Application Security News and Articles


Building Automation Protocols Increasingly Targeted in OT Attacks: Report

Industrial automation protocols continue to be the most targeted in OT attacks, but building automation systems have been increasingly targeted.  The post Building Automation Protocols Increasingly Targeted in OT Attacks: Report appeared first ...

Hidden in Plain Sight: PDF Mishing Attack

As part of our ongoing mission to identify emerging threats to mobile security, our zLabs team has been actively tracking a phishing campaign impersonating the United States Postal Service (USPS) which is exclusively targeting mobile devices. The ...

Exabeam Extends Generative AI Reach to LogRhythm SIEM

Exabeam has extended the reach of its generative artificial intelligence (GenAI) capabilities to its LogRhythm security information event management platform which is designed to be deployed by internal IT teams. The post Exabeam Extends ...

Silobreaker Tickets empowers intelligence teams with AI-augmented tools

Silobreaker launched Tickets, a workflow management feature designed to elevate the efficiency, collaboration and impact of intelligence teams. Tickets is built with native support for Threat Intelligence teams, offering robust capabilities to ...

Git Vulnerabilities Led to Credentials Exposure

Vulnerabilities in Git’s credential retrieval protocol could have allowed attackers to compromise user credentials. The post Git Vulnerabilities Led to Credentials Exposure appeared first on SecurityWeek.

Humans are the Beating Heart of the Autonomous SOC

Ultimately, the goal of the autonomous SOC is to create a more efficient and effective security environment where human analysts and AI work together to achieve a higher level of security than either could achieve alone. Working together, each ...

Do You Know What Your Assets Are? 

Asset awareness is the first step in understanding your complete security posture. If you don’t know what assets you own, how can you protect them?  The post Do You Know What Your Assets Are?  appeared first on Security Boulevard.

Change Healthcare Data Breach Impact Grows to 190 Million Individuals

The impact of the Change Healthcare ransomware-caused data breach has increased from 100 million to 190 million individuals. The post Change Healthcare Data Breach Impact Grows to 190 Million Individuals appeared first on SecurityWeek.

Are Third-Party Risk Management Solutions Effective Enough?  

A modern EASM solution offers more by incorporating meaningful first-party and third-party cyber risk insights than conventional TPRM solutions. The post Are Third-Party Risk Management Solutions Effective Enough?   appeared first on Security ...

Data Privacy Day 2025: A Chance to Take Control of Your Data

Data Privacy Day 2025: A Chance to Take Control of Your Data madhav Mon, 01/27/2025 - 09:19 Trust is the cornerstone of every successful relationship between businesses and their customers. On this Data Privacy Day, we reflect on the pivotal ...

DMARC Email Security: A Guide to Protecting Your Domain 

Learn how DMARC email security can protect your brand, improve deliverability, and prevent phishing attacks. Get expert advice and best practices. The post DMARC Email Security: A Guide to Protecting Your Domain  appeared first on Security ...

Industry Moves for the week of January 27, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of January 27, 2025. Stay updated with the latest industry trends and shifts.

AI security posture management will be needed before agentic AI takes hold

As I’m currently knee deep in testing agentic AI in all its forms, as well as new iterations of current generative AI models such as OpenAI’s O1, the complexities of securing AI bot frameworks for enterprise security teams are beginning to ...

Don’t let these open-source cybersecurity tools slip under your radar

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber attacks, monitor and detect suspicious activities across your network. Am I Isolated: ...

Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed

In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted ...

Cyber trends set to influence business strategies

Diligent convened a group of 65 board members, C-suite executives, and leading subject matter experts to explore topics shaping the future of business: generative AI, cybersecurity and data privacy, geopolitical risk, and financial fraud and ...

How to use Apple’s App Privacy Report to monitor data tracking

The App Privacy Report, which Apple introduced in iOS 15.2, allows users to monitor how apps access data and interact with third-party services. The report provides an in-depth analysis of the types of sensitive data accessed by apps, the ...

Innovative Approaches to Secrets Scanning

Is Traditional Cybersecurity Enough in the Age of Automation? Imagine this. You’re in charge of your company’s cybersecurity, and you’ve invested in the best protection money can buy. But a data breach happens, and you’re left wondering ...

Scaling Security with Automated Identity Management

How Crucial is Automated Identity Management in Scaling Security? There’s an ever-increasing need for advanced cybersecurity measures. Organizations, especially those operating in the cloud, can no longer afford to ignore automated identity ...

Empowering Cloud Compliance with Seamless Security

Why are Non-Human Identities (NHIs) Crucial for Seamless Security? Can you imagine a smooth security system that leaves no stone unturned? Non-human identities (NHIs) and secrets management play a significant role in creating an empowered ...