Application Security News and Articles
The world is worried about deepfakes. Research conducted in the U.S. and Australia finds that nearly three-quarters of respondents feel negatively about them, associating the AI-generated phenomenon with fraud and misinformation. But in the ...
HPE is notifying an unknown number of individuals that Russian hackers accessed their personal information in a December 2023 attack.
The post HPE Says Personal Information Stolen in 2023 Russian Hack appeared first on SecurityWeek.
Join us for our next industry webinar taking a look at the rise of the vitally important sector focused on non-human identities. NHIs have risen in both volume and variety in recent years - and with the combination of cloud migrations and hybrid ...
Evan Light was sentenced to 20 years in federal prison for hacking an investment holdings company and stealing $37 million in cryptocurrency.
The post Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft appeared ...
Let's discuss the major things anyone should look into before choosing an API gateway in today's sprawling, AI-driven threat landscape.
The post API Gateway Security Needs a Stronger Zero-Trust Strategy appeared first on Security Boulevard.
Memorial Hospital and Manor says 120,000 people had their personal information stolen in a November 2024 ransomware attack.
The post Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital appeared first on SecurityWeek.
News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry?
The post Can AI Early Warning Systems Reboot the ...
SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash.
The post SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition appeared first on SecurityWeek.
The United Kingdom has made a bold demand to Apple, purporting to require the company to create a backdoor to access encrypted cloud backups of all users worldwide.
The post Hey, UK, Get Off of My Cloud appeared first on Security Boulevard.
Artificial Intelligence (AI) is transforming industries by automating tasks, improving decision-making, and enhancing cybersecurity. However, AI models are increasingly being targeted by adversarial attacks, which can manipulate or compromise ...
Explore industry moves and significant changes in the industry for the week of February 10, 2025. Stay updated with the latest industry trends and shifts.
The new year has started with a whirlwind of activity, and one of the hottest topics in the news is the increasing emphasis on AI. DeepSeek ad Stargate DeepSeek took the world by storm as millions of copies were downloaded to personal devices, ...
Security validation has officially turned a corner. Once considered a “nice-to-have” it’s now a top priority for security leaders worldwide. This shift has been accelerated by frameworks like Gartner’s Continuous Threat Exposure ...
In this Help Net Security interview, Mateusz Łabuz, researcher at the IFSH, discusses the balance between using AI for personalized political campaigns and protecting voter privacy. Łabuz also discusses the potential of AI in fact-checking, the ...
In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in various cybersecurity events and her ...
Beelzebub is an open-source honeypot framework engineered to create a secure environment for detecting and analyzing cyber threats. It features a low-code design for seamless deployment and leverages AI to emulate the behavior of a ...
Tokenization replaces sensitive data, such as credit card numbers or personal identifiers, with unique, non-sensitive tokens with no exploitable value. This method helps protect sensitive information by ensuring that the actual data is never ...
Why does the Secure Framework Matter? The focus of this operation isn’t just about the immediate prevention of potential threats but ensuring we have a solid line of defense that could weather any storm thrown our way. It’s all about staying ...
Are You Properly Managing Your Non-Human Identities? Modern organizations are continually interacting with an ever-growing number of machines, applications, and devices, often through cloud-based systems. These interactions, when left ...
Are Businesses Truly Aware of the Importance of Non-Human Identities in Cybersecurity? There’s one critical aspect that’s frequently overlooked: Non-Human Identities (NHIs). These machine identities, composed of Secrets such as tokens, keys, ...