Application Security News and Articles


Vulnerability Management vs. Patch Management: Understanding the Key Differences

Nowadays, understanding the nuances of cybersecurity strategies is more critical than ever. Two essential components in fortifying your organization’s defenses are vulnerability management and patch management. While they may seem ...

What is Skimming in Cybersecurity? How to Detect and Prevent a Skimming Attack

Web skimming is a cyberattack where hackers steal credit card data from e-commerce sites. Learn how it works, its impact, and ways to detect and prevent attacks The post What is Skimming in Cybersecurity? How to Detect and Prevent a Skimming ...

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)

A high-severity vulnerability (CVE-2025-23363) in the Siemens Teamcenter product lifecycle management (PLM) software could allow an attacker to steal users’ valid session data and gain unauthorized access to the vulnerable application. ...

Trustmi Behavioral AI combats social engineering attacks

Trustmi announced new Behavioral AI, anomaly detection, and risk-scoring capabilities to help enterprise customers combat social engineering attacks on their finance teams, payment systems, suppliers, and processes. The new wave of sophisticated ...

F5 Application Delivery and Security Platform simplifies management for IT and security teams

F5 introduced the F5 Application Delivery and Security Platform, an Application Delivery Controller (ADC) solution that fully converges high-performance load balancing and traffic management with app and API security capabilities into a single ...

2025 CrowdStrike Global Threat Report: Cybercriminals Are Shifting Tactics – Are You Ready?

CrowdStrike (Nasdaq: CRWD) today announced the findings of the 2025 CrowdStrike Global Threat Report, revealing a dramatic shift in cyber adversary tactics, with attackers leveraging stolen identity credentials, AI-generated social engineering, ...

Common Examples of HIPAA Violations: Understanding Compliance Challenges

Achieving HIPAA compliance requires significant dedication and meticulous attention to detail. After all, safeguarding Protected Health Information (PHI) is non-negotiable.  Even with extensive resources and a dedicated compliance team, ...

Accelerate Your Security Operations with Fusion’s MITRE ATT&CK Events View

The Netography Fusion platform maps detections from over 300 detection models to the MITRE ATT&CK framework, accelerating your response workflows to malicious activity. The post Accelerate Your Security Operations with Fusion’s MITRE ...

Is Agentic AI too smart for your own good?

Agentic AI, which consists of systems that autonomously take action based on high-level goals, is becoming integral to enterprise security, threat intelligence, and automation. While these systems present significant potential, they also ...

Hook, Line, & Tax Sink: Dodging the Phishing Nets This Tax Season

Tax season has officially arrived, and with it comes an increased need for vigilance when handling emails or documents related to personal tax information. During this time of year, cybercriminals are particularly active, finding new ways to ...

Hottest cybersecurity open-source tools of the month: February 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Kunai: Open-source threat hunting tool for Linux Kunai is an open-source tool that ...

Cybersecurity jobs available right now in Europe: February 27, 2025

The post Cybersecurity jobs available right now in Europe: February 27, 2025 appeared first on Help Net Security.

Debunking 5 myths about network automation

Imagine you’re a network engineer at an enterprise. You already have your hands full with IT priorities, including managing bandwidth related to working from home, the company’s new data center, and, more recently, computing needs to support ...

How cloud sync and other SaaS dark patterns can put your organization at risk

While SaaS features and discounts offer many conveniences, some of the industry's darker patterns can put your organization at risk. The post How cloud sync and other SaaS dark patterns can put your organization at risk appeared first on Security ...

Budget Approved: 13 Cybersecurity KPIs That CISOs Can Present to the Board

When reporting to the board, a CISO must translate risk into identifiable terms to present key findings and ensure that all cybersecurity initiatives are aligned with business objectives.  Cyber risk mitigation expenditures help translate risk ...

Relieved by Advanced Secrets Security?

Why is Advanced Secrets Security Essential in Today’s Cloud-Based Ecosystem? Could advanced secrets security be the key to mitigating these risks and ensuring robust data protection? Understanding Non-Human Identities (NHIs) and Their Role in ...

Proactive Measures in Your NHIDR Plans?

Why is Proactive NHIDR Critical in Security Planning? It’s no longer sufficient to be reactive; the key lies in being proactive, particularly when it comes to Non-Human Identity and Detection Response (NHIDR) plans. With the growing complexity ...

Reassured by Your IAM Processes?

Is Your IAM Process Providing the Security Your Organization Needs? It has become increasingly essential for businesses to rethink and reimagine their Identity and Access Management (IAM) processes. The question arises, is your IAM strategy ...

How to Ensure Workplace Safety for Employees Experiencing Stalking

Learn your role in protecting employees against stalking threats and how to strengthen your workplace violence prevention strategy accordingly An employee is being stalked by someone, either known or unknown to them. Although most of the stalking ...

5 Questions On OPSEC Fundamentals

Surveillance is everywhere and ingrained in our society. While privacy is a human right, we live in an era of Operational Security (OPSEC) and privacy fatigue. The technologies we use everyday collect more and more information, making many people ...