Application Security News and Articles
In the wake of last week’s revelation of a breach at Salesloft by a group tracked by Google as UNC6395, several companies – including Zscaler, Palo Alto Networks, PagerDuty, Tanium, and SpyCloud – have confirmed their Salesforce ...
Part of a wave of DDoS attacks that lasted for weeks, the assault was a UDP flood mainly originating from Google Cloud.
The post Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack appeared first on SecurityWeek.
Artificial intelligence (AI) is rapidly transforming software development, accelerating innovation, streamlining processes, and opening the door to entirely new capabilities.
The post AI Governance and Risk in Securing Software Supply Chains ...
Creator, Author and Presenter: Evan Johnson
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s ...
The transaction is valued up to $150 million, including performance-based retention awards, a Varonis spokesperson told SecurityWeek.
The post Varonis Acquires Email Security Firm SlashNext appeared first on SecurityWeek.
The Model Context Protocol (MCP) emerged as the answer to agent chaos. It's the structured way agents talk to each other and to your systems. But MCP only works if agents actually use it. And right now, nothing stops external agents from going ...
Varonis Systems acquired SlashNext, an AI-native email security provider. Their predictive AI sees through evasive tactics, removes threats from the inbox, and protects from multi-channel phishing attacks. Hackers are flooding users with social ...
A few days ago, my friend Javvad Malik—a sharp voice in our industry and someone I trust—shared something that made me stop and think. Javvad, KnowBe4’s security awareness advocate, summed up the state of things beautifully: “Cyber ...
In a recent podcast interview with Cybercrime Magazine host, Heather Engel, Cimcor President and CEO, Robert E. Johnson, III discuss how organizations are starting to move away from treating IT operations and cybersecurity as two separate areas ...
SentinelOne nears $1B ARR as Purple AI adoption grows and revenue surges 22% YoY, outpacing cybersecurity market growth amid rising AI-driven threats.
The post SentinelOne Gains Adoption Momentum Despite Macro Economic Headwinds appeared first on ...
Many organizations struggle with security gaps even after investing in different tools and processes. One of the most common reasons for breaches is the presence of unresolved weaknesses in systems....
The post Patch Management vs Vulnerability ...
August 2025 saw critical CVEs surface, including high-impact flaws in WinRAR and Microsoft SharePoint. This blog highlights the most urgent vulnerabilities, their potential business risks, and the patch actions security teams should prioritize to ...
The Midnight Blizzard cyberspies used compromised websites to trick users into authorizing devices they controlled.
The post Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users appeared first on SecurityWeek.
The vulnerability (CVE-2025-55177) was exploited along an iOS/macOS zero-day in suspected spyware attacks.
The post WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users appeared first on SecurityWeek.
In the early 1960s, National Security Agency cryptanalyst and cryptanalysis instructor Lambros D. Callimahos coined the term “Stethoscope” to describe a diagnostic computer program used to unravel the internal structure of pre-computer ...
AI is becoming an autonomous exploit engine. Experts warn of an AI-driven vulnerability crisis — but resilience, alliances, and action can blunt the impact.
The post The AI Vulnerability Crisis is Coming — Can Defenders Catch Up? appeared ...
Recently, Gartner released “Hype Cycle for APIs, 2025”, NSFOCUS was selected as a Representative vendor in API Threat Protection of Hype Cycle with its cloud-native API security solution. We believe, this recognition reflects NSFOCUS’s ...
When you’re running on public cloud services like AWS, Azure, or Google Cloud, keeping track of what you actually have out there is easier said than done. The cloud is constantly moving, virtual machines pop up, containers spin down, databases ...
Quantum Is Closer Than You Think—So Why Are You Still Encrypting Like It’s 2015?
madhav
Tue, 09/02/2025 - 05:43
Not long ago, the idea that quantum computers could one day break today’s strongest encryption felt like science fiction. ...
A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team at Texas Tech University, the framework brings together two ideas: distributed monitoring at the edge and AI-driven ...