defenders on a tighter timeline to adapt

Security teams know that attackers rarely wait for defenders to be ready. The latest AI Maturity in Cybersecurity Report from Arkose Labs shows how quickly the threat landscape is shifting and how slowly organizations can respond in comparison. ...

The privacy panic around machine learning is overblown

We often hear warnings about how machine learning (ML) models may expose sensitive information tied to their training data. The concern is understandable. If a model was trained on personal records, it may seem reasonable to assume that releasing ...