Application Security News and Articles


1.1 Million Unique Records Identified in Allianz Life Data Leak

Have I Been Pwned has analyzed the information made public by the hackers who recently targeted Allianz Life. The post 1.1 Million Unique Records Identified in Allianz Life Data Leak appeared first on SecurityWeek.

New Research Links VPN Apps, Highlights Security Deficiencies

Citizen Lab has identified links between multiple VPN providers, and multiple security weaknesses in their mobile applications. The post New Research Links VPN Apps, Highlights Security Deficiencies appeared first on SecurityWeek.

Policy-as-Code and Automated Governance for Open-Source Security

For architects and engineers, the speed of cloud-native development is a major advantage. However, this speed can introduce significant…Continue reading on Medium »

Git 2.51: Preparing for the future with SHA-256

Git 2.51 is out, and the release continues the long process of modernizing the version control system. The update includes several technical changes, but one of the most important areas of work is Git’s move toward stronger cryptographic ...

IoT Security

As the Internet of Things (IoT) continues to transform industries and daily lives, security has become one of the most critical challenges organizations face. From smart homes and connected cars to industrial systems and healthcare devices, IoT ...

OWASP Security Misconfiguration: Quick guide

Security misconfiguration is a significant concern, in the OWASP Top 10. During our web application penetration tests, we often discover numerous vulnerabilities of this nature. According to OWASP, this issue impacts nearly 90% of all web ...

What happens when penetration testing goes virtual and gets an AI coach

Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to close that gap. Researchers from the University of Bari Aldo Moro propose using Cyber Digital Twins (CDTs) and ...

As AI grows smarter, your identity security must too

AI is no longer on the horizon, it’s already transforming how organizations operate. In just a few years, we’ve gone from isolated pilots to enterprise-wide adoption. According to a recent SailPoint survey, 82% of companies are running AI ...

Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield

From hacked satellites to nuclear threats in orbit, the battle for dominance beyond Earth is redefining modern warfare and national security. The post Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New ...

Cooking with Code: A DevOps Kitchen Secured by Thales

Cooking with Code: A DevOps Kitchen Secured by Thales madhav Tue, 08/19/2025 - 05:13 In today’s hyperconnected digital world, deploying applications is a lot like running a high-performance, Michelin-star kitchen. You need the right setup, a ...

Understand Identity Verification Services

Ensuring that users are who they claim to be is more important than ever. Identity verification services play a crucial role in preventing fraud, enhancing secu The post Understand Identity Verification Services appeared first on Security Boulevard.

The cybersecurity myths companies can’t seem to shake

Cybersecurity myths are like digital weeds: pull one out, and another quickly sprouts in its place. You’ve probably heard them before: Macs don’t get viruses, we’re too small to be a target, or changing passwords often keeps us safer. ...

Cofense Unveils Vision 3.0 with Sub-Minute Threat Containment Capabilities and Deeper Insights

Now supporting hybrid environments, Vision 3.0 introduces “Who Clicked” to track and identify user engagement with phishing emails for faster, more targeted response The post Cofense Unveils Vision 3.0 with Sub-Minute Threat Containment ...

What makes airport and airline systems so vulnerable to attack?

In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport systems are so difficult to secure. He explores the complex aviation ecosystem, from legacy systems and third-party vendors to the ...

Cybersecurity jobs available right now: August 19, 2025

Senior Cybersecurity Analyst DOT Security | USA | On-site – View job details As a Senior Cybersecurity Analyst, you will lead the investigation of real-time alerts from SIEM platforms and other security tools, ensuring timely ...

The 9 Types of PCI SAQs and Applicability

Key Takeaways SAQ eligibility depends on exactly how you accept payments, how you handle cardholder data, and how your payment systems connect to the rest of your environment. The PCI Security Standards Council defines the SAQ types, but your ...

FireTail at Black Hat USA 2025: Finalist in the Startup Spotlight – FireTail Blog

Aug 18, 2025 - Lina Romero - Title: FireTail at Black Hat USA 2025: Finalist in the Startup Spotlight FireTail was one of just four finalists competing at Black Hat’s Startup Spotlight this year. FireTail was one of four startups selected as a ...

Blackhat 2025 – Test AI before you trust

At Blackhat, there wasn’t a space of 10 feet not festooned with vapid promises of AI curing – basically everything in security. During an AI summit here, multiple tens of would-be AI security contenders, sometimes with little else but a PhD ...

Workday Confirms Data Breach Tied to Salesforce Attacks

A New Corporate Victim in a Broader CRM Exploitation Campaign Workday, one of the world’s leading human capital management (HCM) software providers, has confirmed it was impacted in a recent string of coordinated cyberattacks targeting ...

Why the Email Security Battle Feels Lost (At Least for Now)

Despite better tools and growing awareness, phishing and impersonation attacks remain rampant. The post Why the Email Security Battle Feels Lost (At Least for Now) appeared first on Security Boulevard.