Application Security News and Articles


Searchlight Cyber Acquires Assetnote to Accelerate Remediation

Searchlight Cyber this week revealed it has acquired Assetnote as part of an effort to unify attack surface management with its platform for detecting stolen data that has been published on the Dark Web. The post Searchlight Cyber Acquires ...

SCA & SAST Tool Integration

In this article, we are utilizing two open-source tools to integrate SAST and SCA: SonarQube and OWASP Dependency-TrackContinue reading on Medium »

US, Dutch Authorities Disrupt Pakistani Hacking Shop Network

US and Dutch authorities seized 39 domains to disrupt a network of hacking and fraud marketplaces operated by Saim Raza. The post US, Dutch Authorities Disrupt Pakistani Hacking Shop Network appeared first on SecurityWeek.

Binarly helps organizations prepare for mandatory transition to PQC standards

Binarly announced Binarly Transparency Platform v2.7, a major update that enables corporate defenders to prepare for a mandatory transition to Post-Quantum Cryptography (PQC) standards. As quantum computing advances, the National Institute of ...

2 Arrested in Takedown of Nulled, Cracked Hacking Forums

Two individuals have been arrested and one alleged admin has been charged in the takedown of the Nulled and Cracked cybercrime forums. The post 2 Arrested in Takedown of Nulled, Cracked Hacking Forums appeared first on SecurityWeek.

JumpCloud Acquires Stack Identity to Extend Access Management Reach

JumpCloud this week revealed it has acquired Stack Identity to fuel an effort to add identity security and access visibility capabilities to its directory. The post JumpCloud Acquires Stack Identity to Extend Access Management Reach appeared ...

New York Blood Bank Hit by Ransomware

New York Blood Center Enterprises and its operating divisions have taken systems offline to contain a ransomware attack. The post New York Blood Bank Hit by Ransomware appeared first on SecurityWeek.

Patient monitors with backdoor are sending info to China, CISA warns

Contec CMS8000, a patient monitor manufactured by a Chinese company, and Epsimed MN-120, which is the same monitor but relabeled, exfiltrate patients’ data to a hard-coded IP address and have a backdoor that can be used to download and ...

CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors

CISA and FDA say Contec patient monitors used in the US contain a backdoor function that could allow remote attackers to tamper with the device. The post CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors appeared first on SecurityWeek.

ChatGPT, DeepSeek Vulnerable to AI Jailbreaks

Different research teams have demonstrated jailbreaks against ChatGPT, DeepSeek, and Alibaba’s Qwen AI models.  The post ChatGPT, DeepSeek Vulnerable to AI Jailbreaks appeared first on SecurityWeek.

NorthBay Health Data Breach Impacts 569,000 Individuals

NorthBay Health says hackers stole the personal information of 569,000 individuals in a 2024 ransomware attack. The post NorthBay Health Data Breach Impacts 569,000 Individuals appeared first on SecurityWeek.

The push for 47-day certificates: a win for digital security and trust

By 2028, SSL/TLS certificate lifecycles may be cut down to just 47 days - a dramatic shift from the current 398-day maximum. Apple’s recent ballot submission to the CA/Browser Forum proposes this change, and it’s gaining traction among ...

MSP Case Study: Hubelia Simplified Client Domain Security Management with PowerDMARC

Hubelia, a Canada-based MSP, automated DMARC, SPF & DKIM with PowerDMARC, improving security, compliance, and deliverability. The post MSP Case Study: Hubelia Simplified Client Domain Security Management with PowerDMARC appeared first on ...

CyberArk Identity Bridge manages user access and authentication for Linux environments

CyberArk announced Identity Bridge, an endpoint identity security capability that will support identity and privilege sprawl reduction on Linux machines. Identity Bridge will enable organizations to authenticate to Linux systems using centralized ...

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could intercept models in transit, manipulate inputs to degrade performance, ...

How to Train AI Dragons to Solve Network Security Problems

Exploring how AI can help service providers and cloud builders keep their networks secure and why “feeding your AI dragons” with relevant, high-quality data is essential for implementing AI for DDoS security.  The post How to Train AI ...

Clutch Security Raises $20 Million for Non-Human Identity Protection Platform

Clutch Security has raised $20 million in a Series A funding round led by SignalFire to secure non-human identities. The post Clutch Security Raises $20 Million for Non-Human Identity Protection Platform appeared first on SecurityWeek.

5 Steps to a Secure and Streamlined SASE Rollout

A secure access service edge (SASE) solution offers the promise of a unified and cost-effective approach to modern networking: Enhancing security, performance and scalability to meet dynamic business needs. The post 5 Steps to a Secure and ...

Platformization is key to reduce cybersecurity complexity

Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according to a report by IBM and Palo Alto Networks. It also shows 7 out of 10 surveyed companies with a high ...

Nine out of ten emails are spam

Now, more than ever, users can fall prey to word-perfect AI-created phishing campaigns, subtle BEC messages that sound remarkably like the sender, and highly convincing ploys from trusted vendors with legitimate-looking websites and clean ...