Application Security News and Articles


Photos: RSAC 2025, part 2

RSAC 2025 Conference is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this gallery takes you inside the event. The first gallery is here. The featured vendors are: Tines, Thales, Sumo Logic, N-able, ...

Year of the Twin Dragons: Developers Must Slay the Complexity and Security Issues of AI Coding Tools

The advantages AI tools deliver in speed and efficiency are impossible for developers to resist. But the complexity and risk created by AI-generated code can’t be ignored. The post Year of the Twin Dragons: Developers Must Slay the Complexity ...

More Details Come to Light on Commvault Vulnerability Exploitation

Commvault has shared indicators of compromise associated with the exploitation of a vulnerability by state-sponsored hackers. The post More Details Come to Light on Commvault Vulnerability Exploitation appeared first on SecurityWeek.

Chinese APT’s Adversary-in-the-Middle Tool Dissected

ESET has analyzed Spellbinder, the IPv6 SLAAC spoofing tool Chinese APT TheWizards uses to deploy its WizardNet backdoor. The post Chinese APT’s Adversary-in-the-Middle Tool Dissected appeared first on SecurityWeek.

Actions Over Words: Career Lessons for the Security Professional

In a world full of noise and promises, it’s those who consistently deliver behind the scenes who build the most respected and rewarding careers. The post Actions Over Words: Career Lessons for the Security Professional appeared first on ...

From Policy to Practice: How to Operationalize SaaS Compliance at Scale

SaaS misconfigurations can silently lead to compliance failures and security risks. Learn how operationalizing compliance with AppOmni helps security teams enforce policies, monitor continuously, and stay audit-ready. The post From Policy to ...

SonicWall Flags Two More Vulnerabilities as Exploited

SonicWall has updated the advisories for two vulnerabilities to warn that they are being exploited in the wild. The post SonicWall Flags Two More Vulnerabilities as Exploited appeared first on SecurityWeek.

Ascension Discloses Data Breach Potentially Linked to Cleo Hack

Ascension is notifying over 100,000 people that their personal information was stolen in a data breach potentially linked to the Cleo hack. The post Ascension Discloses Data Breach Potentially Linked to Cleo Hack appeared first on SecurityWeek.

AI Security Risks: Jailbreaks, Unsafe Code, and Data Theft Threats in Leading AI Systems

In recent reports, significant security vulnerabilities have been uncovered in some of the world’s leading generative AI systems, such as OpenAI’s GPT-4, Anthropic’s Claude, and Google’s Gemini. While these AI models have revolutionized ...

WhatsApp’s New Private Processing: Revolutionizing AI Features While Ensuring Privacy

WhatsApp is setting new standards for privacy with its recent feature, Private Processing. This innovative approach allows WhatsApp to enhance its AI capabilities, such as smart replies, message suggestions, and content filtering, while ensuring ...

Account Takeovers: A Growing Threat to Your Business and Customers

Account Takeovers (ATOs) are becoming one of the most dangerous and costly threats to businesses and their customers. These attacks are not only financially devastating, but they also have the potential to severely damage an organization’s ...

SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers

SentinelOne has shared some information on the types of threat actors that have targeted the security firm recently. The post SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers appeared first on SecurityWeek.

The Rising Threat of Zero-Day Exploits Targeting Enterprise Security Products

Zero-day exploits continue to pose one of the most significant and evolving cybersecurity threats to businesses worldwide. According to a recent report, 75 zero-day vulnerabilities were exploited this year, with 44% of these attacks targeting ...

Why SMEs can no longer afford to ignore cyber risk

In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small and medium-sized businesses (SMEs) must reassess their risk exposure and prioritize resilience to safeguard ...

Preparing for the next wave of machine identity growth

Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy Wu, CMO at SailPoint, explains why machine identity security matters, where most companies go wrong, how ...

Hottest cybersecurity open-source tools of the month: April 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. GoSearch: Open-source OSINT tool for uncovering digital footprints GoSearch is an ...

Top solutions to watch after RSAC 2025

RSAC 2025 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs in identity protection, this year’s conference delivered a glimpse into the future. ...

Online fraud peaks as breaches rise

Data breaches played a key role in significant financial losses faced by consumers due to fraud. In this Help Net Security video, Steve Yin, Global Head of Fraud at TransUnion, and Brad Daughdrill, VP, Data Science, Head of Global Fraud ...

Low-tech phishing attacks are gaining ground

Cybercriminals are increasingly favoring low-tech, human-centric attacks to bypass email scanning technologies, according to VIPRE Security. The report is based on an analysis of global real-world data and highlights the most significant email ...

Unlocking GenAI: Real-World Use Cases & Innovations Across Industries

How Uber's GenAI-powered invoice automation boosts efficiency, cutting manual effort by 70% and ensuring 90% data accuracy. Learn more! The post Unlocking GenAI: Real-World Use Cases & Innovations Across Industries appeared first on Security ...