Application Security News and Articles


AI’s split personality: Solving crimes while helping conceal them

What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace attacks while also being tested for its ability to conceal them. A new study from the University of Cagliari ...

10 data security companies to watch in 2026

At Help Net Security, we’ve been tracking the cybersecurity world for nearly three decades. Through our Industry News section, we’ve watched countless companies rise, and push the limits of what’s possible in data protection. Some vendors ...

Cybersecurity jobs available right now: October 21, 2025

CISO Open-Xchange | Germany | Remote – View job details As a CISO, you will lead the development and implementation of security strategies and requirements across the OX Group. You will advise management on information security ...

Grand Canyon: Rim-to-Rim 1 of n

I hadn't intended to drive for 16 hours. It's around midnight and my friend and I are about two hours away from Bright Angel Lodge at the South Rim of the Grand Canyon. I pull over for gas, to stretch my legs, and wake myself up.  "Can you drive ...

Context-Aware Code Review: Moving from Static Checks to Intelligent Risk Analysis

“Security debt doesn’t start in production — it starts in code review.”Continue reading on Medium »

Cybersecurity Awareness Month – Two Email Scams Every Student and Parent Should Know About

October is Cybersecurity Awareness Month, and for campus IT teams, that means more than patching servers and updating firewalls. It means protecting students who've never encountered sophisticated phishing attacks, international students ...

Simple to Ask: Is Your SOC AI Ready? Not Simple to Answer!

Gemini made blog illustration In early 1900s, factory owners bolted the new electric dynamo onto their old, central-shaft-and-pulley systems. They thought they were modernizing, but they were just doing a “retrofit.” The massive productivity ...

Empower Your Security with Machine Identities

How Does Machine Identity Security Enhance Cybersecurity? Where technology evolves at a rapid pace, have you ever considered how machine identity security could be the silent sentinel safeguarding your organization’s data? With businesses ...

Stay Relaxed with Top-Tier Data Security

How Secure Is Your Organization’s Cloud Environment? When it comes to cloud security, do you find peace of mind elusive despite deploying comprehensive strategies? This is a common scenario faced by many high-stakes sectors such as financial ...

Feel Reassured with Advanced PAM Techniques

What Role Do Non-Human Identities Play in Privileged Access Management? Have you ever considered how often machine identities interact within your network compared to human users? These non-human identities (NHIs) are taking on ever more ...

NDSS 2025 – Workshop On Security And Privacy In Standardized IoT (SDIoTSec) 2025, Paper Presentation Session: Security And Privacy In Iot Standards, Protocols And Implementations

PAPERS SecuWear: Secure Data Sharing Between Wearable Devices Sujin Han (KAIST) Diana A. Vasile (Nokia Bell Labs), Fahim Kawsar (Nokia Bell Labs, University of Glasgow), Chulhong Min (Nokia Bell Labs) Analysis of Misconfigured IoT MQTT ...

South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia

South Korea faces public calls to take stronger action to protect its nationals from being forced into overseas online scam centers. The post South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia appeared first on ...

Maine 2025 Ballot Questions Redux

QUESTION 1: “Do you want to change Maine election laws to eliminate two days of absentee voting, prohibit requests for absentee ballots by phone or family members, end ongoing absentee voter status for seniors and people with disabilities, ban ...

Randall Munroe’s XKCD ‘’100% All Achievements”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’100% All Achievements” appeared first on Security Boulevard.

Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)

Moxa has fixed 5 vulnerabilities in its industrial network security appliances and routers, including a remotely exploitable flaw (CVE-2025-6950) that may result in complete system compromise. There’s no mention of these flaws being ...

Ransomware Protection: Source Code Stolen, Patients Exposed, and Utilities Breached

In the first half of October 2025, we’ve seen zero-day exploits, source code theft, healthcare breaches, and attackers probing water utilities like they own the place. It’s a loud warning for defenders. Attackers are slipping past perimeters ...

Why 99% of Cold Emails to CISOs Fail (And the Surprising Truth About How They Actually Buy)

Cold emails to CISOs fail 99% of the time—not because security purchases are planned, but because they're reactive. New research shows 77% of cybersecurity deals are triggered by incidents and fear. Companies using targeted account-based ...

NDSS 2025 – Workshop on Security and Privacy in Standardized IoT (SDIoTSec) 2025, Keynote

Author, Creator & Presenter: Dr. May Wang PhD (Palo Alto Networks) Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference ...

China-linked Salt Typhoon hackers attempt to infiltrate European telco

Salt Typhoon, the China-linked APT group that has a penchant for targeting telecommunications companies, has been spotted trying to sneak into yet another one. The intrusion “Darktrace observed activity in a European telecommunications ...

Building Chromegg: A Chrome Extension for Real-Time Secret Detection

Ever accidentally pasted an API key into a web form? Chromegg is our new Chrome extension that scans form fields in real-time, alerting you BEFORE you submit secrets. Open-source & ready to use! The post Building Chromegg: A Chrome Extension ...