Application Security News and Articles


How to Check Email Deliverability?

Struggling with emails landing in spam? Learn how to check email deliverability effectively, troubleshoot common issues, and improve inbox placement. The post How to Check Email Deliverability? appeared first on Security Boulevard.

Passkeys vs. Passwords: A Detailed Comparison

Explore the evolving landscape of digital security as we delve into the distinctions between passkeys and passwords. Understand their unique features, advantages, and potential drawbacks to determine the optimal choice for safeguarding your ...

Emulating the Sophisticated Russian Adversary Seashell Blizzard

AttackIQ has released a new assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the sabotage-motivated Russian adversary Seashell Blizzard. The post Emulating the Sophisticated ...

Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering

Adaptive is pitching a security platform designed to replicate real-world attack scenarios through AI-generated deepfake simulations.  The post Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering appeared first on ...

Vulnerabilities Expose Jan AI Systems to Remote Manipulation

Vulnerabilities in open source ChatGPT alternative Jan AI expose systems to remote, unauthenticated manipulation. The post Vulnerabilities Expose Jan AI Systems to Remote Manipulation appeared first on SecurityWeek.

DMARC Adoption among APAC’s Higher Education Sector

On the heels of our DMARC adoption research in Europe’s higher education sector, we’re taking a look to see how schools in the Asia Pacific region are faring with their email security. The post DMARC Adoption among APAC’s Higher Education ...

Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion

Cyberhaven bags $100 million in funding at a billion-dollar valuation, a sign that investors remain bullish on data security startups. The post Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion appeared first on SecurityWeek.

Strata Identity CEO to Present Session on Identity Resilience at CyberArk Impact 2025 Conference

Co-author of SAML federation standard Eric Olden will explain how to architect IAM for uninterrupted operation during identity provider outages BOULDER, Colo., April 2, 2025 — Strata Identity, the Identity Orchestration company, today announced ...

The Future of Security Operations: Why Next-Gen SIEM is a Necessity

Transitioning to a modern SIEM model can achieve significant cost savings while enhancing security visibility and operational efficiency.  The post The Future of Security Operations: Why Next-Gen SIEM is a Necessity appeared first on Security ...

Modern SecOPs TCO Analysis: The Economic Case for Unified Security Platforms

In today’s rapidly evolving threat landscape, organizations face mounting challenges with traditional, fragmented security approaches. This analysis examines the total cost of ownership (TCO) of conventional security infrastructures compared to ...

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor

The rise of zero-knowledge threat actors powered by AI marks a turning point in the business of cybercrime where sophisticated attacks are no longer confined to skilled attackers. The post AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor ...

Total Cost of Ownership (TCO) Analysis: Seceon Platform vs. Siloed Cybersecurity Solutions for a 5,000+ Staff Hospital in the USA

Cyber threats targeting healthcare organizations are at an all-time high, with ransomware, insider threats, medical device exploits, and data breaches putting patient data and hospital operations at risk. To defend against these threats, ...

Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses

DeepMind found that current AI frameworks are ad hoc, not systematic, and fail to provide defenders with useful insights. The post Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses appeared first on SecurityWeek.

Travelers Cyber Risk Services reduces the risk of a cyberattack

The Travelers Companies announced Travelers Cyber Risk Services, a suite of capabilities added to all cyber liability policies designed to help lower both the risk of a cyberattack and the cost to recover from one. In addition to always-on threat ...

North Korea’s IT Operatives Are Exploiting Remote Work Globally

The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations. The post North Korea’s IT Operatives Are Exploiting Remote Work ...

How to map and manage your cyber attack surface with EASM

In today’s digital landscape, understanding your organization’s attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate the cyber-risks hiding in modern attack surfaces, it’s important ...

Utimaco releases Quantum Protect solution

Utimaco launched Quantum Protect, the Post Quantum Cryptography application package for its u.trust General Purpose HSM (Hardware Security Modules) Se-Series. The advent of quantum computers poses a threat to today’s cryptographic ...

What is subdomain hijacking?

Subdomain hijacking is a cybersecurity risk where attackers exploit abandoned DNS records to take control of legitimate subdomains. This can lead to phishing attacks, credential theft, and malware distribution. Organizations must regularly audit ...

Unhealthy Cybersecurity Postures

Updates from Enzoic’s Threat Research Team In the last Enzoic research update, we briefly discussed the travails of the healthcare industry and their challenges in establishing a successful cybersecurity posture in the face of a salivating ...

ImageRunner Flaw Exposed Sensitive Information in Google Cloud

Google has patched a Cloud Run vulnerability dubbed ImageRunner that could have been exploited to gain access to sensitive data. The post ImageRunner Flaw Exposed Sensitive Information in Google Cloud appeared first on SecurityWeek.