Application Security News and Articles


SimonMed Imaging Data Breach Impacts 1.2 Million

SimonMed Imaging was targeted by the Medusa ransomware group, which claimed to have stolen 200 Gb of data. The post SimonMed Imaging Data Breach Impacts 1.2 Million appeared first on SecurityWeek.

NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms

Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations. The post NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms appeared first on SecurityWeek.

AI and the Future of American Politics

Two years ago, Americans anxious about the forthcoming 2024 presidential election were considering the malevolent force of an election influencer: artificial intelligence. Over the past several years, we have seen plenty of warning signs from ...

Text Detection and Extraction From Images Using OCR in Python

Learn how to detect and extract text from images and scanned files using Python and OCR. Step-by-step guide for developers and automation enthusiasts. The post Text Detection and Extraction From Images Using OCR in Python appeared first on ...

The importance of effective penetration testing reporting

Cyber security is a battle that never truly ends. With new and increasingly sophisticated threats emerging all the time, keeping one step ahead of the hackers is challenging.  Penetration testing is an indispensable tool for organisations ...

Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data

It’s unclear if the new Oracle E-Business Suite flaw, which can be exploited remotely without authentication, has been used in the wild.   The post Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data appeared first on SecurityWeek.

Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation

The authorities arrested GoogleXcoder, the alleged administrator of GXC Team, which offered phishing kits and Android malware. The post Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation appeared first on SecurityWeek.

Free Open-Source Software for Modern Identity and Access Management

Explore free and open-source software options for modern Identity and Access Management (IAM). Enhance security and streamline user access with these powerful tools. The post Free Open-Source Software for Modern Identity and Access Management ...

Happy United States of America’s Columbus Day 2025

Happy United States of America's Columbus Day 2025! The post Happy United States of America’s Columbus Day 2025 appeared first on Security Boulevard.

Is America Behind the Ball When It Comes to AI Regulation?

As the U.S. debates AI regulation, Europe and China forge ahead. Explore global philosophies shaping how governments define and control artificial intelligence. The post Is America Behind the Ball When It Comes to AI Regulation? appeared first on ...

Happy United States of America’s Indigenous Peoples’ Day 2025

Happy United States of America’s Indigenous Peoples' Day 2025 Permalink The post Happy United States of America’s Indigenous Peoples’ Day 2025 appeared first on Security Boulevard.

Extortion Group Leaks Millions of Records From Salesforce Hacks

The data allegedly pertains to Albertsons, Engie Resources, Fujifilm, GAP, Qantas, and Vietnam Airlines. The post Extortion Group Leaks Millions of Records From Salesforce Hacks appeared first on SecurityWeek.

Security Misconfigurations: The Future Disaster That’s Staring You in the Face 

Misconfigurations—not hackers—cause many cyber breaches. Learn how IP restrictions, VPNs, and new AI protocols like MCP can expose hidden security gaps. The post Security Misconfigurations: The Future Disaster That’s Staring You in the ...

Defining Passwordless Authentication

Explore passwordless authentication: its definition, benefits, methods like biometrics and magic links, and implementation strategies for enhanced security. The post Defining Passwordless Authentication appeared first on Security Boulevard.

The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon 

Identity, not endpoints, is today’s attack surface. Learn why SharePoint and AI assistants like Copilot expose hidden risks legacy IGA can’t control. The post The SharePoint Blind Spot: How Legacy IGA Failed to Stop Volt Typhoon  appeared ...

Building a healthcare cybersecurity strategy that works

In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He explains how focusing on areas like vulnerability management and network ...

AI-generated images have a problem of credibility, not creativity

GenAI simplifies image creation, yet it creates hard problems around intellectual property, authenticity, and accountability. Researchers at Queen’s University in Canada examined watermarking as a way to tag AI images so origin and integrity ...

The five-minute guide to OT cyber resilience

In this Help Net Security video, Rob Demain, CEO of e2e-assure, explains the essentials of OT cybersecurity resilience. He discusses the importance of understanding remote access points, supply chain connections, and the need for specialized ...

When hackers hit, patient safety takes the fall

93% of U.S. healthcare organizations experienced at least one cyberattack in the past year, with an average of 43 incidents per organization, according to Proofpoint. The study found that most of these attacks involved cloud account compromises, ...

Attackers don’t linger, they strike and move on

Cyber attacks are happening faster than ever. Intrusions that once took weeks or months now unfold in minutes, leaving little time to react. Attackers move quickly once they gain access, aiming to run their payloads and get results before ...