Application Security News and Articles


Meet Legit MCP: AI-Powered Security That Works Where Your Team Works

Get details on the newly released Legit MCP Server. The post Meet Legit MCP: AI-Powered Security That Works Where Your Team Works appeared first on Security Boulevard.

Hacker Conversations: Rachel Tobac and the Art of Social Engineering

Rachel Tobac is a cyber social engineer. She is skilled at persuading people to do what she wants, rather than what they know they ought to do. The post Hacker Conversations: Rachel Tobac and the Art of Social Engineering appeared first on ...

Cato Networks raises $359 million to redefine enterprise security

Cato Networks has raised $359 million in a late-stage funding round, bringing its total valuation to $4.8 billion. The company, which provides a secure networking platform built entirely in the cloud, says the money will support its product ...

Russian Throttling of Cloudflare ‘Renders Many Websites Barely Usable’

Russian ISPs, under the direction of the government, are choking the access of Russian citizens to websites protected by Cloudflare, limiting them to 16 KB of data, which the U.S.-based company said makes the sites "barely usable." The post ...

Casie Antalis Named Executive Director of CISA

Casie Antalis is the new executive director of the Cybersecurity and Infrastructure Security Agency after the departure of Bridget Bean. The post Casie Antalis Named Executive Director of CISA appeared first on SecurityWeek.

Airoha Chip Vulnerabilities Expose Headphones to Takeover

Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks. The post Airoha Chip Vulnerabilities Expose Headphones to Takeover appeared first on SecurityWeek.

What is OTP Authentication? A Simple Guide

Introduction Let’s be honest — passwords are kind of a pain. We’re told to create long, complicated ones with numbers, […] The post What is OTP Authentication? A Simple Guide appeared first on Security Boulevard.

Canada Gives Hikvision the Boot on National Security Grounds

Canada has ordered Hikvision to cease all operations in the country and prohibited the purchase and use of Hikvision products within government entities. The post Canada Gives Hikvision the Boot on National Security Grounds appeared first on ...

RIFT: New open-source tool from Microsoft helps analyze Rust malware

Microsoft’s Threat Intelligence Center has released a new tool called RIFT to help malware analysts identify malicious code hidden in Rust binaries. While Rust is becoming more popular for its speed and memory safety, those same qualities make ...

Patrick Ware Named Executive Director of US Cyber Command

The NSA’s Patrick Ware has taken up the role of Cybercrom executive director after the departure of Morgan Adamski. The post Patrick Ware Named Executive Director of US Cyber Command appeared first on SecurityWeek.

Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks

Scattered Spider is targeting airlines and the recent WestJet hack is believed to be the work of the notorious cybercrime group. The post Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks appeared first on SecurityWeek.

Ahold Delhaize Data Breach Impacts 2.2 Million People

The ransomware attack against grocery giant Ahold Delhaize has resulted in the personal information of millions getting stolen. The post Ahold Delhaize Data Breach Impacts 2.2 Million People appeared first on SecurityWeek.

With Cayoso Contract, IRS Finally Tackles Modernization 

It seems the IRS is about to become more efficient. That might not be what taxpayers want to hear. But it’s about time.  The post With Cayoso Contract, IRS Finally Tackles Modernization  appeared first on Security Boulevard.

Artificial Unintelligence 2025: A Global Rally for the Builders, Not the Buzzwords

Set for September 16–17, 2025, Artificial Unintelligence is a fully virtual, free-to-attend event built for the doers. The builders. The ones asking hard questions and solving harder problems with AI. The post Artificial Unintelligence 2025: A ...

Are we securing AI like the rest of the cloud?

In this Help Net Security interview, Chris McGranahan, Director of Security Architecture & Engineering at Backblaze, discusses how AI is shaping both offensive and defensive cybersecurity tactics. He talks about how AI is changing the threat ...

How exposure-enriched SOC data can cut cyberattacks in half by 2028

Gartner projects that by 2028, organizations enriching their Security Operations Center (SOC) data with exposure insights will reduce the frequency and impact of cyberattacks by 50%. This bold forecast underscores a crucial shift: proactive ...

Europe’s AI strategy: Smart caution or missed opportunity?

Europe is banking on AI to help solve its economic problems. Productivity is stalling, and tech adoption is slow. Global competitors, especially the U.S., are pulling ahead. A new report from Accenture says AI could help reverse that trend, but ...

Why AI agents could be the next insider threat

In this Help Net Security video, Arun Shrestha, CEO of BeyondID, explains how AI agents, now embedded in daily operations, are often over-permissioned, under-monitored, and invisible to identity governance systems. With a special focus on the ...

Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?

Is there really a cybersecurity talent shortage, or are we just looking in all the wrong places? This week on the Shared Security Podcast, we tackle the buzz around the so-called cybersecurity skills gap. Host Tom Eston welcomes Katie Soper, ...

Third-party breaches double, creating ripple effects across industries

Supply chain risks remain top-of-mind for the vast majority of CISOs and cybersecurity leaders, according to SecurityScorecard. Their findings reveal that the way most organizations manage supply chain cyber risk isn’t keeping pace with ...