Application Security News and Articles


BSidesLV24 – GroundFloor – Building Data Driven Access With The Tools You Have

Author/Presenter: John Evans Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

BSidesLV24 – GroundFloor – Prepare For The Apocalypse – Exposing Shadow And Zombie APIs

Author/Presenter: Amit Srour Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and ...

Shaping the Future of Cybersecurity: Seceon’s Unified Platform Strategy for 2025 and Beyond

The cybersecurity landscape is at a tipping point. Enterprises and service providers alike are burdened by tool sprawl, alert fatigue, siloed operations, and rising adversarial sophistication. Traditional approaches relying on loosely integrated, ...

HYPR Advances Identity Verification & Credential Management Processes in YubiKey Deployments

Why Phishing-Resistant MFA Isn’t Optional Anymore The escalating sophistication of phishing and social engineering attacks has pushed organizations towards stronger authentication methods. Phishing-resistant multi-factor authentication (MFA), ...

ThreatMark offers protection against social engineering attacks and scams

ThreatMark launched ScamFlag, a Generative AI-powered solution designed to protect digital banks and their customers from the scams and social engineering attacks. Seamlessly integrating into existing digital banking applications, ScamFlag ...

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide

A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360. The campaign uses fake Google ads, advanced filtering techniques, to steal sensitive login credentials and bypass MFA. ...

We’re Answering Your Exposure Management Questions

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this Exposure Management Academy FAQ, we help CISOs understand exposure ...

UK Legal Aid Agency Finds Data Breach Following Cyberattack

The UK’s Legal Aid Agency was targeted in a cyberattack in April and it recently determined that hackers have stolen sensitive data. The post UK Legal Aid Agency Finds Data Breach Following Cyberattack appeared first on SecurityWeek.

New Feature: CIS IG Level Controls | Kovrr Blog

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post New Feature: CIS IG Level Controls | Kovrr Blog appeared first on Security Boulevard.

Malicious RVTools installer found on official site, researcher warns

The official site for RVTools has apparently been hacked to serve a compromised installer for the popular utility, a security researcher has warned. It’s difficult to say how long the malicious version has been available for download, but ...

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Serviceaide exposed a database containing personal and medical information belonging to Catholic Health patients. The post 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak appeared first on SecurityWeek.

Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe

Neuromorphic computing is moving from theory to reality, with brain-inspired processors offering real-time intelligence, low power consumption, and built-in privacy—ushering in a new era for edge devices and cybersecurity. The post Spiking ...

17 Innovation Frameworks Every Business Leader Should Know in 2025

Innovation is not just a buzzword, it’s a critical driver of growth and competitive advantage. Understanding and implementing the right innovation frameworks can help organizations...Read More The post 17 Innovation Frameworks Every Business ...

200,000 Harbin Clinic Patients Impacted by NRS Data Breach

Harbin Clinic says the information of over 200,000 patients was stolen in a July 2024 data breach at Nationwide Recovery Services. The post 200,000 Harbin Clinic Patients Impacted by NRS Data Breach appeared first on SecurityWeek.

Open MPIC: The open-source path to secure Multi-Perspective Issuance Corroboration

Open MPIC is an open-source framework designed to help Certificate Authorities (CAs) meet new Multi-Perspective Issuance Corroboration (MPIC) requirements from the CA/Browser Forum. Developed with contributions from Princeton and Sectigo, it ...

Prison Sentence for Man Involved in SEC X Account Hack

Eric Council Jr. was sentenced to prison for hacking SEC’s official X account and publishing fraudulent posts increasing Bitcoin value. The post Prison Sentence for Man Involved in SEC X Account Hack appeared first on SecurityWeek.

Hackers Earn Over $1 Million at Pwn2Own Berlin 2025

Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems. The post Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 appeared first on SecurityWeek.

Tracking Accusations May Have Roblox Back in Court 

Roblox is accused of secretly tracking the data of children without consent, an activity that the plaintiffs say violates their privacy under federal law.  The post Tracking Accusations May Have Roblox Back in Court  appeared first on Security ...

SK Telecom USIM Data Compromise: Millions of Customers at Risk

SK Telecom faces a major data breach affecting millions. Learn how to protect your USIM data and stay secure with our comprehensive guide. The post SK Telecom USIM Data Compromise: Millions of Customers at Risk appeared first on Security Boulevard.

Cyble Titan strengthens endpoint security

Cyble announced Cyble Titan, its next-generation Endpoint Security. Designed to meet the evolving threat landscape, Cyble Titan integrates into the Cyble’s AI-Native Security Cloud, bringing together asset visibility, intelligence-led ...