Application Security News and Articles
Getting breached by two separate and likely unconnected cyber attack groups is a nightmare scenario for any organization, but can result in an unexpected silver lining: the noisier intrusion can draw attention to a far stealthier threat that ...
Names, addresses, email addresses, and phone numbers were compromised in a five-month-long data breach.
The post Personal Information of 33.7 Million Stolen From Coupang appeared first on SecurityWeek.
ESET researchers say an Iran aligned threat group is refining its playbook again, and the latest activity shows how much its tactics have shifted. MuddyWater is a long running cyberespionage group, and new findings points to a campaign that hits ...
Google warns that two out of the 107 vulnerabilities patched in Android this month have been exploited in limited, targeted attacks.
The post Android’s December 2025 Updates Patch Two Zero-Days appeared first on SecurityWeek.
Skyflow announced the launch of its Runtime AI Data Security platform for AWS AgentCore. While AI models are improving every few months and the industry is investing hundreds of billions of dollars on AI infrastructure, most organizations still ...
Upwind announced the launch of its integrated AI security suite, expanding the company’s CNAPP to protect the growing enterprise AI attack surface. The suite introduces real-time AI security, AI posture management, AI agents, and runtime ...
In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity with limited resources and still build resilience. He discusses the tension between open research and ...
UserLock brings modern identity and access management (IAM) to Active Directory, adding granular multi-factor authentication (MFA), contextual access controls, single sign-on (SSO) and real-time session management. It helps AD-first teams secure ...
AI development keeps accelerating while the safeguards around it move on uneven ground, according to The International AI Safety Report. Security leaders are being asked to judge exposure without dependable benchmarks. Developers build layered ...
Identity verification has become the latest front in the fight against industrialized fraud, according to a new report from Regula. The shift is visible across sectors that once relied on predictable verification routines. Criminals have learned ...
Application Security Manager Oddity | Israel | On-site – View job details As an Application Security Manager, you will conduct threat modeling based on a deep understanding of product features and workflows. You will coordinate ...
Artificial intelligence isn’t just another tool in the security stack anymore – it’s changing how software is written, how vulnerabilities spread and how long attackers can sit undetected inside complex environments. Security researcher and ...
Two technologies — one for public safety, one for controlled entry — show why trust in facial recognition must be earned, not assumed.
The post Facial Recognition’s Trust Problem appeared first on SecurityWeek.
Cryptomixer was targeted by law enforcement in Operation Olympia for facilitating cybercrime and money laundering.
The post $29 Million Worth of Bitcoin Seized in Cryptomixer Takedown appeared first on SecurityWeek.
Albiriox is a banking trojan offered under a malware-as-a-service model for $720 per month.
The post New Albiriox Android Malware Developed by Russian Cybercriminals appeared first on SecurityWeek.
Terra Security announced new capabilities for security and engineering leaders seeking to operationalize Continuous Threat Exposure Management (CTEM), enabling them to determine whether newly disclosed vulnerabilities are exploitable in their own ...
German and Swiss law enforcement agencies have taken down Cryptomixer, an illegal cryptocurrency mixer service, and have confiscated over 25 million euros (approximately $29 million) in Bitcoin. The Cryptomixer seizure banner As part of Operation ...
CISA has added CVE-2021-26829 to its Known Exploited Vulnerabilities (KEV) catalog.
The post CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack appeared first on SecurityWeek.
Michael Clapsis has been sentenced to 7 years and 4 months in prison for stealing sensitive information.
The post Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights appeared first on SecurityWeek.
Claymont, Delaware, 1st December 2025, CyberNewsWire
The post Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth appeared first on Security Boulevard.