Application Security News and Articles
Checkmarx today published a technique it has uncovered that poisons artificial intelligence (AI) agents models in a way that convinces them to tell end users that certain activities and behaviors are safe when in fact they are high risk. Darren ...
The Israeli cybersecurity startup plans to expand its offensive security offering to cover more enterprise attack surface.
The post Terra Security Raises $30 Million for AI Penetration Testing Platform appeared first on SecurityWeek.
SecurityScorecard announced the acquisition of HyperComply. Combining SecurityScorecard’s trusted security ratings and continuous third- and fourth-party risk visibility with HyperComply’s intelligent automation capabilities will make it ...
SSL/TLS certificates are no longer just a technical detail, they’re now a strategic driver of crypto agility. With certificate lifespans shortening to just 47 days by 2029, organizations must adopt automation, certificate visibility, and ...
Learn how to migrate from Akamai Identity Cloud before shutdown. Explore alternatives, reduce risk, and future-proof your identity strategy.
The post Akamai Identity Cloud Retirement — What’s Next for Your Identity and Access Management? ...
The cybercrime groups tracked as UNC6040 and UNC6395 have been extorting organizations after stealing data from their Salesforce instances.
The post FBI Shares IoCs for Recent Salesforce Intrusion Campaigns appeared first on SecurityWeek.
Organizations today are under immense pressure to make smarter, faster decisions about cybersecurity. Between regulatory compliance requirements, vulnerability disclosures, and evolving threat intelligence, security leaders must constantly ...
In April, Rhode Island resident Navah Hopkins received a plea for her help to defeat legislation thousands of miles away in California. The ask came from Google, maker of the world’s most used web browser, Chrome. The tech giant sent a message ...
Proofpoint launched agentic AI solution for Human Communications Intelligence (HCI), marking a leap forward in how organizations detect, understand, and mitigate conduct and compliance risks in real time. Designed for enterprises in regulated and ...
Two years after the fact, Fairmont Federal Credit Union tells customers their personal, financial, and medical information was compromised.
The post West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach appeared first ...
Reported by Meta and WhatsApp, the vulnerability leads to remote code execution and was likely exploited by a spyware vendor.
The post Samsung Patches Zero-Day Exploited Against Android Users appeared first on SecurityWeek.
A threat actor targeted low-skilled hackers, known as ‘script kiddies’ with a fake malware builder that secretly infected them with a backdoor to st
The post Hacker Deceives 18,000 Script Kiddies with Fake Malware Builder appeared first on ...
Learn how to implement single sign-on (SSO) solutions for your enterprise. This guide covers SSO protocols, security best practices, and choosing the right SSO provider.
The post Implementing Single Sign-on Solutions appeared first on Security ...
Explore passwordless authentication methods, benefits, and implementation strategies. Learn how to enhance security and user experience by eliminating passwords.
The post An Overview of Passwordless Authentication appeared first on Security ...
Analysis of nearly five million internet-exposed assets shows significant security gaps across major cloud platforms, with Google Cloud-hosted assets showing highest vulnerability rates.
The post New Research Reveals One-Third of Cloud ...
Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data privacy, compliance, and governance. This blind spot is ...
Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to store and index network traffic in standard PCAP format, making it easy to search and access. The solution includes ...
The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised and make sure to build it ...
In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned ...
Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need to be taken. A new report from Flashpoint argues that most current ...