Application Security News and Articles


Spanish Airline Iberia Notifies Customers of Data Breach

The company has notified its customers of the incident roughly a week after a threat actor claimed the theft of 77GB of data from Iberia’s systems. The post Spanish Airline Iberia Notifies Customers of Data Breach appeared first on SecurityWeek.

146,000 Impacted by Delta Dental of Virginia Data Breach

Names, Social Security numbers, ID numbers, and health information were stolen from a compromised email account. The post 146,000 Impacted by Delta Dental of Virginia Data Breach appeared first on SecurityWeek.

Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims

More than 1.6 Tb of data allegedly stolen from Cox was made public by the hackers. The post Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims appeared first on SecurityWeek.

What is SambaSpy

SambaSPY: The RAT that targets selective victims Human error isn’t just about careless clicks or weak passwords — attackers are now deploying extremely targeted malware to exploit very specific victims. One such threat is SambaSpy, a ...

AI has changed the cost of experimentation

Work that once took months now takes hours. Work that once demanded large product engineering teams now depends on clarity, context, and precise prompts. This...Read More The post AI has changed the cost of experimentation appeared first on ISHIR ...

The Role of NSPM in Microsegmentation and Attack Surface Reduction

Microsegmentation promised to change everything: limit lateral movement, contain breaches, and give security teams a level of control that traditional perimeter firewalls could never deliver. And it does deliver when... The post The Role of NSPM ...

Quantum encryption is pushing satellite hardware to its limits

In this Help Net Security interview, Colonel Ludovic Monnerat, Commander Space Command, Swiss Armed Forces, discusses how securing space assets is advancing in response to emerging quantum threats. He explains why satellite systems must move ...

cnspec: Open-source, cloud-native security and policy project

cnspec is an open source tool that helps when you are trying to keep a sprawling setup of clouds, containers, APIs and endpoints under control. It checks security and compliance across all of it, which makes it easier to see what needs attention. ...

The privacy tension driving the medical data shift nobody wants to talk about

Most people assume their medical data sits in quiet storage, protected by familiar rules. That belief gives a sense of safety, but new research argues that the world around healthcare data has changed faster than the policies meant to guide it. ...

What happens when vulnerability scores fall apart?

Security leaders depend on vulnerability data to guide decisions, but the system supplying that data is struggling. An analysis from Sonatype shows that core vulnerability indexes no longer deliver the consistency or speed needed for the current ...

Email blind spots are back to bite security teams

The threat landscape is forcing CISOs to rethink what they consider normal. The latest Cybersecurity Report 2026 by Hornetsecurity, based on analysis of more than 70 billion emails and broad threat telemetry, shows attackers adopting automation, ...

AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage

In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how ...

Signing In to Online Accounts

Explore secure methods for signing into online accounts, including SSO, MFA, and password management. Learn how CIAM solutions enhance security and user experience for enterprises. The post Signing In to Online Accounts appeared first on Security ...

Why should I feel confident in adopting Agentic AI tech?

How Secure Are Non-Human Identities in Today’s Cloud Environment? Are you confident in the security of non-human identities (NHIs) within your organization? With digital continues to expand, securing NHIs—machine identities consisting of ...

Can I be reassured of data integrity with Agentic AI?

How Can Non-Human Identities Enhance Data Integrity in Agentic AI? Have you ever considered the silent guardians keeping your data safe, especially in a cloud-dominated environment? Non-Human Identities (NHIs) is a pivotal aspect of modern ...

How are Agentic AI systems kept safe from cyber threats?

How Secure Are Your Non-Human Identities in the Cloud? Have you ever considered how machine identities are safeguarded within your organization’s architecture? If not, it’s time to delve into Non-Human Identities (NHIs) and understand their ...

How does Agentic AI drive innovation in cloud security?

How Are Non-Human Identities Transforming Cloud Security? Have you ever considered who—or what—is watching over your digital assets? A novel concept known as Non-Human Identities (NHIs) has emerged as a critical component in cloud security ...

NDSS 2025 – GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based Facial Customization

SESSION Session 3D: AI Safety ----------- ----------- Authors, Creators & Presenters: Haotian Zhu (Nanjing University of Science and Technology), Shuchao Pang (Nanjing University of Science and Technology), Zhigang Lu (Western Sydney ...

When AI Goes Rogue, Science Fiction Meets Reality

The new movie Tron: Ares isn’t just sci-fi entertainment — it’s a mirror for today’s AI risks and realities. What happens when artificial intelligence systems don't work as intended? The post When AI Goes Rogue, Science Fiction Meets ...

Week in review: Stealth-patched FortiWeb vulnerability under active exploitation, Logitech data breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The tech that turns supply chains from brittle to unbreakable In this Help Net Security interview, Sev Kelian, CISO and VP of Security at ...