Application Security News and Articles
Forty-one cybersecurity merger and acquisition (M&A) deals were announced in June 2025.
The post Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 appeared first on SecurityWeek.
A report published this week by Netcraft, a provider of a platform for combating phishing attacks, finds that large language models (LLMs) might not be a reliable source when it comes to identifying where to log in to various websites.
The post ...
As Kelly Benefits’s investigation into a recent data breach progressed, the number of impacted individuals continued to grow.
The post Kelly Benefits Data Breach Impacts 550,000 People appeared first on SecurityWeek.
Qantas has suffered a cyber incident that has lead to a data breach. “The incident occurred when a cyber criminal targeted a call centre and gained access to a third-party customer servicing platform,” the Australian airline announced ...
The future of API security is not just about better firewalls — it is about smarter governance, automation and visibility at scale.
The post API Sprawl Can Trip Up Your Security, Big Time appeared first on Security Boulevard.
A vulnerability in the Forminator WordPress plugin allows attackers to delete arbitrary files and take over impacted websites.
The post Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover appeared first on SecurityWeek.
When you design agentic AI with governance at the core, you stay ahead of risk and avoid reactive fire drills.
The post Your Agentic AI Governance Checklist: 7 Non-Negotiables to Fix Governance Blind Spots appeared first on Security Boulevard.
CISA says two more vulnerabilities in the messaging application TeleMessage TM SGNL have been exploited in the wild.
The post CISA Warns of Two Exploited TeleMessage Vulnerabilities appeared first on SecurityWeek.
The International Criminal Court (ICC) has detected and contained a sophisticated and targeted cyberattack.
The post Cyberattack Targets International Criminal Court appeared first on SecurityWeek.
With empowered advocates and continuous measurement, teams can navigate the fine line between compliance, rule adherence and creative freedom.
The post Guiding Global Teams: Fostering Compliance and Creativity appeared first on Security Boulevard.
Australian airline Qantas says personal information stolen from systems hosting the service records of 6 million customers.
The post Qantas Data Breach Impacts Up to 6 Million Customers appeared first on SecurityWeek.
Businesses must take the threat of identity-based attacks seriously and adapt their cybersecurity practices to address this challenge.
The post How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ ...
Exabeam announced a major expansion of its integrated multi-agent AI system Exabeam Nova that now equips security leaders with a real-time strategic planning engine and boardroom communication tool. The Exabeam Nova Advisor Agent is the AI ...
Scamnetic releaseed KnowScam 2.0, its flagship product for scam protection and digital identity verification. KnowScam 2.0 builds on everything users already trust — now with major upgrades, including an enhanced three-point scoring system, the ...
Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut. With all that noise, it’s easy to get distracted. But at the end of the day, the goal stays the same: protect ...
In this Help Net Security interview, Alexander Clemm, Corp GRC Lead, Group CISO, and BCO at Riverty, shares how the GRC landscape for FinTechs has matured in response to tighter regulations and global growth. He discusses the impact of frameworks ...
Secretless Broker is an open-source connection broker that eliminates the need for client applications to manage secrets when accessing target services like databases, web services, SSH endpoints, or other TCP-based systems. Secretless Broker ...
The Apricorn Aegis Secure Key 3NXC is a 256-bit AES XTS hardware-encrypted flash drive with a USB-C connector. It is available in storage capacities ranging from 4GB to 512GB and holds FIPS 140-2 Level 3 validation. The device is OS-agnostic, ...
Not long ago, travelers worried about bad weather. Now, they’re worried the rental they booked doesn’t even exist. With AI-generated photos and fake reviews, scammers are creating fake listings so convincing, people are losing money before ...
The DOJ announced a far-reaching operation that aimed to knock out a substantial number of North Korean IT worker scams that have victimized more than 100 U.S. companies that unwittingly hired North Korean operatives as remote workers, who then ...