Application Security News and Articles


Online crime-as-a-service skyrockets with 24,000 users selling attack tools

The growth of AI-based technology has introduced new challenges, making remote identity verification systems more vulnerable to attacks, according to iProov. Innovative and easily accessible tools have allowed threat actors to become more ...

Innovation vs. security: Managing shadow AI risks

In this Help Net Security video, Tim Morris, Chief Security Advisor at Tanium, shares practical best practices to help organizations balance innovation and security while leveraging AI. Morris warns of an even riskier shadow AI trend in which ...

DEF CON 32 – Cybersecurity Schoolhouse Rock

Author/Presenter: Avi McGrady Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Enhancing Application Security | Contrast ADR and Splunk | Contrast Security

Have you silenced WAF alerts in your SIEM or just stopped sending them altogether? You're not alone. Many SOCs find themselves overwhelmed by the sheer volume of noise generated by traditional WAFs, forcing them to choose between alert fatigue or ...

What is Identity Attack Surface Management (IASM)

Discover how Identity Attack Surface Management (IASM) helps protect digital identities, mitigate cyber threats, and enhance security across hybrid environments. The post What is Identity Attack Surface Management (IASM) appeared first on ...

Privacy Roundup: Week 9 of Year 2025

This is a news item roundup of privacy or privacy-related news items for 23 FEB 2025 - 1 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional "security" content mixed-in here due to ...

AI is Evolving Faster Than Our Ability to Secure It

As AI continues to evolve, so will the associated security risks, and cybersecurity professionals must remain vigilant and proactive. The post AI is Evolving Faster Than Our Ability to Secure It first appeared on Security Boulevard. The post AI ...

AI is Evolving Faster Than Our Ability to Secure It

As AI continues to evolve, so will the associated security risks, and cybersecurity professionals must remain vigilant and proactive. The post AI is Evolving Faster Than Our Ability to Secure It appeared first on Security Boulevard.

Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to Fault-Tolerant Qubits

Amazon claims its researchers have combined cat qubit technology and additional quantum error correction components onto a microchip that can be manufactured in a scalable fashion. The post Quantum Wars: Google, Microsoft, and Amazon’s ...

Mimic Raises $50 Million to Stop Ransomware Attacks

Ransomware defense startup Mimic has raised $50 million in a Series A funding round led by Google Ventures and Menlo Ventures. The post Mimic Raises $50 Million to Stop Ransomware Attacks appeared first on SecurityWeek.

US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack

The US government has seized roughly $31 million in cryptocurrency stolen in 2021 from Uranium Finance. The post US Seizes $31 Million Worth of Crypto Stolen in Uranium Finance Hack appeared first on SecurityWeek.

Cybersecurity M&A Roundup: 28 Deals Announced in February 2025

Cybersecurity-related merger and acquisition (M&A) deals announced in February 2025.  The post Cybersecurity M&A Roundup: 28 Deals Announced in February 2025 appeared first on SecurityWeek.

First 90 Days: Exploring the CISO Role

The first 90 days in any new role are critical, but for a Chief Information Security Officer (CISO), they can be make-or-break. This period is your opportunity to understand the organization, build relationships, and set the foundation for a ...

Vulnerable Paragon Driver Exploited in Ransomware Attacks

Ransomware operators exploit a vulnerable Paragon driver in BYOVD attacks to elevate privileges to System. The post Vulnerable Paragon Driver Exploited in Ransomware Attacks appeared first on SecurityWeek.

New York SHIELD Act: Everything You Need to Know for Compliance

New York’s Privacy Laws: A Legacy and a Challenge New York is a leader in finance, culture, and technology. Less than a decade ago, it was also a forerunner in privacy and cybersecurity regulation. As the home of Wall Street and a hub for ...

New York SHIELD Act: Everything You Need to Know for Compliance

New York’s Privacy Laws: A Legacy and a Challenge New York is a leader in finance, culture, and technology. Less than a decade ago, it was also a forerunner in privacy and cybersecurity regulation. As the home of Wall Street and a hub for ...

Indian Stock Broker Angel One Discloses Data Breach

Angel One says client information was compromised in a data breach involving its AWS account. The post Indian Stock Broker Angel One Discloses Data Breach appeared first on SecurityWeek.

Black Basta Leak Offers Glimpse Into Group’s Inner Workings 

A massive hoard of internal chats has been leaked from Black Basta, rivalling the Conti leaks of late February 2022. The post Black Basta Leak Offers Glimpse Into Group’s Inner Workings  appeared first on SecurityWeek.

DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation

If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy. The post DOGE Access to Personal Information and The Difficulty of ...

DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation

If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy. The post DOGE Access to Personal Information and The Difficulty of ...