Application Security News and Articles


Neon Cyber Emerges From Stealth, Shining a Light Into the Browser

Neon Cyber argues that phishing, social engineering, and insider threats demand protections that follow users into the browser, where most attacks now begin. The post Neon Cyber Emerges From Stealth, Shining a Light Into the Browser appeared ...

Rowhammer Attack Demonstrated Against DDR5

Researchers devise Phoenix, a new Rowhammer attack that achieves root on DDR5 systems in less than two minutes. The post Rowhammer Attack Demonstrated Against DDR5 appeared first on SecurityWeek.

N-able strengthens backup threat protection

N-able has enhanced the capabilities of Cove Data Protection with the launch of Anomaly Detection as a Service (ADaaS). Strengthening Cove’s defense against cyberthreats, this service is built into Cove’s architecture with no additional ...

ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails

Researchers show how a crafted calendar invite can trigger ChatGPT to exfiltrate sensitive emails. The post ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails appeared first on SecurityWeek.

Cyber Essentials certification: What business need to know

Cyber security is essential. Cyber attacks can have devastating consequences for all businesses, regardless of size, including financial losses, reputational damage and loss of customer trust. Cyber Essentials accreditation can help you improve ...

Master regulatory compliance: Dominate change before it dominates you

Change is no longer the exception; it’s the baseline. As we move into 2025, regulatory compliance is morphing faster than many organizations anticipated. New laws, shifting political priorities, disruptive technologies such as AI and IoT, and ...

Fraud Prevention Company SEON Raises $80 Million in Series C Funding

The company will invest in its AI and real-time detection platform, in global expansion, and in strategic partnerships. The post Fraud Prevention Company SEON Raises $80 Million in Series C Funding appeared first on SecurityWeek.

GitHub adds post-quantum protection for SSH access

GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company’s preparation for a time when current encryption may no longer be safe. What GitHub is changing GitHub has introduced a new type of SSH key ...

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities

Apple has announced major mobile and desktop platform releases and addressed an exploited bug in older platforms. The post Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities appeared first on SecurityWeek.

Endpoint Security Firm Remedio Raises $65 Million in First Funding Round

The bootstrapped company will invest in an AI-powered unified enterprise platform combining configuration, compliance, patching, and vulnerability management. The post Endpoint Security Firm Remedio Raises $65 Million in First Funding Round ...

Innovation at Velocity: How Fractional Engineering Teams Accelerate AI Roadmaps

Your AI roadmap isn’t stuck because of bad ideas.It’s stuck because you’re building it with the wrong engine. Most enterprise agile IT teams were built...Read More The post Innovation at Velocity: How Fractional Engineering Teams Accelerate ...

Salt Security secures AI agent actions across enterprise APIs

Salt Security introduced a new solution designed to secure the actions AI agents take within the enterprise. As large organizations adopt agentic AI, agents are increasingly making real-time API calls through protocols like MCP and A2A, creating ...

Passwordless Authentication in Healthcare: Protecting Patient Data

Discover how passwordless authentication protects patient data, boosts compliance, and streamlines workflows in modern healthcare systems. The post Passwordless Authentication in Healthcare: Protecting Patient Data appeared first on Security ...

The Impact of Google’s JavaScript SERPs and AI Search on eCommerce Businesses

Google’s search engine results pages now require JavaScript, effectively “hiding” the listings from organic rank trackers, artificial intelligence models, and o The post The Impact of Google’s JavaScript SERPs and AI Search on eCommerce ...

Building security that protects customers, not just auditors

In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the lessons that can be learned from leading regions. He points out that good engineering usually leads to strong ...

How AI is Transforming Compliance Management?

Compliance management has seen a major transformation over the years, shifting from manual, paper-heavy processes to technology-driven approaches. In the past, organizations depended heavily on paperwork and human oversight to stay compliant, a ...

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential privacy techniques to prevent individual data points from being exposed, which makes it safer for handling ...

AI video surveillance could end privacy as we know it

AI-powered video surveillance brings up big questions about privacy. On one hand, it can make us feel safer, but on the other, it can easily cross the line into intrusion. The more we let technology watch and track our behavior, the harder it is ...

Improve Your Cyber Resilience with Data Security Platformization

Improve Your Cyber Resilience with Data Security Platformization madhav Tue, 09/16/2025 - 05:14 Data Security Lynne Murray | Director of Product Marketing for Data Security More About This Author > Today’s ...

Product showcase: Clean Links exposes what’s hiding behind a QR code

Clean Links is a handy app that shows you exactly where a link will take you before you click it. It strips out trackers, expands shortened URLs, and helps you avoid scams while saving you time and frustration. The best part? There’s no sign-up ...