Application Security News and Articles
The cybersecurity agency has added CVE-2025-61884 to its Known Exploited Vulnerabilities (KEV) catalog.
The post CISA Confirms Exploitation of Latest Oracle EBS Vulnerability appeared first on SecurityWeek.
Over the last 6 months a total of 43.5 million new domains were registered — 75% of them gTLDs — with .top (+94%) and .xyz (+103%) among the top three. Domain listings surged by 48.3%, and one registry saw particularly huge increases - can ...
As the UK tests digital ID cards for military veterans ahead of a 2027 nationwide rollout, privacy concerns and cybersecurity warnings are growing. Experts caution that without strong zero-trust principles, encryption, and PAM enforcement, the ...
As artificial intelligence (AI) solutions continue to evolve, the rise of agentic AI—intelligent systems that can act autonomously on behalf of an organization—presents new security challenges. Research from Delinea’s 2025 AI in ...
In this Help Net Security interview, Ken Deitz, CISO at Brown & Brown, discusses how the definition of cyber risk has expanded beyond IT to include IoT, OT, and broader supply chain ecosystems. As organizations connect these assets through ...
Alan warns that the F5 breach — involving stolen source code, unpatched vulnerabilities, and customer configurations — is a five-alarm crisis for digital infrastructure. The attack exposes national security risks, vendor concentration ...
The lights switch on as you walk in. The air adjusts to your presence. Somewhere in the background, a server notes your arrival. It’s the comfort of a smart building, but that comfort might come with a cost. Smart buildings use digital systems ...
What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace attacks while also being tested for its ability to conceal them. A new study from the University of Cagliari ...
At Help Net Security, we’ve been tracking the cybersecurity world for nearly three decades. Through our Industry News section, we’ve watched countless companies rise, and push the limits of what’s possible in data protection. Some vendors ...
CISO Open-Xchange | Germany | Remote – View job details As a CISO, you will lead the development and implementation of security strategies and requirements across the OX Group. You will advise management on information security ...
I hadn't intended to drive for 16 hours. It's around midnight and my friend and I are about two hours away from Bright Angel Lodge at the South Rim of the Grand Canyon. I pull over for gas, to stretch my legs, and wake myself up.
"Can you drive ...
“Security debt doesn’t start in production — it starts in code review.”Continue reading on Medium »
October is Cybersecurity Awareness Month, and for campus IT teams, that means more than patching servers and updating firewalls. It means protecting students who've never encountered sophisticated phishing attacks, international students ...
Gemini made blog illustration
In early 1900s, factory owners bolted the new electric dynamo onto their old, central-shaft-and-pulley systems. They thought they were modernizing, but they were just doing a “retrofit.” The massive productivity ...
How Does Machine Identity Security Enhance Cybersecurity? Where technology evolves at a rapid pace, have you ever considered how machine identity security could be the silent sentinel safeguarding your organization’s data? With businesses ...
How Secure Is Your Organization’s Cloud Environment? When it comes to cloud security, do you find peace of mind elusive despite deploying comprehensive strategies? This is a common scenario faced by many high-stakes sectors such as financial ...
What Role Do Non-Human Identities Play in Privileged Access Management? Have you ever considered how often machine identities interact within your network compared to human users? These non-human identities (NHIs) are taking on ever more ...
PAPERS SecuWear: Secure Data Sharing Between Wearable Devices Sujin Han (KAIST) Diana A. Vasile (Nokia Bell Labs), Fahim Kawsar (Nokia Bell Labs, University of Glasgow), Chulhong Min (Nokia Bell Labs)
Analysis of Misconfigured IoT MQTT ...
South Korea faces public calls to take stronger action to protect its nationals from being forced into overseas online scam centers.
The post South Korea Seeks to Arrest Dozens of Online Scam Suspects Repatriated From Cambodia appeared first on ...
QUESTION 1: “Do you want to change Maine election laws to eliminate two days of absentee voting, prohibit requests for absentee ballots by phone or family members, end ongoing absentee voter status for seniors and people with disabilities, ban ...