Application Security News and Articles
Colt Technology Services is working on restoring systems disrupted by a ransomware attack that involved data theft.
The post Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files appeared first on SecurityWeek.
Effective management of software bills of materials (SBOMs) is now crucial for ensuring security, achieving compliance, and optimizing operational efficiency.
The post SBOM Manager New Features Accelerate Compliance and Security at Scale appeared ...
SailPoint unveiled SailPoint Accelerated Application Management, a solution that redefines how enterprises discover, govern, and secure applications at scale. While most organizations govern fewer than 50 applications, thousands more remain ...
Noah Urban was sentenced to 10 years in prison for his role in the notorious cybercriminal operation known as Scattered Spider.
The post Scattered Spider Hacker Sentenced to Prison appeared first on SecurityWeek.
A researcher has tested nearly a dozen password managers and found that they were all vulnerable to clickjacking attacks.
The post Password Managers Vulnerable to Data Theft via Clickjacking appeared first on SecurityWeek.
Cybercriminals commonly target K-12 schools. To trick staff, students, and even parents into disclosing sensitive information, malicious attackers deploy phishing attacks. Training individuals on how to spot phishing emails is a key guardrail and ...
Over the last year, I’ve spent countless hours with CISOs, CTOs, and security architects talking about a new wave of technology that’s changing the game faster than anything we’ve seen before: Agentic AI and Model Context Protocol (MCP) ...
Originally published at Answering Your Webinar Questions: What Do Most IT Teams Get Wrong About DMARC? by Levon Vardumyan.
Our recent webinar, “What Do Most IT Teams ...
The post Answering Your Webinar Questions: What Do Most IT Teams Get Wrong ...
Learn how to automate your penetration testing, save time, reduce costs, and achieve business logic testing without human-in-the-loop.
The post How to Automate Your Penetration Testing? appeared first on Security Boulevard.
AWS’s Trusted Advisor tool, which is supposed to warn customers if their (cloud) S3 storage buckets are publicly exposed, could be “tricked” into reporting them as not exposed when they actually are, Fog Security researchers have ...
Russian state-sponsored hackers tracked as Static Tundra continue to target Cisco devices affected by CVE-2018-0171.
The post Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI appeared first on SecurityWeek.
If you caught my Buyers Look at More Than Dots article on the Gartner Magic Quadrant earlier this year, you already know I’m not a fan of check‑box cheerleading. Yes, it’s nice when your company lands in a particular quadrant or, in ...
With innovation comes risk. As organizations race to build AI-first infrastructure, security is struggling to keep pace. Multi-Agentic Systems – those built on Large Language Models (LLMs) and Multi-Component Protocols (MCP) - bring immense ...
Securing UK Hospitality SMBs and their supply chains in 2025 UK hospitality, including hotels, guesthouses, pubs, restaurants and their supply chains, thrives on reputation, efficiency, and trust. In 2025, data-driven bookings, contactless ...
Orange Belgium says hackers accessed data pertaining to 850,000 customer accounts during a July cyberattack.
The post Orange Belgium Data Breach Impacts 850,000 Customers appeared first on SecurityWeek.
Rrise of SIM swap fraud, its implications, and how to protect yourself. Stay informed and secure your accounts today!
The post Protect Your Phone: Guard Against SIM Swap Scams and Fraud appeared first on Security Boulevard.
Cyber attackers have changed their tactics. According to a recent ITPro report, malicious URLs are now four times more common than infected email attachments when it comes to delivering malware. This shift has serious implications for defenders, ...
Global spending on cybersecurity is projected to soar to $213 billion in 2025, up from $193 billion in 2024, according to Gartner, as reported by ITPro. Forecasts show continued momentum with spending expected to reach $240 billion by 2026. ...
A wave of cyberattacks across Asia is pushing organizations to take a harder line on supplier cybersecurity. According to Dark Reading, both public and private sector organizations are beginning to mandate stronger risk controls from ...
A recent report from TechRadar Pro reveals that the United States is now the most targeted country in the world for ransomware attacks, accounting for nearly 50% of all reported incidents globally in the first half of 2025. According to data ...