Application Security News and Articles


Why Every Enterprise Needs a Cybersecurity System of Record

In today’s thoroughly digital world, technology decisions are business decisions, with cybersecurity standing out as a crucial area where this dynamic unfolds. It’s no longer just a box for IT Read More The post Why Every Enterprise Needs a ...

Why Traditional CRQ Falls Short — and How Modern Solutions Fill the Gaps

In a world in which cyberattacks have become both more frequent and costly, organizations are under growing pressure to manage digital threats more effectively. Cyber Risk Quantification (CRQ), a means Read More The post Why Traditional CRQ Falls ...

Why CRQ Methodologies Should Be Usable, Defensible, and Informative

In a thoroughly digital world, cyber incidents can have a huge financial impact, with the average cost of a data breach skyrocketing to $4.88 million. Still, too many businesses struggle Read More The post Why CRQ Methodologies Should Be Usable, ...

CISO Forum Webinar: Defenders on the Frontline – Incident Response and Threat Intel Under the Microscope 

Join this panel of CISOs and threat-intel professionals for a deep-dive on aligning incident response and threat intelligence with broader business objectives. The post CISO Forum Webinar: Defenders on the Frontline – Incident Response and ...

22 New Mac Malware Families Seen in 2024

Nearly two dozen new macOS malware families were observed in 2024, including stealers, backdoors, downloaders and ransomware.  The post 22 New Mac Malware Families Seen in 2024 appeared first on SecurityWeek.

AttackIQ Bolsters Cyber Defenses with DeepSurface’s Risk-Analysis Tech

This week, AttackIQ acquired DeepSurface to broaden its vulnerability and attack path management capabilities to help enterprises identify and mitigate the most pressing vulnerabilities in their environments. The acquisition enables AttackIQ to ...

How bots and fraudsters exploit free tiers in AI SaaS

The latest wave of artificial intelligence (AI) improvements significantly improved the quality of models for image and text generation. Several companies, such as OpenAI (ChatGPT) and Claude provide services, often in the form of software as a ...

When Stalking Looks Like Affection, Admiration, or Anger — The Challenge for EP Teams

How to strengthen your executive protection program to address and mitigate the impacts of stalking aimed at executives A customer becomes obsessed with an executive due to their relatable social media presence and desperately wants their ...

DEF CON 32 – D0N0H4RM Cyber STEM Storytime

Authors/Presenters: Panel Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Top 15 Cloud Compliance Tools in 2025

Explore the top 15 cloud compliance tools in 2025 that you can leverage to protect your organization and customer data. The post Top 15 Cloud Compliance Tools in 2025 appeared first on Scytale. The post Top 15 Cloud Compliance Tools in 2025 ...

Cycode Change Impact Analysis boosts application security posture

Cycode unveiled Change Impact Analysis (CIA) technology, a key addition to its Complete ASPM platform. This solution empowers organizations to proactively assess the security impact of every code change, enabling them to identify, prioritize, and ...

Ontinue ION for IoT Security secures critical operational environments

Ontinue announced the expansion of its managed services to include IoT/OT environments. Ontinue ION for IoT Security is an add-on service to the Ontinue ION MXDR service that extends continuous protection to customers’ IoT and OT ...

AMD Patches CPU Vulnerability Found by Google

AMD has released patches for a microprocessor vulnerability that could allow an attacker to load malicious microcode. The post AMD Patches CPU Vulnerability Found by Google appeared first on SecurityWeek.

Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)

CVE-2025-0411, a Mark-of-the-Web bypass vulnerability in the open-source archiver tool 7-Zip that was fixed in November 2024, has been exploited in zero-day attacks to deliver malware to Ukrainian entities, Trend Micro researchers have revealed. ...

SpyCloud Pioneers the Shift to Holistic Identity Threat Protection

Austin, TX, USA, 4th February 2025, CyberNewsWire The post SpyCloud Pioneers the Shift to Holistic Identity Threat Protection appeared first on Security Boulevard.

Cybersecurity Training for Executives: What Business Leaders Need to Know

In an era marked by high-profile cyber breaches, ransomware attacks, and violence committed against high-profile enterprise employees, the imperative for focused cybersecurity training for executives has escalated dramatically.  For CISOs and ...

How to Root Out Malicious Employees

Malicious employees and insider threats pose one of the biggest security risks to organizations, as these users have more access and permissions than cybercriminals attacking the organization externally.  The post How to Root Out Malicious ...

Personal Information Compromised in GrubHub Data Breach

Food delivery firm GrubHub has disclosed a data breach impacting the personal information of drivers and customers. The post Personal Information Compromised in GrubHub Data Breach appeared first on SecurityWeek.

Nymi Band 4 delivers passwordless MFA to deskless workers in OT environments

Nymi launched next-generation wearable authenticator, the Nymi Band 4, which introduces design upgrades and expanded passwordless use cases for regulated industries, while retaining its core authentication functionality. This latest development ...

Cyber Insights 2025: The CISO Outlook

There has never been a single job description for the CISO – the role depends upon each company, its maturity, its size and resources, and the risk tolerance of boards. The post Cyber Insights 2025: The CISO Outlook appeared first on SecurityWeek.