Application Security News and Articles


Perspective: Why Politics in the Workplace is a Cybersecurity Risk

Bringing politics into professional spaces undermines decision-making, collaboration, and ultimately weakens security teams. The post Perspective: Why Politics in the Workplace is a Cybersecurity Risk appeared first on SecurityWeek.

NIST SP 800-63B Rev. 4 Password Updates

Stay ahead of compliance with NIST 800-63B Rev 4. The latest password updates and how to enforce stronger security in Active Directory. The post NIST SP 800-63B Rev. 4 Password Updates appeared first on Security Boulevard.

Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel

Google’s Threat Intelligence Group and Mandiant have shared findings on a recent BrickStorm campaign linked to UNC5221. The post Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel appeared first on SecurityWeek.

CISO Spotlight: AJ Debole on the Business-Tech Divide, Breach Readiness, and AI Risks

AJ Debole is Field CISO at Oracle, but her journey began far from the corporate boardroom. After starting out in law and government, she moved into healthcare and cyber defense, where she led teams through ransomware crises.  In this spotlight, ...

CSA Unveils SaaS Security Controls Framework to Ease Complexity

New framework from the Cloud Security Alliance helps SaaS customers navigate the shared responsibility model with confidence. The post CSA Unveils SaaS Security Controls Framework to Ease Complexity appeared first on SecurityWeek.

Cisco fixes IOS/IOS XE zero-day exploited by attackers (CVE-2025-20352)

Cisco has fixed 14 vulnerabilities in IOS and IOS XE software, among them CVE-2025-20352, a high-severity vulnerability that has been exploited in zero-day attacks. About CVE-2025-20352 Cisco IOS software can be found on older models of Cisco ...

Post-Quantum Cryptography and the Future of Data Security

The post <b>Post-Quantum Cryptography and the Future of Data Security</b> appeared first on Sovy. The post Post-Quantum Cryptography and the Future of Data Security appeared first on Security Boulevard.

SpamGPT Amps Up Enterprise Email Security Threats 

Researchers warn that SpamGPT, an AI-powered spam and phishing toolkit, lowers the barrier for cybercriminals with scalable, evasive email attacks. The post SpamGPT Amps Up Enterprise Email Security Threats  appeared first on Security Boulevard.

Volvo Group Employee Data Stolen in Ransomware Attack

The Miljödata data breach has impacted numerous organizations, education institutions, and Swedish municipalities. The post Volvo Group Employee Data Stolen in Ransomware Attack appeared first on SecurityWeek.

Unmasking the Insider Seller: Dark Web Attribution

Nisos Unmasking the Insider Seller: Dark Web Attribution Most insider threat teams know what to watch for inside the network: unusual access requests, suspicious file movement, or behavior changes that trip internal tools... The post Unmasking ...

North Korean IT workers use fake profiles to steal crypto

ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active in recent years and focuses on stealing cryptocurrency. It targets freelance developers ...

Cisco Patches Zero-Day Flaw Affecting Routers and Switches

The security defect allows remote attackers with administrative privileges to execute arbitrary code as the root user. The post Cisco Patches Zero-Day Flaw Affecting Routers and Switches appeared first on SecurityWeek.

Why Security Tool Consolidation Can’t Fix Application Blindspot

Security tool consolidation fails because traditional security tools operate outside application runtime where attacks actually execute. While consolidation can reduce complexity and centralize alerts, it cannot fix the fundamental blindspot: ...

Constella Intelligence Appoints Andres Andreu as Chief Executive Officer

Industry veteran and recognized security leader to guide Constella’s next phase of growth in identity risk intelligence. Constella Intelligence, a global leader in identity risk intelligence, today announced the appointment of Andres Andreu as ...

The Engineering Leader’s Guide to Achieving Enterprise Readiness

Learn how to achieve enterprise readiness with SSO and CIAM solutions. This guide covers key considerations, implementation strategies, and best practices for engineering leaders. The post The Engineering Leader’s Guide to Achieving ...

Avoiding 2FA for Local Accounts: Best Practices

Explore best practices for avoiding 2FA on local accounts while maintaining strong security. Learn about alternative authentication methods and robust security policies. The post Avoiding 2FA for Local Accounts: Best Practices appeared first on ...

Secure Code Warrior gives CISOs visibility into developer AI tool usage

Secure Code Warrior has launched a beta program to expand the AI capabilities of its Trust Agent product. The new offering provides CISOs with security traceability, visibility, and governance over developers’ use of AI coding tools. This ...

Credit Unions Replaced Fragmented Tools With Seceon’s Platform

Credit unions are the financial lifeline for more than 139 million Americans. Built on a member-first philosophy, these not-for-profit institutions provide affordable banking, community trust, and financial empowerment. But in today’s ...

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes

Luxembourg, Luxembourg, 25th September 2025, CyberNewsWire The post Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes appeared first on Security Boulevard.

Thales Named a Leader in the Data Security Posture Management Market 

Thales Named a Leader in the Data Security Posture Management Market  madhav Thu, 09/25/2025 - 06:15 Most breaches begin with the same blind spot: organizations don’t know precisely what data they hold, or how exposed it is. Value and risk ...