Application Security News and Articles


Deepfake Detection – Protecting Identity Systems from AI-Generated Fraud

Advanced deepfake detection combines AI forensic analysis, liveness checks, and behavioral biometrics to combat synthetic fraud. Discover neural anomaly detection and blockchain verification systems to counter AI-generated threats. The post ...

US SEC Misses the Mark With Materiality Reporting | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post US SEC Misses the Mark With Materiality Reporting | Kovrr appeared first on Security Boulevard.

Cyber Insights 2025: Quantum and the Threat to Encryption

2025 is an important year – it is probably our last chance to start our migration to post quantum cryptography before we are all undone by cryptographically relevant quantum computers. The post Cyber Insights 2025: Quantum and the Threat to ...

Qualys TotalAppSec enables organizations to address risks across web applications and APIs

Qualys announced TotalAppSec, its new AI-powered application risk management solution to enable organizations to monitor and mitigate cyber risk from critical web applications and APIs. Qualys TotalAppSec unifies API security, web application ...

DOJ, Allies Seize Cybercrime Forums Affecting 17 Million-Plus Americans

Investigators from the United States and other countries seized and shut down two online cybercriminal marketplaces, Cracked and Nulled, that they said affected more than 17 million Americans by selling hacking tools and stolen information to bad ...

DeepSeek’s popularity exploited to push malicious packages via PyPI

Two malicious packages leveraging the DeepSeek name have been published to the Python Package Index (PyPI) package repository, and in the 30 minutes or so they were up, they have been downloaded 36 times. The malicious packages The attack started ...

DORA Compliance Must be a Top Priority for US Financial Institutions

In an era where digital resilience determines market survival, the European Union's Digital Operational Resilience Act (DORA) has emerged as a global benchmark for financial sector cybersecurity. The post DORA Compliance Must be a Top Priority ...

Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina

Hundreds of thousands have been impacted by data breaches at Asheville Eye Associates and Delta County Memorial Hospital District. The post Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina appeared first ...

Casio Website Infected With Skimmer 

A threat actor has infected Casio UK’s website with a web skimmer on all pages, except the typical checkout page. The post Casio Website Infected With Skimmer  appeared first on SecurityWeek.

DeepSeek Security: System Prompt Jailbreak, Details Emerge on Cyberattacks

Researchers found a jailbreak method that exposed DeepSeek’s system prompt, while others have analyzed the DDoS attacks aimed at the new gen-AI. The post DeepSeek Security: System Prompt Jailbreak, Details Emerge on Cyberattacks appeared first ...

Insurance Company Globe Life Notifying 850,000 People of Data Breach

Insurance firm Globe Life says a threat actor may have compromised the personal information of roughly 850,000 individuals. The post Insurance Company Globe Life Notifying 850,000 People of Data Breach appeared first on SecurityWeek.

Under Pressure: Why Companies Must Mitigate the Churn of Cybersecurity Leaders  

More needs to be done to prevent the cycle of burnout and churn which affects leaders, their teams and the overall security of the organization. The post Under Pressure: Why Companies Must Mitigate the Churn of Cybersecurity Leaders   appeared ...

The Importance of Secure Remote Key Loading for Point-of-Sale Systems

As global payment infrastructure evolves, securing point-of-sale (POS) systems has become more critical than ever.   The post The Importance of Secure Remote Key Loading for Point-of-Sale Systems appeared first on Security Boulevard.

Remote Browser Isolation Within ZTNA Delivers Seven Key Benefits

As cyberthreats become more sophisticated, organizations must protect their users and consider the combination of zero-trust network access and remote browser isolation as a key element of their cybersecurity strategy. The post Remote Browser ...

Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks

The NIST Phish Scale framework offers a structured and effective approach to improving phishing awareness training in organizations. The post Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks appeared first on Security ...

Hackers Hijack JFK File Release: Malware & Phishing Surge

Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files. Attackers are capitalizing on public interest in these historical documents to launch potential malware ...

1 Million Impacted by Data Breach at Connecticut Healthcare Provider

Community Health Center, Inc. says hackers stole the personal and health information of over one million individuals. The post 1 Million Impacted by Data Breach at Connecticut Healthcare Provider appeared first on SecurityWeek.

January Recap: New AWS Sensitive Permissions and Regions

As January 2025 comes to a close, we’re highlighting the latest updates to sensitive permissions, services, and regions from AWS. Staying informed on these changes is essential for maintaining a strong cloud security posture and ensuring that ...

The hidden dangers of a toxic cybersecurity workplace

In this Help Net Security interview, Rob Lee, Chief of Research and Head of Faculty at SANS Institute, discusses what a toxic environment looks like and how professionals can recognize red flags such as high turnover, burnout, and a pervasive ...

Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI

In this episode, we explore the rollout of digital driver’s licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising your privacy? We also discuss the ...