Application Security News and Articles


Chrome 135, Firefox 137 Updates Patch Severe Vulnerabilities

Chrome 135 and Firefox 137 updates have been rolled out with patches for critical- and high-severity vulnerabilities. The post Chrome 135, Firefox 137 Updates Patch Severe Vulnerabilities appeared first on SecurityWeek.

Oracle Patches 180 Vulnerabilities With April 2025 CPU

Oracle’s April 2025 Critical Patch Update contains 378 security patches that resolve approximately 180 unique CVEs. The post Oracle Patches 180 Vulnerabilities With April 2025 CPU appeared first on SecurityWeek.

Internet Giants Agree to Reduce TLS Certificate Lifespan to 47 Days by 2029

Major companies have agreed to gradually reduce the lifetime of TLS certificates over the next few years. The post Internet Giants Agree to Reduce TLS Certificate Lifespan to 47 Days by 2029 appeared first on SecurityWeek.

Alert: Security Gaps Allow Bots to Exploit UK Driving Test Booking System

DataDome conducted a security assessment of the UK's online driving test booking system and identified several vulnerabilities in the system’s protection mechanisms. The post Alert: Security Gaps Allow Bots to Exploit UK Driving Test Booking ...

Shadow IT in 2025: 5 Teams Most Likely to Use Shadow IT Apps

Shadow IT is reshaping enterprise risk. Learn which departments lead shadow SaaS adoption, why it’s growing, and how to gain control before security gaps widen. The post Shadow IT in 2025: 5 Teams Most Likely to Use Shadow IT Apps appeared ...

How Predictive AI in Cardiology is Fueling the Next Wave of Digital Health Innovation

Cardiovascular diseases (CVDs) remain the leading cause of morbidity and mortality worldwide, despite significant advancements in diagnosis and treatment. However, the integration of artificial intelligence...Read More The post How Predictive AI ...

Cato Networks unveils GenAI security controls for Cato CASB

Cato Networks introduced GenAI security controls for Cato CASB (Cloud Access Security Broker). Cato CASB, a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for GenAI applications including a shadow AI ...

In a Social Engineering Showdown: AI Takes Red Teams to the Mat 

That AI has gotten much more proficient in social engineering is a revelation that's not surprising, but still sets alarm bells ringing. The post In a Social Engineering Showdown: AI Takes Red Teams to the Mat  appeared first on Security Boulevard.

American [Cyber] Sigh

A long, long time ago I can still remember How those CVEs would make me smile And I knew if I had my chance To patch a vuln or take a stance Maybe we’d be secure for a while But April ides made me shiver With each leaked memo and press release ...

NEC Identity Cloud Service simplifies identity verification

NEC introduces Identity Cloud Service (ICS), a new identity verification solution to deliver streamlined, secure and cost-effective access management. Based on NEC’s biometric technology, ICS provides verification and search capabilities for ...

When companies merge, so do their cyber threats

For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, ...

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as increased volumes of advanced cyber threats, if they ...

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and combine offensive techniques to reach their objectives, Attack Flow offers defenders, analysts, ...

The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t stop phishing or credential stuffing. ...

Browser extensions make nearly every employee a potential attack vector

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according to LayerX. Most extensions have access to sensitive data 99% of enterprise users have at least one ...

MITRE CVE Program Funding Set To Expire

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be ...

Introducing Wyo Support – ADAMnetworks LTP

ADAMnetworks is excited to announce Wyo Support to the family of Licensed Technology Partners. “After working with the various systems and technologies, there are few that compare with the protection that ADAMnetworks provides. It reduces ...

How Safe Are Your Non-Human Identities?

Are Your Non-Human Identities Secure? Where interactions between software, applications, and API components are crucial for seamless processes, Non-Human Identifies (NHIs) and their security cannot be overlooked. NHIs are machine identities that ...

How to Feel Reassured with Cloud Data Security

Why is Cloud Data Security vital for Modern Businesses? Cloud data security has grown to be an inherent part of businesses across various industries today, ranging from financial services and healthcare to travel and DevOps. But, amidst this ...

MITRE Warns CVE Program Faces Disruption Amid US Funding Uncertainty

MITRE warns of a deterioration of national vulnerability databases and advisories, slowed vendor reaction and limited response operations. The post MITRE Warns CVE Program Faces Disruption Amid US Funding Uncertainty appeared first on SecurityWeek.