Application Security News and Articles


Cheat Sheet and Action Plan: The PCI Council’s SAQ-A Eligibility Update

by Source Defense Implications to 6.4.3 and 11.6.1 and What It Means for PSPs, Merchants, and QSAs. On January 30, 2025 the PCI Security Standards Council announced changes to eligibility requirements for any merchant trying to demonstrate ...

VMware Patches High-Risk Flaws in Oft-Targeted Aria Operations Products

VMWare calls attention to patches for multiple 'high-risk' security defects in its Aria Operations and Aria Operations for Logs products. The post VMware Patches High-Risk Flaws in Oft-Targeted Aria Operations Products appeared first on SecurityWeek.

Conifers.ai Scores $25M Investment for Agentic AI SOC Technology

Backed by SYN Ventures, Conifers.ai plans to use “agentic AI” technology to tackle complex security operations center (SOC) problems. The post Conifers.ai Scores $25M Investment for Agentic AI SOC Technology appeared first on SecurityWeek.

Randall Munroe’s XKCD ‘Humidifier Review’

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Humidifier Review’ appeared first on Security Boulevard.

Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats

Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the invisibility and wrongful use of Shadow AI. The post Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to ...

Did the Broadcom Acquisition of VMware Leave You Feeling High-and-Dry?

For NSX customers and partners who are Star Trek fans, VMware getting absorbed into the huge Broadcom product line might remind them of the Borg collective: “Resistance is Futile!” I lived through similar events when I was at IronPort, and we ...

What is data privacy in healthcare? everything you need to know

Data privacy in healthcare is more important than ever, but few people fully understand how it works and why it’s necessary. Learn more about what data privacy in healthcare means and how medical organizations practice it in this detailed ...

RAG evaluation series: validating the RAG performance of Amazon Titan vs Cohere using Amazon Bedrock

This is the fourth installment in a multi-part series on evaluating various RAG systems using Tonic Validate, a RAG evaluation and benchmarking platform. The post RAG evaluation series: validating the RAG performance of Amazon Titan vs Cohere ...

Backline Emerges From Stealth With $9M in Funding for Vulnerability Remediation Platform

Backline has emerged from stealth mode with an autonomous security remediation platform and $9 million in seed funding. The post Backline Emerges From Stealth With $9M in Funding for Vulnerability Remediation Platform appeared first on SecurityWeek.

Cyber Insights 2025: Cyberinsurance – The Debate Continues

Better risk management could lead to reduced premiums on top of value for money, making cyberinsurance a silent driver for improved cybersecurity. The post Cyber Insights 2025: Cyberinsurance – The Debate Continues appeared first on SecurityWeek.

Cybercrime forums Cracked and Nulled seized, operators arrested

Law enforcement from Germany, Australia, Spain, Greece, Romania, Italy, France and the USA have seized and shut down Cracked and Nulled, the two largest cybercrime forums in the world. The takedown notice (Source: German Federal Criminal Police ...

Why the Fight Against Fraud Begins with Data-Centric Security

The cybercrime underground represents a vast marketplace for stolen data, hacking tools and nefarious knowledge. The steady stream of breached data that is pumped in usually gets recycled into fraud. That stream is more accurately described today ...

Cybersecurity GRC (Governance, Risk, Compliance) | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Cybersecurity GRC (Governance, Risk, Compliance) | Kovrr appeared first on Security Boulevard.

Doppler announces integration with Datadog to streamline security and monitoring

San Francisco, United States / California, 30th January 2025, CyberNewsWire The post Doppler announces integration with Datadog to streamline security and monitoring appeared first on Security Boulevard.

Seraphic Attracts $29M Investment to Chase Enterprise Browser Business

Seraphic Security banks $29 million investment as VCs remain bullish on startups with security-themed browsers for corporate defenders. The post Seraphic Attracts $29M Investment to Chase Enterprise Browser Business appeared first on SecurityWeek.

DEF CON 32 -The Risk and Reward of Distributed Industrial Control

Author/Presenter: Joe Slowik Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs

Attackers may have leveraged vulnerabilities in the SimpleHelp remote monitoring and management solution to gain initial access to healthcare organizations. About the vulnerabilities On January 13, 2025, Horizon3.ai researchers revealed their ...

DataDome Expands GraphQL Protection Across 7 Integrations

DataDome now offers GraphQL support and protections across 7 popular integrations, ensuring robust cyberfraud protection without compromising performance. The post DataDome Expands GraphQL Protection Across 7 Integrations appeared first on ...

Finding Higher Ground: How Zero-Shot Security Joined Tidal Cyber

Starting a company is hard. Doing it solo is harder. And like many other people in cybersecurity, for me, imposter syndrome is real.  The post Finding Higher Ground: How Zero-Shot Security Joined Tidal Cyber appeared first on Security Boulevard.

SquareX Discloses “Browser Syncjacking” , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk

Palo Alto, USA, 30th January 2025, CyberNewsWire The post SquareX Discloses “Browser Syncjacking” , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk appeared first on Security Boulevard.