Application Security News and Articles


New York SHIELD Act: Everything You Need to Know for Compliance

New York’s Privacy Laws: A Legacy and a Challenge New York is a leader in finance, culture, and technology. Less than a decade ago, it was also a forerunner in privacy and cybersecurity regulation. As the home of Wall Street and a hub for ...

Indian Stock Broker Angel One Discloses Data Breach

Angel One says client information was compromised in a data breach involving its AWS account. The post Indian Stock Broker Angel One Discloses Data Breach appeared first on SecurityWeek.

Black Basta Leak Offers Glimpse Into Group’s Inner Workings 

A massive hoard of internal chats has been leaked from Black Basta, rivalling the Conti leaks of late February 2022. The post Black Basta Leak Offers Glimpse Into Group’s Inner Workings  appeared first on SecurityWeek.

DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation

If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy. The post DOGE Access to Personal Information and The Difficulty of ...

DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation

If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy. The post DOGE Access to Personal Information and The Difficulty of ...

Outpost24 introduces CyberFlex to streamline attack surface management and pen testing

Outpost24 has launched Outpost24 CyberFlex, a comprehensive application security solution that combines Attack Surface Management (ASM) and Penetration Testing as a Service (PTaaS) to manage and secure an organization’s external-facing ...

The all-or-nothing fallacy: a roadblock to better cybersecurity

In cybersecurity, perfection is a myth. Yet, time and again, we encounter arguments rooted in an "all-or-nothing" mentality - the flawed belief that if a security measure isn’t 100% foolproof, it isn’t worth implementing. This fallacy, which ...

Top Data Breaches of February 2025

February 2025 saw a series of high-impact data breaches affecting industries ranging from healthcare and finance to cloud services and government agencies. These incidents exposed sensitive data, disrupted operations, and... The post Top Data ...

Top Data Breaches of February 2025

February 2025 saw a series of high-impact data breaches affecting industries ranging from healthcare and finance to cloud services and government agencies. These incidents exposed sensitive data, disrupted operations, and... The post Top Data ...

Top CVEs & Vulnerabilities February 2025

Cyber threats don’t take a break, and February 2025 proved just that. This month, we saw some serious vulnerabilities that could cause major problems if not patched quickly. From remote... The post Top CVEs & Vulnerabilities February 2025 ...

Top CVEs & Vulnerabilities February 2025

Cyber threats don’t take a break, and February 2025 proved just that. This month, we saw some serious vulnerabilities that could cause major problems if not patched quickly. From remote... The post Top CVEs & Vulnerabilities February 2025 ...

Industry Moves for the week of March 3, 2025 - SecurityWeek

Explore industry moves and significant changes in the industry for the week of March 3, 2025. Stay updated with the latest industry trends and shifts.

Palo Alto Networks provides AI-powered security to 5G enterprise customers

Palo Alto Networks introduced today Prisma SASE 5G, delivering the functionality and capabilities customers need to stay protected for the future state of mobility and connectivity. The company also announced the expansion of its private 5G ...

Cybersecurity in Development: Protecting Your Code from Digital Villains

Picture this: you’ve spent months building the perfect app. It’s sleek, it’s fast, and it’s got more features than a Swiss Army knife. But…Continue reading on Stackademic »

Commix: Open-source OS command injection exploitation tool

Commix is an open-source penetration testing tool designed to automate the detection and exploitation of command injection vulnerabilities, streamlining security assessments for researchers and ethical hackers. Commix features Easy to use: Commix ...

Google Calendar Spoofing: How Attackers Use It for Phishing Scams

Google Calendar spoofing is the latest phishing tactic tricking users with fake invites. Learn how it works and how to protect yourself from these scams. The post Google Calendar Spoofing: How Attackers Use It for Phishing Scams first appeared on ...

Google Calendar Spoofing: How Attackers Use It for Phishing Scams

Google Calendar spoofing is the latest phishing tactic tricking users with fake invites. Learn how it works and how to protect yourself from these scams. The post Google Calendar Spoofing: How Attackers Use It for Phishing Scams appeared first on ...

Zero Trust Network Access: Ending Implicit Trust in Cybersecurity

Zero Trust Network Access (ZTNA) revolutionizes cybersecurity by eliminating implicit trust, reducing breaches, and enhancing compliance. The post Zero Trust Network Access: Ending Implicit Trust in Cybersecurity first appeared on Security ...

Zero Trust Network Access: Ending Implicit Trust in Cybersecurity

Zero Trust Network Access (ZTNA) revolutionizes cybersecurity by eliminating implicit trust, reducing breaches, and enhancing compliance. The post Zero Trust Network Access: Ending Implicit Trust in Cybersecurity appeared first on Security Boulevard.

Review: The Chief AI Officer’s Handbook

The Chief AI Officer’s Handbook is a comprehensive resource for professionals navigating AI implementation and strategy. It is particularly valuable for Chief AI Officers (CAIOs), offering guidance on defining their role and executing AI-driven ...