Application Security News and Articles


Could you Spot a Digital Twin at Work? Get Ready for Hyper-Personalized Attacks

The world is worried about deepfakes. Research conducted in the U.S. and Australia finds that nearly three-quarters of respondents feel negatively about them, associating the AI-generated phenomenon with fraud and misinformation. But in the ...

HPE Says Personal Information Stolen in 2023 Russian Hack

HPE is notifying an unknown number of individuals that Russian hackers accessed their personal information in a December 2023 attack. The post HPE Says Personal Information Stolen in 2023 Russian Hack appeared first on SecurityWeek.

The First Step to Tackling the NHI Security Challenge

Join us for our next industry webinar taking a look at the rise of the vitally important sector focused on non-human identities. NHIs have risen in both volume and variety in recent years - and with the combination of cloud migrations and hybrid ...

Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft

Evan Light was sentenced to 20 years in federal prison for hacking an investment holdings company and stealing $37 million in cryptocurrency. The post Indiana Man Sentenced to 20 Years in Prison for Hacking, $37 Million Crypto Theft appeared ...

API Gateway Security Needs a Stronger Zero-Trust Strategy

Let's discuss the major things anyone should look into before choosing an API gateway in today's sprawling, AI-driven threat landscape. The post API Gateway Security Needs a Stronger Zero-Trust Strategy appeared first on Security Boulevard.

Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital

Memorial Hospital and Manor says 120,000 people had their personal information stolen in a November 2024 ransomware attack. The post Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital appeared first on SecurityWeek.

Can AI Early Warning Systems Reboot the Threat Intel Industry?

News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry? The post Can AI Early Warning Systems Reboot the ...

SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition

SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash.  The post SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition appeared first on SecurityWeek.

Hey, UK, Get Off of My Cloud

The United Kingdom has made a bold demand to Apple, purporting to require the company to create a backdoor to access encrypted cloud backups of all users worldwide. The post Hey, UK, Get Off of My Cloud appeared first on Security Boulevard.

White Box Testing in 2025: A Complete Guide to Techniques, Tools, and Best Practices

Artificial Intelligence (AI) is transforming industries by automating tasks, improving decision-making, and enhancing cybersecurity. However, AI models are increasingly being targeted by adversarial attacks, which can manipulate or compromise ...

Industry Moves for the week of February 10, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of February 10, 2025. Stay updated with the latest industry trends and shifts.

February 2025 Patch Tuesday forecast: New directions for AI development

The new year has started with a whirlwind of activity, and one of the hottest topics in the news is the increasing emphasis on AI. DeepSeek ad Stargate DeepSeek took the world by storm as millions of copies were downloaded to personal devices, ...

Security validation: The new standard for cyber resilience

Security validation has officially turned a corner. Once considered a “nice-to-have” it’s now a top priority for security leaders worldwide. This shift has been accelerated by frameworks like Gartner’s Continuous Threat Exposure ...

Political campaigns struggle to balance AI personalization and voter privacy

In this Help Net Security interview, Mateusz Łabuz, researcher at the IFSH, discusses the balance between using AI for personalized political campaigns and protecting voter privacy. Łabuz also discusses the potential of AI in fact-checking, the ...

Careers in Cybersecurity: Myths and Realities with Kathleen Smith

In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in various cybersecurity events and her ...

Beelzebub: Open-source honeypot framework

Beelzebub is an open-source honeypot framework engineered to create a secure environment for detecting and analyzing cyber threats. It features a low-code design for seamless deployment and leverages AI to emulate the behavior of a ...

Evolving uses of tokenization to protect data

Tokenization replaces sensitive data, such as credit card numbers or personal identifiers, with unique, non-sensitive tokens with no exploitable value. This method helps protect sensitive information by ensuring that the actual data is never ...

Building an Impenetrable Framework for Data Security

Why does the Secure Framework Matter? The focus of this operation isn’t just about the immediate prevention of potential threats but ensuring we have a solid line of defense that could weather any storm thrown our way. It’s all about staying ...

Ensuring Satisfaction with Seamless Secrets Sprawl Management

Are You Properly Managing Your Non-Human Identities? Modern organizations are continually interacting with an ever-growing number of machines, applications, and devices, often through cloud-based systems. These interactions, when left ...

Stay Relaxed with Top-Notch API Security

Are Businesses Truly Aware of the Importance of Non-Human Identities in Cybersecurity? There’s one critical aspect that’s frequently overlooked: Non-Human Identities (NHIs). These machine identities, composed of Secrets such as tokens, keys, ...