Application Security News and Articles


Cybersecurity M&A Roundup: 41 Deals Announced in June 2025

Forty-one cybersecurity merger and acquisition (M&A) deals were announced in June 2025. The post Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 appeared first on SecurityWeek.

Report Finds LLMs Are Prone to Be Exploited by Phishing Campaigns

A report published this week by Netcraft, a provider of a platform for combating phishing attacks, finds that large language models (LLMs) might not be a reliable source when it comes to identifying where to log in to various websites. The post ...

Kelly Benefits Data Breach Impacts 550,000 People

As Kelly Benefits’s investigation into a recent data breach progressed, the number of impacted individuals continued to grow.  The post Kelly Benefits Data Breach Impacts 550,000 People appeared first on SecurityWeek.

Qantas data breach could affect 6 million customers

Qantas has suffered a cyber incident that has lead to a data breach. “The incident occurred when a cyber criminal targeted a call centre and gained access to a third-party customer servicing platform,” the Australian airline announced ...

API Sprawl Can Trip Up Your Security, Big Time

The future of API security is not just about better firewalls — it is about smarter governance, automation and visibility at scale.  The post API Sprawl Can Trip Up Your Security, Big Time appeared first on Security Boulevard.

Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover

A vulnerability in the Forminator WordPress plugin allows attackers to delete arbitrary files and take over impacted websites. The post Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover appeared first on SecurityWeek.

Your Agentic AI Governance Checklist: 7 Non-Negotiables to Fix Governance Blind Spots 

When you design agentic AI with governance at the core, you stay ahead of risk and avoid reactive fire drills. The post Your Agentic AI Governance Checklist: 7 Non-Negotiables to Fix Governance Blind Spots  appeared first on Security Boulevard.

CISA Warns of Two Exploited TeleMessage Vulnerabilities 

CISA says two more vulnerabilities in the messaging application TeleMessage TM SGNL have been exploited in the wild. The post CISA Warns of Two Exploited TeleMessage Vulnerabilities  appeared first on SecurityWeek.

Cyberattack Targets International Criminal Court

The International Criminal Court (ICC) has detected and contained a sophisticated and targeted cyberattack. The post Cyberattack Targets International Criminal Court appeared first on SecurityWeek.

Guiding Global Teams: Fostering Compliance and Creativity

With empowered advocates and continuous measurement, teams can navigate the fine line between compliance, rule adherence and creative freedom. The post Guiding Global Teams: Fostering Compliance and Creativity appeared first on Security Boulevard.

Qantas Data Breach Impacts Up to 6 Million Customers 

Australian airline Qantas says personal information stolen from systems hosting the service records of 6 million customers. The post Qantas Data Breach Impacts Up to 6 Million Customers  appeared first on SecurityWeek.

How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ Greatest Advantage

Businesses must take the threat of identity-based attacks seriously and adapt their cybersecurity practices to address this challenge. The post How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ ...

Exabeam Nova Advisor Agent equips security leaders with a real-time strategic planning engine

Exabeam announced a major expansion of its integrated multi-agent AI system Exabeam Nova that now equips security leaders with a real-time strategic planning engine and boardroom communication tool. The Exabeam Nova Advisor Agent is the AI ...

Scamnetic KnowScam 2.0 helps consumers detect every type of scam

Scamnetic releaseed KnowScam 2.0, its flagship product for scam protection and digital identity verification. KnowScam 2.0 builds on everything users already trust — now with major upgrades, including an enhanced three-point scoring system, the ...

Cybersecurity essentials for the future: From hype to what works

Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut. With all that noise, it’s easy to get distracted. But at the end of the day, the goal stays the same: protect ...

How FinTechs are turning GRC into a strategic enabler

In this Help Net Security interview, Alexander Clemm, Corp GRC Lead, Group CISO, and BCO at Riverty, shares how the GRC landscape for FinTechs has matured in response to tighter regulations and global growth. He discusses the impact of frameworks ...

Secretless Broker: Open-source tool connects apps securely without passwords or keys

Secretless Broker is an open-source connection broker that eliminates the need for client applications to manage secrets when accessing target services like databases, web services, SSH endpoints, or other TCP-based systems. Secretless Broker ...

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC

The Apricorn Aegis Secure Key 3NXC is a 256-bit AES XTS hardware-encrypted flash drive with a USB-C connector. It is available in storage capacities ranging from 4GB to 512GB and holds FIPS 140-2 Level 3 validation. The device is OS-agnostic, ...

Scammers are trick­ing travelers into booking trips that don’t exist

Not long ago, travelers worried about bad weather. Now, they’re worried the rental they booked doesn’t even exist. With AI-generated photos and fake reviews, scammers are creating fake listings so convincing, people are losing money before ...

U.S. Target North Korean IT Worker Scams with Raids, Indictments

The DOJ announced a far-reaching operation that aimed to knock out a substantial number of North Korean IT worker scams that have victimized more than 100 U.S. companies that unwittingly hired North Korean operatives as remote workers, who then ...