Application Security News and Articles
The company has notified its customers of the incident roughly a week after a threat actor claimed the theft of 77GB of data from Iberia’s systems.
The post Spanish Airline Iberia Notifies Customers of Data Breach appeared first on SecurityWeek.
Names, Social Security numbers, ID numbers, and health information were stolen from a compromised email account.
The post 146,000 Impacted by Delta Dental of Virginia Data Breach appeared first on SecurityWeek.
More than 1.6 Tb of data allegedly stolen from Cox was made public by the hackers.
The post Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims appeared first on SecurityWeek.
SambaSPY: The RAT that targets selective victims Human error isn’t just about careless clicks or weak passwords — attackers are now deploying extremely targeted malware to exploit very specific victims. One such threat is SambaSpy, a ...
Work that once took months now takes hours. Work that once demanded large product engineering teams now depends on clarity, context, and precise prompts. This...Read More
The post AI has changed the cost of experimentation appeared first on ISHIR ...
Microsegmentation promised to change everything: limit lateral movement, contain breaches, and give security teams a level of control that traditional perimeter firewalls could never deliver. And it does deliver when...
The post The Role of NSPM ...
In this Help Net Security interview, Colonel Ludovic Monnerat, Commander Space Command, Swiss Armed Forces, discusses how securing space assets is advancing in response to emerging quantum threats. He explains why satellite systems must move ...
cnspec is an open source tool that helps when you are trying to keep a sprawling setup of clouds, containers, APIs and endpoints under control. It checks security and compliance across all of it, which makes it easier to see what needs attention. ...
Most people assume their medical data sits in quiet storage, protected by familiar rules. That belief gives a sense of safety, but new research argues that the world around healthcare data has changed faster than the policies meant to guide it. ...
Security leaders depend on vulnerability data to guide decisions, but the system supplying that data is struggling. An analysis from Sonatype shows that core vulnerability indexes no longer deliver the consistency or speed needed for the current ...
The threat landscape is forcing CISOs to rethink what they consider normal. The latest Cybersecurity Report 2026 by Hornetsecurity, based on analysis of more than 70 billion emails and broad threat telemetry, shows attackers adopting automation, ...
In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how ...
Explore secure methods for signing into online accounts, including SSO, MFA, and password management. Learn how CIAM solutions enhance security and user experience for enterprises.
The post Signing In to Online Accounts appeared first on Security ...
How Secure Are Non-Human Identities in Today’s Cloud Environment? Are you confident in the security of non-human identities (NHIs) within your organization? With digital continues to expand, securing NHIs—machine identities consisting of ...
How Can Non-Human Identities Enhance Data Integrity in Agentic AI? Have you ever considered the silent guardians keeping your data safe, especially in a cloud-dominated environment? Non-Human Identities (NHIs) is a pivotal aspect of modern ...
How Secure Are Your Non-Human Identities in the Cloud? Have you ever considered how machine identities are safeguarded within your organization’s architecture? If not, it’s time to delve into Non-Human Identities (NHIs) and understand their ...
How Are Non-Human Identities Transforming Cloud Security? Have you ever considered who—or what—is watching over your digital assets? A novel concept known as Non-Human Identities (NHIs) has emerged as a critical component in cloud security ...
SESSION
Session 3D: AI Safety
-----------
-----------
Authors, Creators & Presenters: Haotian Zhu (Nanjing University of Science and Technology), Shuchao Pang (Nanjing University of Science and Technology), Zhigang Lu (Western Sydney ...
The new movie Tron: Ares isn’t just sci-fi entertainment — it’s a mirror for today’s AI risks and realities. What happens when artificial intelligence systems don't work as intended?
The post When AI Goes Rogue, Science Fiction Meets ...
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The tech that turns supply chains from brittle to unbreakable In this Help Net Security interview, Sev Kelian, CISO and VP of Security at ...