Application Security News and Articles


Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues

In one attack, the hackers leveraged the Datto RMM utility on a domain controller and various other legitimate tools to evade detection. The post Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues appeared first on ...

The Security Maginot Line: Fighting Tomorrow’s Cyber Attacks With Yesterday’s Tech

Alan warns that cybersecurity is stuck in a “Maginot Line” mindset — clinging to outdated tools while attackers weaponize AI, supply chain compromises, and polymorphic malware. He argues for AI-native defenses, real agentic automation, and ...

The Role of Passwordless Authentication in Security

Explore how passwordless authentication improves security by removing password-related risks. Learn about different methods and implementation best practices. The post The Role of Passwordless Authentication in Security appeared first on Security ...

Progressive Profiling Without Friction: Collecting Only What Helps

Learn how to use progressive profiling to collect user data without friction. Discover strategies for timing, consent, autofill, and local form design. The post Progressive Profiling Without Friction: Collecting Only What Helps appeared first on ...

How AI Can Predict and Prevent Security Breaches in Educational Platforms

Discover how AI helps educational platforms predict and prevent security breaches with real-time detection, predictive analytics, and automated response. The post How AI Can Predict and Prevent Security Breaches in Educational Platforms appeared ...

NSFOCUS Earns ISO 28000:2022 Security and Resilience – Security Management Systems Certification

Santa Clara, Calif. Sep 29, 2025 – NSFOCUS, a global provider of intelligent hybrid security solutions, announced today that it has attained ISO 28000:2022 Security and Resilience – Security Management Systems (SMS) certification. ISO 28000 ...

SMS Pools and what the US Secret Service Really Found Around New York

 Last week the United Nations General Assembly kicked off in New York City.  On the first day, a strange US Secret Service press conference revealed that they had seized 300 SIM Servers with 100,000 SIM cards. Various media outlets jumped on ...

How attackers poison AI tools and defenses

Cyberattackers are using generative AI to draft polished spam, create malicious code and write persuasive phishing lures. They are also learning how to turn AI systems themselves into points of compromise. Recent findings highlight this shift. ...

ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution

Singapore, Singapore, 29th September 2025, CyberNewsWire The post ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution appeared first on Security Boulevard.

Firezone: Open-source platform to securely manage remote access

Firezone is an open-source platform that helps organizations of any size manage secure remote access. Unlike most VPNs, it uses a least-privileged model, giving users only the access they need. Firezone was built to scale from the start, so you ...

The CISO’s guide to stronger board communication

In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs can communicate with the board, overcome common pitfalls such as ...

Cybersecurity leaders underreport cyber incidents to executives

Cyberattacks are becoming more frequent and severe, with 71% of surveyed security leaders saying attacks have grown more common in the past year and 61% reporting greater impact when incidents occur, according to a new report from VikingCloud. ...

Milestone Episode 400: Reflecting on 16 Years of Shared Security

Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today’s AI-driven threats, we cover the ...

Top 10 fastest growing ICT jobs

AI is reshaping the workforce in ways that security leaders cannot ignore. The AI Workforce Consortium’s new report, ICT in Motion: The Next Wave of AI Integration, provides a look at how AI is changing job roles and skills across G7 economies. ...

Feel Secure: Advanced Techniques in Secrets Vaulting

What Makes Non-Human Identities Crucial in Cloud Security? How do organizations manage the unique challenges posed by non-human identities? Non-human identities (NHIs) are critical components of robust security strategies. Conceived as virtual ...

Adapting Your Security Strategy for Hybrid Cloud Environments

How Can Organizations Adapt Their Security Strategies for Hybrid Cloud Environments? Organizations face unique challenges while managing their hybrid clouds. But how can they efficiently adapt their security strategies to maintain robust ...

Continuous Improvement in Secrets Management

Why Are Non-Human Identities Crucial for Cybersecurity? How do organizations ensure the security of machine identities? Non-Human Identities (NHIs) provide a compelling answer, offering a structured approach to managing machine identities and ...

British Department Store Harrods Warns Customers That Some Personal Details Taken in Data Breach

Four people were arrested in July on suspicion of their involvement in cyberattacks against Harrods and two other leading British retail chains, Marks & Spencer and the Co-op and Harrods. The post British Department Store Harrods Warns ...

USENIX 2025: PEPR ’25 – Enterprise-Scale Privacy For AI: How Canva Scaled Customer Control Of Data For AI Training

Creator, Author and Presenter: Phillip Ward, Canva Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ...

Cyber Incidents Take Off: Europe’s Airports Join a Growing List

From water systems to the electric grid, critical infrastructure has been under threat for decades. But 2025 cyber attacks against airports are different. Here’s why. The post Cyber Incidents Take Off: Europe’s Airports Join a Growing List ...