Application Security News and Articles


Virtue AI Attracts $30M Investment to Address Critical AI Deployment Risks

San Francisco startup banks $30 million in Seed and Series A funding led by Lightspeed Venture Partners and Walden Catalyst Ventures. The post Virtue AI Attracts $30M Investment to Address Critical AI Deployment Risks appeared first on SecurityWeek.

BSidesLV24 – Breaking Ground – Insights On Using A Cloud Telescope To Observe Internet-Wide Botnet Propagation Activity

Author/Presenter: Fabricio Bortoluzzi Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & ...

The Hidden Risks in AI Training Data—And How to Eliminate Them

The post The Hidden Risks in AI Training Data—And How to Eliminate Them appeared first on Votiro. The post The Hidden Risks in AI Training Data—And How to Eliminate Them appeared first on Security Boulevard.

ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance

The recent ransomware breach tied to ICICI Bank—claimed by the LockBit group—has raised fresh concerns about the fragility of digital ecosystems and third-party risk. While official confirmations remain limited, leaked files and dark web ...

The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime

The cryptocurrency sector has always been a magnet for cybercriminals, but the TraderTraitor campaign marks a different kind of threat—one backed by state-sponsored actors with long-term goals and surgical precision. Allegedly linked to North ...

The Smishing Triad Surge: Text-Based Threats Are Getting Smarter, Not Simpler

What began as a trickle of spammy messages has evolved into a sophisticated and dangerous phishing campaign. The Smishing Triad, an active cybercriminal group, is behind a surge of SMS-based phishing attacks (smishing) targeting organizations ...

The Salt Typhoon Telecom Breach: When Network Access Becomes National Exposure

The recent Salt Typhoon breach targeting telecom infrastructure isn’t just another headline—it’s a warning shot to every service provider that uptime and connectivity aren’t enough. This sophisticated campaign, attributed to Chinese ...

Randall Munroe’s XKCD ‘Push Notifications’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Push Notifications’ appeared first on Security Boulevard.

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Lemonade says the incident is not material and that its operations were not compromised, nor was its customer data targeted. The post Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers appeared first on SecurityWeek.

15 Timeless Truths of SaaS Business in the Age of AI

The world is changing fast — AI is reshaping what’s possible in software. Tools are evolving, business models are shifting, and the speed of iteration...Read More The post 15 Timeless Truths of SaaS Business in the Age of AI appeared first on ...

Public Support Emerges for Chris Krebs, SentinelOne After Trump Memo

The cybersecurity industry has been conspicuously quiet after President Trump targeted ex-CISA director Chris Krebs and SentinelOne for retribution. However, some voices have risen above the silence to urge support and the need for public ...

MISRA C++:2023 Compliance for Auto Safety and Reliability

MISRA coding guidelines are a standard for automotive and other safety critical systems. SonarQube helps C++ developers deliver MISRA C++:2023 compliant apps with MISRA Compliance Early Access available in SonarQube Server Enterprise and Data ...

BSidesLV24 – Breaking Ground – Introducing Serberus – A Multi Headed Serial Hardware Hacking Tool

Author/Presenter: Patrick Kiley Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

2025 Imperva Bad Bot Report: How AI is Supercharging the Bot Threat

Bad bots continue to target organizations across every industry and geography, but the rise of Artificial Intelligence (AI) is fueling bot attacks, making them more intelligent and more evasive than ever before. For over twelve years, Imperva has ...

Kidney Dialysis Services Provider DaVita Hit by Ransomware

DaVita has not named the ransomware group behind the incident or share details on the attacker’s ransom demands. The post Kidney Dialysis Services Provider DaVita Hit by Ransomware appeared first on SecurityWeek.

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

The business services provider confirms personal information such as names and Social Security numbers was stolen in a January cyberattack. The post Conduent Says Names, Social Security Numbers Stolen in Cyberattack appeared first on SecurityWeek.

Hertz data breach: Customers in US, EU, UK, Australia and Canada affected

American car rental company Hertz has suffered a data breach linked to last year’s exploitation of Cleo zero-day vulnerabilities by a ransomware gang. The breach resulted in information of an unknown number of customers of Hertz and ...

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

In fresh filings, Landmark Admin and Young Consulting say data breaches back in 2024 impacted more people than initially estimated. The post 2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches appeared first on SecurityWeek.

Trump vs. Biden Cyber Strategy — According to AI 

We asked an AI agent to analyze the latest shift in U.S. cybersecurity policy, comparing past strategies under Biden to the new 2025 Trump Executive Order. The result? A surprisingly structured analysis that maps out the core philosophical and ...

PlexTrac for CTEM helps security teams centralize security data

PlexTrac launched PlexTrac for CTEM, expanding the platform’s capabilities with a proactive and continuous threat exposure management solution designed to help security teams centralize security data, prioritize risk based on business impact, ...