Application Security News and Articles


OpenText Adds AI Threat Detection Module to Platform

OpenText added a threat detection module to its core platform that makes use of artificial intelligence to more accurately surface anomalies. The post OpenText Adds AI Threat Detection Module to Platform appeared first on Security Boulevard.

Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation

A group of financial organizations is asking CISA to rescind and reissue its proposed implementation of CIRCIA. The post Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation appeared first on SecurityWeek.

The Hidden Risks of Digital Currency: Navigating Cybersecurity in the Age of Web3

As the digital era ushers in the proliferation of Web3 technologies, the security of digital assets becomes a paramount concern not just for investors but for anyone venturing into the realm of digital currencies. The shift from government-backed ...

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

S04 EP 03: Dave and Dr. Zero Trust weigh the difference between delivering refined news and raw perspective, hitting critical mass for AI, and the current political environment. The post Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. ...

BadBox Botnet Powered by 1 Million Android Devices Disrupted

A second iteration of the BadBox botnet that affected over one million Android devices has been partially disrupted. The post BadBox Botnet Powered by 1 Million Android Devices Disrupted appeared first on SecurityWeek.

AIceberg Gets $10 Million in Seed Funding for AI Security Platform

AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI.  The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek.

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks

Scans show that tens of thousands of VMware ESXi instances are affected by CVE-2025-22224 and other vulnerabilities disclosed recently as zero-days. The post Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks appeared first ...

Riskified Adaptive Checkout mitigates fraud for ecommerce merchants

Riskified launched Adaptive Checkout, a solution designed to drive higher conversion rates by not falsely declining good orders while also mitigating fraud for ecommerce merchants. This configuration of Riskified’s Chargeback Guarantee product ...

AI, Web Scraping and the Transformation of Data Privacy: What the EDPB’s Rulings Mean for Businesses

Web scraping is no longer just about collecting raw data. AI transforms this data, embedding it into machine learning models that can generate insights, predict behaviors and even infer new information about individuals in ways that were never ...

BreachRx Brings Generative AI to Security Incident Management

BreachRx this week added generative artificial intelligence (GenAI) capabilities to a security incident platform that promises to streamline workflows across all the stakeholders that need to collaborate. The post BreachRx Brings Generative AI to ...

How Does FCPA Compliance Impact Your Business

Enacted in 1977, the Foreign Corrupt Practices Act (FCPA) was designed to curb corruption by prohibiting U.S. companies, subsidiaries, and representatives from offering bribes to foreign officials to gain or retain business. What began as a ...

How to prevent data leakage in collaboration tools like Slack and Teams

In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the impossibility of communicating in person. So, tools like Slack, Microsoft Teams, ...

The CISO’s bookshelf: 10 must-reads for security leaders

Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication, and more. Why CISOs Fail, 2nd Edition Author: Barak Engel Barak Engel expands on the ideas from ...

89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of ...

How Unified SSO reduces complexity and enhances security

Large enterprises operate complex IT environments, balancing legacy on-premises applications with modern cloud services. Over time, they have accumulated multiple identity providers (IDPs) like Microsoft Entra ID, Okta, and Ping Identity to ...

What are the latest trends in NHI protection for CIOs?

Are CIOs Prepared for the Rising NHI Trends? When the cloud environment evolves to deliver seamless business solutions, it brings along unique challenges in terms of data security. Needless to say, managing Non-Human Identities (NHIs) has become ...

What are the risks of unmanaged NHIs in enterprise environments?

Are Unmanaged Non-Human Identities (NHIs) Jeopardizing Your Enterprise Environment? With cloud-native applications, AI technologies, and IoT devices permeating modern enterprises, Non-Human Identities (NHIs) have become critical components. But ...

How can executive teams ensure NHI compliance with industry standards?

Why is Compliance Crucial for Non-Human Identities? Executive teams often face an array of complex challenges. One such challenge concerns Non-Human Identities (NHIs) compliance. So, why is it essential to get this right? Non-Human Identities are ...

Building a Shield of Defensibility: How CISOs Can Protect Their Careers and Organizations

In today’s fast-evolving regulatory landscape, Chief Information Security Officers (CISOs) are under immense pressure. With increasing legal scrutiny, evolving SEC regulations, and rising personal liability concerns, CISOs must take ...

PowerSchool Hack; Takedowns and Arrests and Leaks, Oh My!; and ITRC Breach Report Findings 

There’s been quite a few hacks, takedowns-arrests-leaks, and insights from the Identity Theft Resource Center (ITRC) 2024 Breach Report.  Dive into the most pressing recent stories on data leaks, cybercrime, and the dark web with security ...