Application Security News and Articles


Windows 10: How to get security updates for free until 2026

Users who want to stick with Windows 10 beyond its planned end-of-support date but still receive security updates, can enroll into the Windows 10 Extended Security Updates (ESU) program, Microsoft has confirmed on Tuesday. Microsoft’s ...

SonicWall Warns of Trojanized NetExtender Stealing User Information

SonicWall says a modified version of the legitimate NetExtender application contains information-stealing code. The post SonicWall Warns of Trojanized NetExtender Stealing User Information appeared first on SecurityWeek.

New Vulnerabilities Expose Millions of Brother Printers to Hacking

Rapid7 has found several serious vulnerabilities affecting over 700 printer models from Brother and other vendors.  The post New Vulnerabilities Expose Millions of Brother Printers to Hacking appeared first on SecurityWeek.

What LLMs Know About Their Users

Simon Willison talks about ChatGPT’s new memory dossier feature. In his explanation, he illustrates how much the LLM—and the company—knows about its users. It’s a big quote, but I want you to read it all. Here’s a prompt you can use to ...

Why Sincerity Is a Strategic Asset in Cybersecurity

Strong security doesn’t just rely on tools—it starts with trust, clarity, and sincerity from the top down. The post Why Sincerity Is a Strategic Asset in Cybersecurity appeared first on SecurityWeek.

Code Execution Vulnerability Patched in GitHub Enterprise Server

A high-severity vulnerability in GitHub Enterprise Server could have allowed remote attackers to execute arbitrary code. The post Code Execution Vulnerability Patched in GitHub Enterprise Server appeared first on SecurityWeek.

Mastercard adds secure on-chain access to crypto

Mastercard and Chainlink are teaming up to power Swapper Finance, a new way to buy crypto directly from decentralized exchanges (DEXs) using any Mastercard. Holders of Mastercard’s 3.5 billion cards around the world will now be able to ...

How to Tame Your Multi-Cloud Attack Surface with Pentesting

Let’s face it most organizations aren’t using just one cloud provider anymore. Maybe your dev team loves AWS. Your analytics team prefers GCP. And someone else decided Azure was better... The post How to Tame Your Multi-Cloud Attack Surface ...

Chrome 138, Firefox 140 Patch Multiple Vulnerabilities

Chrome 138 and Firefox 140 are rolling out with fixes for two dozen vulnerabilities, including high-severity memory safety issues. The post Chrome 138, Firefox 140 Patch Multiple Vulnerabilities appeared first on SecurityWeek.

XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up

XBOW has raised $75 million in Series B funding to grow its AI-driven offensive security platform. The round was led by Altimeter’s Apoorv Agrawal, with participation from existing investors Sequoia Capital and Nat Friedman. This brings ...

Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People

Mainline Health and Select Medical Holdings have suffered data breaches that affect more than 100,000 individuals.  The post Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People appeared first on SecurityWeek.

How Secure Login Enhances the Accuracy of Your Marketing Dashboards

A clean login flow does more than protect your data—it keeps every metric on your dashboard trustworthy. Discover how authentication choices go through attribution, segmentation and forecasting. Learn which secure-login practices deliver the ...

Russian APT Hits Ukrainian Government With New Malware via Signal

Russia-linked APT28 deployed new malware against Ukrainian government targets through malicious documents sent via Signal chats. The post Russian APT Hits Ukrainian Government With New Malware via Signal appeared first on SecurityWeek.

BackBox 8.0 empowers organizations to strengthen their cyber resilience strategy

BackBox announced the upcoming release of BackBox 8.0, a significant advancement engineered to address the complex and often disparate challenge of securing modern networks that blend traditional on-premise hardware with burgeoning cloud-managed ...

The tiny amplifier that could supercharge quantum computing

Quantum computers are built to handle problems that are far too complex for today’s machines. They could lead to major advances in areas like drug development, encryption, AI, and logistics. Photo by Chalmers University of Technology Now, ...

Abstract Security unveils cloud-native cold storage for security telemetry

Abstract Security announced LakeVilla, a cloud-native cold storage solution built for long-term security telemetry retention that delivers compliance-ready, highly accessible storage at a fraction of SIEM costs—without compromising on ...

Why the SOC needs its “Moneyball” moment

In the classic book and later Brad Pitt movie Moneyball, the Oakland A’s didn’t beat baseball’s giants by spending more – they won by thinking differently, scouting players not through gut instinct and received wisdom, but by ...

From posture to prioritization: The shift toward unified runtime platforms

In this Help Net Security interview, Rinki Sethi, Chief Security Officer at Upwind, discusses how runtime platforms help CISOs shift from managing tools to managing risk. She encourages CISOs to position runtime as a practical layer for real-time ...

Moving Beyond Static Credentials in Cloud-Native Environments

5 min readStatic credentials, like hardcoded API keys and embedded passwords, have long been a necessary evil. But in distributed, cloud-native environments, these static credentials have become a growing source of risk, operational friction, and ...

Managing Encryption Keys vs. Access Keys

6 min readNot all keys are created equal, and treating them as if they are can quietly introduce risk. The post Managing Encryption Keys vs. Access Keys appeared first on Aembit. The post Managing Encryption Keys vs. Access Keys appeared first on ...