Application Security News and Articles


Unlock the Power of Financial Quantification of Cyber Risk

In today's complex threat landscape, gut feelings and disparate risk scores are no longer sufficient for effective cyber risk management. Organizations need concrete, data-driven insights to make informed decisions, prioritize security ...

Ahold Delhaize Confirms Data Stolen in Ransomware Attack

Ahold Delhaize has confirmed that data was stolen from its systems in November 2024 after a ransomware group claimed the attack. The post Ahold Delhaize Confirms Data Stolen in Ransomware Attack appeared first on SecurityWeek.

Reimagining SAT For MSPs: From Static Lessons to Smart Defense

For most MSPs, Security Awareness Training (SAT) is an unavoidable part of the service stack, but let’s be honest, it often feels more like a recurring project than a meaningful security strategy. The post Reimagining SAT For MSPs: From Static ...

Fresh Windows NTLM Vulnerability Exploited in Attacks

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions. The post Fresh Windows NTLM Vulnerability Exploited in Attacks appeared first on SecurityWeek.

Critical Patch Update Announcement in April for All Oracle Products

Overview On April 16, 2025, NSFOCUS CERT detected that Oracle officially released the Critical Patch Update (CPU) for April. A total of 390 vulnerabilities with different degrees were fixed this time. This security update involves Oracle MySQL ...

PKWARE Quantum Readiness Assessment secures data from quantum computing threats

PKWARE announced its quantum readiness assessment and encryption capabilities to help organizations protect sensitive data from quantum computing threats. Quantum computing is no longer theoretical—it is becoming a powerful reality with the ...

Understanding Credential Stuffing: A Growing Cybersecurity Threat

Credential stuffing is a pervasive and increasingly sophisticated cyberattack that exploits the widespread habit of password reuse among users. By […] The post Understanding Credential Stuffing: A Growing Cybersecurity Threat appeared first on ...

Medusa Ransomware: Inside the 2025 Resurgence of One of the Internet’s Most Aggressive Threats 

Medusa: Its operations, the main factor driving its recent resurgence, which has led to warnings issued by global authorities, its targets and why it’s so dangerous. The post Medusa Ransomware: Inside the 2025 Resurgence of One of the ...

The UK’s phone theft crisis is a wake-up call for digital security

Phone theft is now commonplace in London. The Met Police recently revealed that it seizes 1,000 stolen phones weekly as it cracks down on organized criminal networks driving the £50 million trade. Nationally, cases have doubled to 83,900 ...

Unlocking Near-Zero Downtime Patch Management With High Availability Clustering 

Using high availability (HA) clustering to test patches and updates more easily and to apply them in production environments with near-zero application downtime.  The post Unlocking Near-Zero Downtime Patch Management With High Availability ...

Securing digital products under the Cyber Resilience Act

In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means for companies and how it compares to GDPR in terms of regulatory complexity and impact on organizations. He discusses ...

The Urgent Need for Tokenizing Personally Identifiable Information

If we want privacy, trust and resilience in our digital infrastructure, tokenization is no longer optional. It’s essential.  The post The Urgent Need for Tokenizing Personally Identifiable Information appeared first on Security Boulevard.

When ransomware strikes, what’s your move?

Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the time attackers have encrypted your systems, the focus shifts from prevention to response. It’s no longer about ...

What is Vulnerability Exposure Management?

The digital world is crumbling, and conventional vulnerability management alone is not enough to defend your organization against the unannounced cyber threats. Identifying the flaws present within your organizational platforms and patching them ...

Widely available AI tools signal new era of malicious bot activity

Rise in accessible AI tools significantly lowered the barrier to entry for cyber attackers, enabling them to create and deploy malicious bots at scale, according to Thales. Automated bot traffic surpassed human-generated traffic for the first ...

New infosec products of the week: April 18, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Cyware, Entrust, PlexTrac, and Seemplicity. PlexTrac for CTEM helps security teams centralize security data PlexTrac for CTEM enables both ...

The Future of SSL Certificate Management: Adapting to Shortened Renewal Periods

The industry is evolving yet again. With the CA/Browser Forum’s recent decision to reduce the maximum SSL/TLS certificate lifecycle to 47 days by 2029, the way organizations manage their certificates is going to change significantly—and ...

Securing Cloud Data: A Relief for CFOs

Are Interactions in Your Digital Environment Truly Secure? Cybersecurity has grown beyond the protection of human accounts alone. Increasingly, the focus is on securing machine-based interactions, such as APIs and service accounts, that occur ...

How to Ensure Security in Cloud Compliance

Why is Cloud Security of Paramount Importance? It’s a well-acknowledged fact, isn’t it, that our reliance on cloud services has significantly increased in the past few years? According to data from Dell Technologies, almost every ...

Cut CAPTCHA Fatigue & Boost Conversions with Device Check

Cut CAPTCHA fatigue without compromising security. Learn how Device Check reduces friction for users while keeping bots out—silently and effectively. The post Cut CAPTCHA Fatigue & Boost Conversions with Device Check appeared first on ...