Application Security News and Articles


Western Alliance Bank Discloses Data Breach Linked to Cleo Hack

The personal information of 22,000 Western Alliance Bank customers was stolen in a data breach linked to Cl0p’s hacking of the Cleo file transfer tool. The post Western Alliance Bank Discloses Data Breach Linked to Cleo Hack appeared first on ...

US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity

US representatives and senators have reintroduced a bipartisan bill to support the cybersecurity of small water and wastewater utilities. The post US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity appeared first on SecurityWeek.

“My Vas Pokhoronim!”

CISA, in collaboration with the FBI and NSA, identified and attributed multiple attacks to Russian entities, emphasizing the risks posed by state-backed Advanced Persistent Threats (APTs). The post “My Vas Pokhoronim!” appeared first ...

FBI: Free file converter sites and tools deliver malware

Malware peddlers are increasingly targeting users who are searching for free file converter services (websites) and tools, the FBI’s Denver Field Office has warned earlier this month. “To conduct this scheme, cyber criminals across ...

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?

Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama: Abstract: In human factor fields such as human-computer interaction (HCI) and psychology, ...

ChatGPT Vulnerability Exploited Against US Government Organizations

A year-old vulnerability in ChatGPT is being exploited against financial entities and US government organizations. The post ChatGPT Vulnerability Exploited Against US Government Organizations appeared first on SecurityWeek.

Penetration Testing vs. Vulnerability Assessment: What’s the Difference and Which One Do You Need?

Discover the differences between pen testing and vulnerability assessments, and how both can boost your cybersecurity defenses. The post Penetration Testing vs. Vulnerability Assessment: What’s the Difference and Which One Do You Need? appeared ...

The Future of Enterprise Security: AI-powered Lateral Defense in a Dynamic Threat Landscape

Attackers increasingly leverage AI-powered exploitation and can quickly identify vulnerable systems, infiltrate networks unnoticed and move laterally to compromise critical assets. The post The Future of Enterprise Security: AI-powered Lateral ...

CISO Global launches AI-driven cloud security solution

CISO Global launched of CISO Edge, its next-generation AI-driven cloud security solution, now available to existing customers and channel partners. Built to meet the growing demand for enterprise-grade cybersecurity, CISO Edge delivers ...

Top 10 Non-Human Identities Risks by OWASP

The Open Worldwide Application Security Project (OWASP) has just unveiled its Top 10 Non-Human Identities (NHI) Risks for 2025. While OWASP has long provided resources on application and API security, none have specifically addressed the unique ...

How financial institutions can minimize their attack surface

In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on balancing compliance with agility, lessons from regulatory audits, and ...

Hackers target AI and crypto as software supply chain risks grow

The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically target AI and cryptocurrency development pipelines, ...

Cybersecurity jobs available right now: March 18, 2025

Application Security Expert monday.com | United Kingdom | Hybrid – View job details As an Application Security Expert, you will provide guidance on security best practices and compliance, and undertake security testing. Develop ...

Unlocking Data Control Across Regions: Oracle and Thales Enhance CipherTrust Cloud Key Management for OCI Vault EKMS

Unlocking Data Control Across Regions: Oracle and Thales Enhance CipherTrust Cloud Key Management for OCI Vault EKMS madhav Tue, 03/18/2025 - 04:20 Oracle and Thales are excited to announce CipherTrust Cloud Key Management’s (CCKM) support ...

UK NHS API Flaw Exposes Critical Mobile Security Risks

A recent vulnerability discovered in an UK National Health Service HS API has once again highlighted the risks associated with insecure mobile application programming interfaces (APIs). The flaw reportedly allowed unauthorized access to sensitive ...

SOAR vs SIEM: What’s the Difference?

The post SOAR vs SIEM: What’s the Difference? appeared first on AI Security Automation. The post SOAR vs SIEM: What’s the Difference? appeared first on Security Boulevard.

Ontic Named Frost and Sullivan’s Company of the Year for Revolutionizing Security Technology 

Learn how our commitment to innovation, excellence, and client success made this achievement possible The security industry is undergoing a profound transformation. The convergence of digital and physical threats, the overwhelming surge of data, ...

Celebrating Women in Cybersecurity for Women’s History Month

Roopa Makam, Prekshya Basnet, and Nicole Miller have forged unique paths in cybersecurity, shaping the industry with their expertise and perspectives. They share their career journeys, challenges, and insights on fostering inclusivity—from ...

News alert: Link11’s research shows DDoS attacks are more targeted — and doubled — year-over-year

Frankfurt, Germany, Mar. 17, 2025, CyberNewswire — Cyberattacks are no longer an abstract threat – they dominate risk planning for companies worldwide. The latest Link11 European Cyber Report shows an alarming trend: the number of DDoS ...

Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response

Morpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. The post Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response ...