Application Security News and Articles


‘Aggressive’ Akira Ransomware Blitz Clubs SonicWall 2FA to DEATH

Strange factors: Yet another security problem plaguing SonicWall customers. The post ‘Aggressive’ Akira Ransomware Blitz Clubs SonicWall 2FA to DEATH appeared first on Security Boulevard.

Microsoft Sniffs Out AI-Based Phishing Campaign Using Its AI-Based Tools

Microsoft used AI-based tools in Defender for Office 365 to detect and block a phishing campaign in which Security Copilot determined the malicious code was likely written by a LLM, marking the latest incident in which AI security tools were used ...

Akira ransomware: From SonicWall VPN login to encryption in under four hours

Four hours or less: that’s how long it takes for Akira affiliates to break into organizations and deploy the ransomware on their systems, Arctic Wolf researchers have warned. Armed with SonicWall SSL VPN credentials stolen in earlier ...

African Authorities Arrest 260 Suspects in Romance, Sextortion Scams

Authorities in 14 African countries arrested 260 people, seized 1,235 electronic devices, and took down 18 criminal infrastructures in a sprawling Interpol operation aimed at the growing global problem of romance and sextortion scams being run ...

NowSecure Privacy helps organizations protect mobile apps from data leaks

NowSecure announced the release of NowSecure Privacy, a privacy solution for mobile applications. With this launch, developers, security teams, and privacy professionals gain the capabilities needed to identify and fix systemic blind spots that ...

How to Use NHI Governance as Your Central Dashboard to Monitor AWS IAM

Let's have a look at how to integrate NHI Governance with AWS IAM to get detailed security insights into your dashboard. The post How to Use NHI Governance as Your Central Dashboard to Monitor AWS IAM appeared first on Security Boulevard.

CMMC Compliance: What Your Need to Know Ahead of November 10

The November 10th deadline for Cybersecurity Maturity Model Certification (CMMC) compliance is approaching fast. For CISOs, risk managers, and compliance leaders across the defense industrial base, this date represents more than a regulatory ...

Cybersecurity Alert Overload is a CEO’s Problem; Here’s How to Fix It

In today's digital landscape, organizations face an unprecedented volume of cybersecurity alerts on a daily basis. While these alerts are crucial for maintaining security, their sheer volume can overwhelm security teams, a phenomenon known as ...

Abusing Notion’s AI Agent for Data Theft

Notion just released version 3.0, complete with AI agents. Because the system contains Simon Willson’s lethal trifecta, it’s vulnerable to data theft though prompt injection. First, the trifecta: The lethal trifecta of capabilities ...

Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention

The government has announced a support package, but a cybersecurity expert has raised some concerns. The post Cyberattack on JLR Prompts £1.5 Billion UK Government Intervention appeared first on SecurityWeek.

ISHIR: Big Enough to Scale, Small Enough to Care

In today’s fast-moving digital world, businesses need partners who can scale with them without losing the human touch. At ISHIR, we’ve built a model that...Read More The post ISHIR: Big Enough to Scale, Small Enough to Care appeared first on ...

SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding

Co-founder Hector Monsegur, formerly known as “Sabu,” a black hat hacker and leader of LulzSec, now serves as SafeHill’s chief research officer. The post SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding appeared first on ...

Dutch Teens Arrested for Allegedly Helping Russian Hackers

One of the two 17-year-old boys allegedly walked by law enforcement and embassy offices carrying a Wi-Fi sniffer. The post Dutch Teens Arrested for Allegedly Helping Russian Hackers appeared first on SecurityWeek.

25 Recent Cyber Attacks That Serve as a Wake-Up Call for Businesses

Cyberattacks in 2025 have hit airlines, automakers, banks, and even city services, causing major disruptions and exposing sensitive data. These incidents show how businesses across every sector remain prime targets. Here are 25 recent cases that ...

Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues

In one attack, the hackers leveraged the Datto RMM utility on a domain controller and various other legitimate tools to evade detection. The post Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues appeared first on ...

The Security Maginot Line: Fighting Tomorrow’s Cyber Attacks With Yesterday’s Tech

Alan warns that cybersecurity is stuck in a “Maginot Line” mindset — clinging to outdated tools while attackers weaponize AI, supply chain compromises, and polymorphic malware. He argues for AI-native defenses, real agentic automation, and ...

The Role of Passwordless Authentication in Security

Explore how passwordless authentication improves security by removing password-related risks. Learn about different methods and implementation best practices. The post The Role of Passwordless Authentication in Security appeared first on Security ...

Progressive Profiling Without Friction: Collecting Only What Helps

Learn how to use progressive profiling to collect user data without friction. Discover strategies for timing, consent, autofill, and local form design. The post Progressive Profiling Without Friction: Collecting Only What Helps appeared first on ...

How AI Can Predict and Prevent Security Breaches in Educational Platforms

Discover how AI helps educational platforms predict and prevent security breaches with real-time detection, predictive analytics, and automated response. The post How AI Can Predict and Prevent Security Breaches in Educational Platforms appeared ...

NSFOCUS Earns ISO 28000:2022 Security and Resilience – Security Management Systems Certification

Santa Clara, Calif. Sep 29, 2025 – NSFOCUS, a global provider of intelligent hybrid security solutions, announced today that it has attained ISO 28000:2022 Security and Resilience – Security Management Systems (SMS) certification. ISO 28000 ...