Application Security News and Articles


Seemplicity reduces time to remediation with AI-powered capabilities

Seemplicity unveiled a major product release packed with AI-powered capabilities to cut through noise, facilitate fixing teams, and reduce time to remediation. This latest release introduces AI Insights, Detailed Remediation Steps, and Smart ...

BitRaser secures data erasure on macOS devices

BitRaser launched its Integrated Mac Eraser and Diagnostics Tool, a software designed to streamline IT asset disposition (ITAD) processes. The tool allows ITAD providers to simultaneously perform secure data erasure and comprehensive hardware ...

Darktrace Acquires Mira Security

AI-powered cybersecurity company Darktrace has acquired network traffic visibility provider Mira Security. The post Darktrace Acquires Mira Security appeared first on SecurityWeek.

Seemplicity Leverages AI to Optimize Cybersecurity Remediation Efforts

Seemplicity today added artificial intelligence (AI) capabilities to its platform for managing cybersecurity remediations that promise to make teams more efficient. The post Seemplicity Leverages AI to Optimize Cybersecurity Remediation Efforts ...

Dior Says Personal Information Stolen in Cyberattack

Dior says hackers accessed personal information in a January 2025 intrusion. No payment information was compromised. The post Dior Says Personal Information Stolen in Cyberattack appeared first on SecurityWeek.

UK Sanctions Russian Hackers Tied to Assassination Attempts

The UK government has sanctioned three Russian APTs and 18 individuals for their involvement in cyber operations against Ukraine, NATO allies, and EU. The post UK Sanctions Russian Hackers Tied to Assassination Attempts appeared first on ...

ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets

More details emerged on the ToolShell zero-day attacks targeting SharePoint servers, but confusion remains over the vulnerabilities. The post ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets appeared ...

Product showcase: iStorage diskAshur PRO3

Data breaches seem to pop up in the news every other week, so it’s no surprise that keeping sensitive information safe has jumped to the top of the priority list for just about every industry. Hardware-encrypted drives like the iStorage ...

What the law says about your next data breach

In this Help Net Security video, Chad Humphries, Solution Consultant, Networks & Cyber Security at Rockwell Automation, explores how cyber risk quantification is becoming essential for modern organizations. He breaks down global legal ...

Enterprise printer security fails at every stage

Printer platform security is often overlooked in enterprise security strategies, creating security gaps, according to HP Wolf Security. By addressing security at every stage, organizations can strengthen their defenses and ensure their print ...

As AI tools take hold in cybersecurity, entry-level jobs could shrink

A new survey from ISC2 shows that nearly a third of cybersecurity professionals are already using AI security tools, and many others are close behind. So far, 30 percent of professionals say they’ve already integrated AI into their operations, ...

Cybersecurity jobs available right now: July 22, 2025

CISO Kbrw | France | Hybrid – View job details As a CISO, you will develop risk management processes aligned with company goals and enforce cybersecurity policies compliant with ISO27001, NIS2, and SOC2. You will handle ...

Hackers Exploiting Microsoft Flaw to Attack Governments, Businesses

Hackers are exploiting a significant Microsoft vulnerability chain that allows them gain control of on-premises SharePoint servers, steal cryptographic keys, and access Windows applications like Outlook, Teams, and OneDrive. It also gives them ...

Iranian APT Targets Android Users With New Variants of DCHSpy Spyware

Iranian APT MuddyWater has been using new versions of the DCHSpy Android surveillance tool since the beginning of the conflict with Israel. The post Iranian APT Targets Android Users With New Variants of DCHSpy Spyware appeared first on SecurityWeek.

Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)

Unknown attackers have exploited a vulnerability (CVE-2025‑54309) in the CrushFTP enterprise file-transfer server solution to gain administrative access to vulnerable deployments. It’s currently unclear what the attackers are using this ...

Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025‑54309)

Unknown attackers have exploited a vulnerability (CVE-2025‑54309) in the CrushFTP enterprise file-transfer server solution to gain administrative access to vulnerable deployments. It’s currently unclear what the attackers are using this ...

Marketing, Law Firms Say Data Breaches Impact Over 200,000 People

Cierant Corporation and Zumpano Patricios independently disclosed data breaches, each impacting more than 200,000 individuals. The post Marketing, Law Firms Say Data Breaches Impact Over 200,000 People appeared first on SecurityWeek.

The Overlooked Risk in AI Infrastructure: Physical Security 

As artificial intelligence (AI) accelerates across industries from financial modeling and autonomous vehicles to medical imaging and logistics optimization, one issue consistently flies under the radar: Physical security.  The post The ...

Securing Revenue Data in the Cloud: Compliance and Trust in a Digital Age 

With cyberthreats intensifying and regulatory bodies tightening oversight, securing revenue data in the cloud is essential.  The post Securing Revenue Data in the Cloud: Compliance and Trust in a Digital Age  appeared first on Security Boulevard.

Surveillance Firm Bypasses SS7 Protections to Retrieve User Location

A surveillance company was caught using an SS7 bypass technique to trick wireless carriers into divulging users’ locations. The post Surveillance Firm Bypasses SS7 Protections to Retrieve User Location appeared first on SecurityWeek.