Application Security News and Articles


113,000 Impacted by Data Breach at Virginia Mental Health Authority

Threat actors stole names, Social Security numbers, and financial and health information, and deployed ransomware on RBHA’s systems. The post 113,000 Impacted by Data Breach at Virginia Mental Health Authority appeared first on SecurityWeek.

More than half of public vulnerabilities bypass leading WAFs

Miggo Security has released a new report that examines how web application firewalls are used across real-world security programs. The research outlines the role WAFs play as foundational infrastructure and evaluates their effectiveness against ...

2025 Federal Retrospective: The Year of Resilient Innovation

Resiliency has been top of mind in 2025, and recent high-profile CVEs serve as holiday reminders that adversaries aren't slowing down. But what changed this year was how the federal community responded. Increasingly, exploitability drove the ...

IoT Security Firm Exein Raises €100 Million

The Italian company has raised nearly $200 million in 2025 for its widely used embedded cybersecurity platform. The post IoT Security Firm Exein Raises €100 Million appeared first on SecurityWeek.

SSH vs SSL/TLS: Definitions & Differences of Communication Protocols

What is SSL/TLS? SSL and TLS are protocols used on the transport layer, which is used to provide a secure connection between two nodes in a computer network. The first widely used protocol that was aimed to secure the Internet connections was ...

The Biggest Cyber Stories of the Year: What 2025 Taught Us

The Biggest Cyber Stories of the Year: What 2025 Taught Us madhav Thu, 12/18/2025 - 10:30 2025 didn’t just test cybersecurity; it redefined it. From supply chains and healthcare networks to manufacturing floors and data centers, the digital ...

France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry

France’s counterespionage agency is investigating a suspected cyberattack plot targeting an international passenger ferry The post France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry appeared ...

Group Policy abuse reveals China-aligned espionage group targeting governments

ESET Research has identified a previously undocumented China-aligned advanced persistent threat group that uses Windows Group Policy to deploy malware and move through victim networks. The group, tracked as LongNosedGoblin, has targeted ...

How CISOs Can Beat the Ransomware Blame Game 

CISOs are often blamed after ransomware attacks, yet most breaches stem from organizational gaps, budget tradeoffs, and staffing shortages. This analysis explores why known risks remain unfixed and how security leaders can break the cycle. The ...

Concentric AI expands Private Scan Manager with Azure support for regulated industries

Concentric AI announced expanded Private Scan Manager functionality in its Semantic Intelligence data security governance platform. Customers now have the ability to deploy Semantic Intelligence within their own private Microsoft Azure cloud. ...

Hospital Ransomware Really is The Pitt

Ransomware has become a systemic risk to healthcare, where downtime equals patient harm. From Change Healthcare to Ascension, this analysis explains why hospitals are targeted, what HIPAA really requires, and how resilience—not ...

SonicWall Patches Exploited SMA 1000 Zero-Day

The medium-severity flaw has been exploited in combination with a critical bug for remote code execution. The post SonicWall Patches Exploited SMA 1000 Zero-Day appeared first on SecurityWeek.

Push Security detects and blocks malicious copy-and-paste activity

Push Security announced the release of a new feature designed to tackle one of the fastest-growing cyber threats: ClickFix-style attacks. The company’s latest innovation, malicious copy-and-paste detection, blocks users from copying malicious ...

The 7 Best SAST Solutions for 2026: Balancing Speed, Accuracy, and Security Controls

The 7 SAST Legends Defining the Future of AppSec.Continue reading on DevSecOps & AI »

Impact of Poor PKI Management: Real-World Consequences and Solutions

Introduction Safety protocols in the virtual domain are perhaps more important than ever in the current world. There can be no denying that PKI management is one of the most crucial aspects of protecting our increasingly digital world. It is the ...

2026 Cyber Predictions: Accelerating AI, Data Sovereignty, and Architecture Rationalization 

2026 marks a critical turning point for cybersecurity leaders as AI-driven threats, data sovereignty mandates, and hybrid infrastructure risks reshape the CISO agenda. Discover the strategic priorities that will define tomorrow’s security ...

No DMARC record found: Fix this critical mistake

Seeing a "no DMARC record found" error for your domain? Learn what it means, how it exposes you to spoofing and BEC, and how to move safely to p=reject. The post No DMARC record found: Fix this critical mistake appeared first on Security Boulevard.

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear

The critical zero-day is tracked as CVE-2025-20393 and it impacts Secure Email Gateway and Secure Email and Web Manager appliances. The post China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear appeared first on SecurityWeek.

The soft underbelly of space isn’t in orbit, it’s on the ground

In this Help Net Security interview, Øystein Thorvaldsen, CISO at KSAT, discusses how adversaries view the ground segment as the practical way to reach space systems and why stations remain a focal point for security efforts. He notes that many ...

Privacy risks sit inside the ads that fill your social media feed

Regulatory limits on explicit targeting have not stopped algorithmic profiling on the web. Ad optimization systems still adapt which ads appear based on users’ private attributes. At the same time, multimodal LLMs have lowered the barrier for ...