Application Security News and Articles
A new study has found that electrocardiogram (ECG) signals, often shared publicly for medical research, can be linked back to individuals. Researchers were able to re-identify people in anonymous datasets with surprising accuracy, raising ...
AI is being added to business processes faster than it is being secured, creating a wide gap that attackers are already exploiting, according to the SANS Institute. The scale of the problem Attackers are using AI to work at speeds that humans ...
In the pharmaceutical industry, clinical trial data, patient records, and proprietary drug formulas are prime targets for cybercriminals. These high-value assets make the sector a constant focus for attacks. Disruptions to research or medicine ...
Ransomware, third-party disruptions, and the rise of AI-powered attacks are reshaping the cyber risk landscape in 2025. A new midyear analysis from Resilience shows how these forces are playing out in real-world incidents and how they are ...
Here’s a look at the most interesting products from the past week, featuring releases from Cynomi, DataLocker, Gigamon, Lookout, and Relyance AI. Cynomi simplifies vendor risk management Cynomi’s TPRM provides MSPs and MSSPs with a scalable ...
Why Repository Security Is Critical in 2025Continue reading on AWS in Plain English »
Does Your Organization Understand the Strategic Importance of NHI Management? With corporations increasingly shift operations to the cloud, they face the daunting task of managing a vast array of Non-Human Identities (NHIs) – machine identities ...
Unraveling the Core Structure: What are NHIs? Are you really protecting your Non-Human Identities (NHIs) to the best of your ability? NHIs are an often misunderstood but vitally important component. They are machine identities created by ...
Creator, Author and Presenter: Vien Van, Senthil Sivasubramanian
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...
DoorDash has become a staple for more than 40 million U.S. users, whether they’re ordering takeout or delivering it. But as the app’s popularity grows, so does the attention from scammers.
The post DoorDash scams are serving up trouble ...
Discover the 15 best enterprise IAM software solutions. Secure your data, manage access effectively, and prevent identity-based attacks with these practical tools.
The post Best Enterprise Identity and Access Management (IAM) Software appeared ...
When a North Korean scammer asks Claude "what is a muffin?" it seems innocent enough. When that same person uses AI to maintain a Fortune 500 engineering job while funding weapons programs, we're looking at a fundamental shift in cybercrime.
The ...
Roasting Redmond for Kerberoasting: “Like an arsonist selling firefighting services,” quips this 76-year-old.
The post Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’ appeared first on Security Boulevard.
Artificial intelligence is no longer just another tool in the cybersecurity stack—it’s becoming a requirement to keep pace with modern threats. Deep Instinct CIO Carl Froggett discusses how attackers are leveraging AI to move faster and why ...
Fletcher Heisler, CEO of Authentik Security, highlights the company’s open-source identity provider, focusing on its enterprise functionality and compliance. The discussion covers the evolution of Identity and Access Management (IAM) and ...
Join the webinar as we reveal a new model for AI pen testing – one grounded in social engineering, behavioral manipulation, and even therapeutic dialogue.
The post Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing appeared ...
Creator, Author and Presenter: Jason Craig
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...
Over a year after SonicWall patched CVE-2024-40766, a critical flaw in its next-gen firewalls, ransomware attackers are still gaining a foothold in organizations by exploiting it. Like last September and earlier this year, the attackers are ...
Realm.Security joins the Google Cloud Partner Advantage program to deliver AI-powered security data pipelines that cut SIEM costs, streamline log management, and improve SOC efficiency for Google Cloud customers.
The post Realm.Security Joins ...