Application Security News and Articles
CISA has added CVE-2025-61757 to its Known Exploited Vulnerabilities (KEV) catalog.
The post CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability appeared first on SecurityWeek.
The company has confirmed that it terminated an insider who shared screenshots of his computer with cybercriminals.
The post CrowdStrike Insider Helped Hackers Falsely Claim System Breach appeared first on SecurityWeek.
Discover what’s changed in the OWASP 2025 Top 10 and how GitGuardian helps you mitigate risks like broken access control and software supply chain failures.
The post OWASP Top 10 2025 Updates: Supply Chain, Secrets, And Misconfigurations Take ...
Trend Micro will launch the Trend Vision One AI Security Package in December. The package delivers centralized exposure management with analytics for AI-driven environments. It protects the AI application stack from model development to runtime ...
See how the latest Shai-Hulud attack works.
The post Shai-Hulud: The Second Coming appeared first on Security Boulevard.
Without proper security controls, AI agents could perform malicious actions, such as data exfiltration and malware installation.
The post Microsoft Highlights Security Risks Introduced by New Agentic AI Feature appeared first on SecurityWeek.
Black Friday 2025 is shaping up to be a good moment for anyone thinking about tightening their cybersecurity. A few solid deals are popping up that make it easier to improve protection for systems and data without stretching your budget. If you ...
Security is reaching a breaking point as growing technical complexity becomes a major risk vector. Learn why modern systems amplify threats—and how to stay ahead.
The post Security is at a Tipping Point: Why Complexity is the New Risk Vector ...
Tel Aviv, Israel, 24th November 2025, CyberNewsWire
The post Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention appeared first on Security Boulevard.
The Cl0p ransomware group has listed Mazda and Mazda USA as victims of the Oracle EBS campaign on its leak website.
The post Mazda Says No Data Leakage or Operational Impact From Oracle Hack appeared first on SecurityWeek.
Enterprise GenAI success depends on more than models—security, observability, evaluation, and integration are critical to move from fragile pilots to reliable, scalable AI.
The post Securing GenAI in Enterprises: Lessons from the Field appeared ...
The company has notified its customers of the incident roughly a week after a threat actor claimed the theft of 77GB of data from Iberia’s systems.
The post Spanish Airline Iberia Notifies Customers of Data Breach appeared first on SecurityWeek.
Names, Social Security numbers, ID numbers, and health information were stolen from a compromised email account.
The post 146,000 Impacted by Delta Dental of Virginia Data Breach appeared first on SecurityWeek.
More than 1.6 Tb of data allegedly stolen from Cox was made public by the hackers.
The post Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims appeared first on SecurityWeek.
SambaSPY: The RAT that targets selective victims Human error isn’t just about careless clicks or weak passwords — attackers are now deploying extremely targeted malware to exploit very specific victims. One such threat is SambaSpy, a ...
Work that once took months now takes hours. Work that once demanded large product engineering teams now depends on clarity, context, and precise prompts. This...Read More
The post AI has changed the cost of experimentation appeared first on ISHIR ...
Microsegmentation promised to change everything: limit lateral movement, contain breaches, and give security teams a level of control that traditional perimeter firewalls could never deliver. And it does deliver when...
The post The Role of NSPM ...
In this Help Net Security interview, Colonel Ludovic Monnerat, Commander Space Command, Swiss Armed Forces, discusses how securing space assets is advancing in response to emerging quantum threats. He explains why satellite systems must move ...
cnspec is an open source tool that helps when you are trying to keep a sprawling setup of clouds, containers, APIs and endpoints under control. It checks security and compliance across all of it, which makes it easier to see what needs attention. ...
Most people assume their medical data sits in quiet storage, protected by familiar rules. That belief gives a sense of safety, but new research argues that the world around healthcare data has changed faster than the policies meant to guide it. ...