Application Security News and Articles


Insurance Company Globe Life Notifying 850,000 People of Data Breach

Insurance firm Globe Life says a threat actor may have compromised the personal information of roughly 850,000 individuals. The post Insurance Company Globe Life Notifying 850,000 People of Data Breach appeared first on SecurityWeek.

Under Pressure: Why Companies Must Mitigate the Churn of Cybersecurity Leaders  

More needs to be done to prevent the cycle of burnout and churn which affects leaders, their teams and the overall security of the organization. The post Under Pressure: Why Companies Must Mitigate the Churn of Cybersecurity Leaders   appeared ...

The Importance of Secure Remote Key Loading for Point-of-Sale Systems

As global payment infrastructure evolves, securing point-of-sale (POS) systems has become more critical than ever.   The post The Importance of Secure Remote Key Loading for Point-of-Sale Systems appeared first on Security Boulevard.

Remote Browser Isolation Within ZTNA Delivers Seven Key Benefits

As cyberthreats become more sophisticated, organizations must protect their users and consider the combination of zero-trust network access and remote browser isolation as a key element of their cybersecurity strategy. The post Remote Browser ...

Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks

The NIST Phish Scale framework offers a structured and effective approach to improving phishing awareness training in organizations. The post Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks appeared first on Security ...

Hackers Hijack JFK File Release: Malware & Phishing Surge

Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files. Attackers are capitalizing on public interest in these historical documents to launch potential malware ...

1 Million Impacted by Data Breach at Connecticut Healthcare Provider

Community Health Center, Inc. says hackers stole the personal and health information of over one million individuals. The post 1 Million Impacted by Data Breach at Connecticut Healthcare Provider appeared first on SecurityWeek.

January Recap: New AWS Sensitive Permissions and Regions

As January 2025 comes to a close, we’re highlighting the latest updates to sensitive permissions, services, and regions from AWS. Staying informed on these changes is essential for maintaining a strong cloud security posture and ensuring that ...

The hidden dangers of a toxic cybersecurity workplace

In this Help Net Security interview, Rob Lee, Chief of Research and Head of Faculty at SANS Institute, discusses what a toxic environment looks like and how professionals can recognize red flags such as high turnover, burnout, and a pervasive ...

Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI

In this episode, we explore the rollout of digital driver’s licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising your privacy? We also discuss the ...

BadDNS: Open-source tool checks for subdomain takeovers

BadDNS is an open-source Python DNS auditing tool designed to detect domain and subdomain takeovers of all types. BadDNS modules cname – Check for dangling CNAME records and interrogate them for subdomain takeover opportunities ns – ...

Only 3% of organizations have a dedicated budget for SaaS security

Mid-market organizations are grappling with managing the large volume of SaaS applications, both sanctioned and unsanctioned, with actual numbers often exceeding expectations, according to Cloud Security Alliance. Security teams are struggling ...

How to use iCloud Private Relay for enhanced privacy

iCloud Private Relay, included with an iCloud+ subscription, enhances your privacy while browsing the web in Safari. When this feature is enabled, the traffic leaving your iPhone is encrypted and routed through two separate internet relays. This ...

Industry Moves for the week of February 3, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of February 3, 2025. Stay updated with the latest industry trends and shifts.

DEF CON 32 – Navigating the Turbulent Skies of Aviation Cyber Regulation

Authors/Presenters: M. Weigand, S. Wagner Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; ...

Hackers Hijack JFK File Release: Malware & Phishing Surge

Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files. Attackers are capitalizing on public interest in these historical documents to launch potential malware ...

Week in review: Apple 0-day used to target iPhones, DeepSeek’s popularity exploited by scammers

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085) Apple has shipped a fix for a zero-day vulnerability ...

LDAP Injection: A SAST Vulnerability

What Is LDAP Injection attack? Code Examples and PreventionContinue reading on Medium »

Core Features in NSFOCUS RSAS R04F04 1-2

In the new NSFOCUS RSAS version R04F04, we optimized several core features and functions. In this post, we will focus on the optimization of the product interface function process during the vulnerability scanning process. Efficient Asset ...

Innovations in Identity and Access Management

Are IAM Innovations the Future of Cybersecurity? Identity and Access Management (IAM) has become instrumental in maintaining an effective cybersecurity strategy. As the digital sphere continues to expand, fostering innovations in IAM is crucial ...