Application Security News and Articles
The Payment Card Industry Data Security Standard (PCI DSS) has always been considered one of the most prescriptive industry mandates around. And well might it be, given what’s at stake. As breach volumes surge and threat actors find it ever ...
Learn how AI is transforming SaaS security and why AI-driven security is not just an advantage to your SaaS ecosystems, but a necessity that will help redefine how critical data is protected.
The post Simplifying SaaS Security with the Power of ...
Check out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure ...
An extortion group has been sending physical mail to corporate executives, threatening to leak their data unless a ransom is paid.
The post FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail appeared first on SecurityWeek.
Microsoft has uncovered a malvertising campaign that redirected users to information stealers hosted on GitHub.
The post Microsoft Says One Million Devices Impacted by Infostealer Campaign appeared first on SecurityWeek.
National Presto Industries says a cyberattack has resulted in a system outage and operational disruptions.
The post Cyberattack Disrupts National Presto Industries Operations appeared first on SecurityWeek.
NTT Communications Corporation has disclosed a data breach impacting the information of nearly 18,000 customer organizations.
The post 18,000 Organizations Impacted by NTT Com Data Breach appeared first on SecurityWeek.
Dozens of schools and thousands of individuals are impacted by a data breach resulting from a ransomware attack on Carruth Compliance Consulting.
The post Many Schools Report Data Breach After Retirement Services Firm Hit by Ransomware appeared ...
Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities.
The post New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance appeared ...
As businesses continue to shift their operations to the cloud, ensuring robust cloud security has never been more critical. While the cloud offers flexibility, scalability, and cost-effectiveness, it also introduces a host of new security ...
The number of Medusa ransomware attacks observed in the first two months of 2025 doubled compared to the same period last year.
The post Medusa Ransomware Attacks Increase appeared first on SecurityWeek.
Armis has acquired OTORIO, a provider of OT/ ICS cyber security solutions. This accelerates Armis’ roll out of an on premise version of its Cyber Exposure Management platform, Armis Centrix and cements its leadership in cyber physical systems ...
Multiple Mirai-based botnets are exploiting CVE-2025-1316, an Edimax IP camera vulnerability that allows remote command execution.
The post Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets appeared first on SecurityWeek.
Discover how DNS hijacking works, explore real-world examples and discover effective ways to detect, prevent, and fix DNS hijacking with actionable strategies.
The post What is DNS Hijacking: Detection, Prevention, and Mitigation appeared first ...
In the constantly evolving world of cybersecurity, hackers continuously seek out vulnerabilities, exploit misconfigurations, and attempt to breach IT infrastructures. To counter these threats, vulnerability scanning tools serve as a crucial ...
Traditional training often lacks the hands-on experience cybersecurity teams need to counter advanced threats. AI-powered gamified simulations combine artificial intelligence with interactive learning to enhance their skills. Conventional ...
In this Help Net Security video, John Grancarich, Fortra’s Chief Strategy Officer, discusses the 2025 Fortra State of Cybersecurity Survey and highlights escalating concerns among security professionals about AI-driven threats and a ...
The U.S. DOJ indicted a dozen Chinese nationals for their role in a years-long hacker-for-hire campaign that included the Chinese government using private companies and freelance hackers to steal data from U.S. and other governments while ...
Here’s a look at the most interesting products from the past week, featuring releases from Outpost24, Palo Alto Networks, Red Canary, and Sonatype. Outpost24 introduces CyberFlex to streamline attack surface management and pen testing Outpost24 ...
The transaction is valued in the range of $120 million and gives Armis an on-premises CPS solution
The post Armis Acquires Otorio to Expand OT and CPS Security Suite appeared first on SecurityWeek.