Application Security News and Articles
Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
The post CodeSecCon 2025: Where Software ...
A survey of 587 CISOs published this week finds security budget growth dropped to 4%, down from 8% in 2024, with more than half reporting flat or shrinking budgets. Conducted by IANS Research and Artico Search, an executive search firm, the ...
In the wake of the high-profile data breaches of the popular and controversial Tea app, another app called TeaOnHer for men launched that not only copied many of Tea's features but also came with its own security flaws that expose user data. ...
Open source software (OSS) is the backbone of modern software development, empowering industries from finance and healthcare to government and technology to innovate faster and reduce costs. However, this widespread adoption brings a growing and ...
Creator/Author/Presenter: Mackenzie Jackson
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events ...
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
The post Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector appeared ...
Check out what CISA found after it dissected malware from the latest SharePoint hacks. Plus, the U.K.’s cyber agency is overhauling its cyber framework to keep pace as threats escalate. In addition, Google is warning that cloud attacks are ...
When we first teamed up with Malwarebytes, the goal was ambitious but straightforward: give Managed Service Providers (MSPs) a single, streamlined way to deliver true defense in depth for their customers. That meant uniting industry-leading ...
A survey of 200 North American security leaders found 63% see employees unintentionally giving AI agents access to sensitive data as the top internal threat.
The post Survey: AI Agents Are Now Biggest Threat to Cybersecurity appeared first on ...
Discover insights from The Elephant in AppSec episode with Sean Finley.
The post Why Your Security Program Might Be Failing Before It Even Starts ⎥ Sean Finley ⎥The Elephant in AppSec Podcast appeared first on Security Boulevard.
Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive.
The post In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment appeared ...
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) appeared first on SecurityWeek.
Columbia University has been targeted in a cyberattack where hackers stole the personal information of students, applicants, and employees.
The post Columbia University Data Breach Impacts 860,000 appeared first on SecurityWeek.
Identity Attacks: The Silent Killer of UK SMBs (And How to Thwart Them) When you think of a cyberattack, you might picture ransomware, phishing emails, or even hackers “breaking in” to your systems. But increasingly, attackers don’t need to ...
Dive into insights from BSides Las Vegas 2025: how identity hygiene, human ecosystems, structural resilience, and unpredictability define modern defenses.
The post Passwords, Resilience, And Being Human: Working Together For A Brighter Future At ...
At Black Hat and beyond, the real strength of cybersecurity is the people who show up, year after year, to protect, connect, and inspire.
The post The Lesson of Black Hat: It’s About the People, Stupid appeared first on Security Boulevard.
Ransomware isn’t dying — it’s evolving, swapping encryption for aggressive extortion as attacks and data theft hit record highs.
The post Ransomware: Still Dangerous After All These Years appeared first on Security Boulevard.
Bouygues has been targeted in a cyberattack that resulted in the personal information of millions of customers getting compromised.
The post French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers appeared first on SecurityWeek.
Location Spoofing or Geo Spoofing is the act of deliberately falsifying the geographical location of a device. This can be performed using various techniques such as GPS manipulation, tweaking OS settings, or by using specialized software that ...
July turned into a surprisingly busy month. It started slowly with a fairly ‘calm’ Patch Tuesday as I forecasted in my last blog. Although there were 130 new CVEs addressed across all the Microsoft releases, there was only one publicly ...