Application Security News and Articles
Nine people have been arrested in a coordinated international operation targeting a large cryptocurrency money laundering network that defrauded victims of more than €600 million. The operation was led by Eurojust, the EU’s judicial ...
Apple has released iOS 26.1 and macOS Tahoe 26.1 with patches for over 100 vulnerabilities, including critical flaws.
The post Apple Patches 19 WebKit Vulnerabilities appeared first on SecurityWeek.
Microsoft Sentinel has rapidly become a cornerstone for security operations, offering powerful, cloud-native Security Information and Event Management (SIEM) capabilities. Security Operations Center (SOC) teams rely on it to get a unified view of ...
SPLX red teaming, asset management, and threat inspection technology will enable Zscaler to expand its Zero Trust Exchange platform.
The post Zscaler Acquires AI Security Company SPLX appeared first on SecurityWeek.
As October 2025 wraps up, Sonrai’s latest analysis of Google Cloud Platform permissions reveals both newly introduced privileged actions and those that have become newly enforceable through the V2 API, meaning organizations can now explicitly ...
The November 2025 Android patches resolve two vulnerabilities, both in the platform’s System component.
The post Android Update Patches Critical Remote Code Execution Flaw appeared first on SecurityWeek.
As October 2025 closes, Sonrai’s latest analysis of new AWS permissions reveals a continued trend: incremental privilege changes with outsized impact. This month’s additions span OpenSearch Ingestion, Aurora DSQL, QuickSight, Parallel ...
Dohop cut bot traffic by 70% with DataDome, blocking millions of scrapers and protecting 75+ airline partners from API overload and downtime.
The post Dohop Uses DataDome to Block Millions of Scrapers & Protect 75+ Airline Partners appeared ...
Cisco is introducing innovations to modernize campus, branch, and industrial networks to support the growing use of AI. Its solutions simplify operations, scale with evolving business needs, and enhance security, all of which are critical to ...
In this Help Net Security interview, Dr. Bernhards Blumbergs, Lead Cyber Security Expert at CERT.LV, discusses how cyberspace has become an integral part of national and military operations. He explains how countries develop capabilities to act ...
Zscaler has acquired AI security pioneer SPLX, extending the Zscaler Zero Trust Exchange platform with shift-left AI asset discovery, automated red teaming, and governance, so organizations can secure their AI investments from development through ...
Graylog launched its Graylog Security Fall 2025 release. The latest version introduces AI-driven insights, Model Context Protocol (MCP) Server Access, and Amazon Security Data Lake integration, enabling SOCs to operate with clarity, speed, and ...
System Audit is a mandatory technical and compliance assessment introduced by SEBI and implemented by the National Stock Exchange (NSE). Its primary purpose is to ensure that every trading member or broker operates secure, reliable, and compliant ...
Cisco announced a significant platform advancement designed to empower MSPs to deliver security services. This innovation adds foundational multi-customer management capabilities within Security Cloud Control, Cisco’s unified, AI-powered ...
Every organization manages thousands of identities, from admins and developers to service accounts and AI agents. But many of these identities operate in the shadows, untracked and unprotected. These unmanaged identities quietly expand your ...
The days when YouTube was just a place for funny clips and music videos are behind us. With 2.53 billion active users, it has become a space where entertainment, information, and deception coexist. Alongside everyday videos, the site has seen ...
In this Help Net Security video, Michael Engle, Chief Strategy Officer at 1Kosmos, explains how deepfakes are changing online identity verification. He describes how fake IDs and synthetic identities are being used for account signups and ...
In financial services, application security risk is becoming a long game. Fewer flaws appear in new code, but old ones linger longer, creating a kind of software “interest” that keeps growing, according to Veracode’s 2025 State of ...
Cybersecurity Architect Alstom | France | On-site – View job details As a Cybersecurity Architect, you will analyze solutions, identify associated risks, and propose security architecture models by involving various cybersecurity ...
Anyone remember the dot-com bubble burst? The early warning came in January 2000, when AOL and Time Warner joined forces in a $164 billion deal — the largest merger in U.S. history at the time.
Related: Reuters’ backstory on Amazon … ...