Application Security News and Articles


Akira Ransomware Group Made $244 Million in Ransom Proceeds

Akira was seen exploiting SonicWall vulnerabilities and encrypting Nutanix Acropolis Hypervisor (AHV) VM disk files this year. The post Akira Ransomware Group Made $244 Million in Ransom Proceeds appeared first on SecurityWeek.

The Role of Humans in an AI-Powered World

As AI capabilities grow, we must delineate the roles that should remain exclusively human. The line seems to be between fact-based decisions and judgment-based decisions. For example, in a medical context, if an AI was demonstrably better at ...

EasyDMARC Integrates with Splunk

Originally published at EasyDMARC Integrates with Splunk by EasyDMARC. Streamline security monitoring. Centralize email threat data. EasyDMARC ... The post EasyDMARC Integrates with Splunk appeared first on EasyDMARC. The post EasyDMARC ...

The Future of Passwords: Kill Them in the Flow, Keep Them in the Constitution 

Passkeys beat passwords in security and usability, but recovery gaps create new risks. Explore why digital identity still needs a constitutional backstop beyond passkeys. The post ...

15 Best Vibe Coding Tools and Editors To Use in 2026

AI has changed how teams develop software products. Instead of writing every line inside a traditional IDE, developers now describe what they want and let...Read More The post 15 Best Vibe Coding Tools and Editors To Use in 2026 appeared first on ...

Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 

A financially motivated threat actor automated the package publishing process in a coordinated tea.xyz token farming campaign. The post Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign  appeared first on SecurityWeek.

Security Degradation in AI-Generated Code: A Threat Vector CISOs Can’t Ignore

A new study shows LLMs introduce more vulnerabilities with each code iteration, highlighting critical risks for CISOs and the need for skilled human oversight. The post Security Degradation in AI-Generated Code: A Threat Vector CISOs Can’t ...

Imunify360 Vulnerability Could Expose Millions of Sites to Hacking

A vulnerability in ImunifyAV can be exploited for arbitrary code execution by uploading a malicious file to shared servers. The post Imunify360 Vulnerability Could Expose Millions of Sites to Hacking appeared first on SecurityWeek.

Modern Authentication for Umbraco: Add SSO, SCIM & Compliance with SSOJet

Upgrade your Umbraco application with enterprise-ready authentication. Add SAML SSO, OIDC login, SCIM provisioning, audit logs, and compliance features using SSOJet—without rebuilding your CMS. A modern identity layer built for scaling B2B ...

Building an Automated SAST + DAST Pipeline: Solving One of the Biggest Security Problems in Modern…

Rajesh Thakur | DevOps Engineer @ Deploycrafts |Continue reading on DevOps.dev »

How to Add Passwordless Authentication to Umbraco Using MojoAuth

Add passwordless login to Umbraco using MojoAuth. Step-by-step OIDC setup, passkeys, OTP, and a full GitHub example for secure, modern authentication. The post How to Add Passwordless Authentication to Umbraco Using MojoAuth appeared first on ...

Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign

A state-sponsored threat actor manipulated Claude Code to execute cyberattacks on roughly 30 organizations worldwide. The post Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign appeared first on SecurityWeek.

Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  

The cybercriminals informed customers that their cloud server was shut down due to complaints. The post Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit   appeared first on SecurityWeek.

Human Error: The #1 Cause of Security Incidents

Human error remains the leading cause of security breaches, even in today’s era of advanced technology and automated defences. A single mistake — such as clicking a phishing link, misconfiguring a system, or using weak passwords — can ...

Trulioo helps enterprises accelerate business onboarding

Trulioo announced Trulioo credit decisioning, a new capability that delivers comprehensive financial, credit and risk insights through the Trulioo global identity platform. The launch follows a 102% year-over-year increase in U.S. Know Your ...

Why your security strategy is failing before it even starts

In this Help Net Security interview, Adnan Ahmed, CISO at Ornua, discusses how organizations can build a cybersecurity strategy that aligns with business goals. He explains why many companies stumble by focusing on technology before understanding ...

Protecting mobile privacy in real time with predictive adversarial defense

Mobile sensors are everywhere, quietly recording how users move, tilt, or hold their phones. The same data that powers step counters and activity trackers can also expose personal details such as gender, age, or even identity. A new study ...

Without a vCISO, Your Startup’s Security Is Running on Luck

What do you think is the startup illusion of safety? If there is any? Baby organizations tend to believe “we’re small, we’re agile, risk is low” when it comes to cybersecurity. That belief might not have been dangerous a few years back, ...

Los Alamos researchers warn AI may upend national security

For decades, the United States has built its defense posture around predictable timelines for technological progress. That assumption no longer holds, according to researchers at Los Alamos National Laboratory. Their paper argues that AI is ...

What happens when employees take control of AI

Executives may debate AI strategy, but many of the advances are happening at the employee level. A recent Moveworks study shows that AI adoption is being led from the ground up, with employees, not senior leaders, driving the change. The research ...