Application Security News and Articles


IBM pushes toward quantum advantage by 2026 with new Nighthawk processor

IBM is taking another major step toward its goal of achieving quantum advantage by 2026 and fault-tolerant quantum computing by 2029, unveiling its most advanced quantum processor yet, IBM Quantum Nighthawk. IBM Quantum Nighthawk processor The ...

The Learning Counsel: 3 Steps to a Robust Zero-Trust Architecture in K-12 Schools This Year

This article was originally published in The Learning Counsel on 11/5/25 by Charlie Sander. It’s time for district leaders to turn your attention to cybersecurity strategy As the buzz around back-to-school season subsides and teachers and ...

High-Severity Vulnerabilities Patched by Ivanti and Zoom

Ivanti and Zoom resolved security defects that could lead to arbitrary file writes, elevation of privilege, code execution, and information disclosure. The post High-Severity Vulnerabilities Patched by Ivanti and Zoom appeared first on SecurityWeek.

On Hacking Back

Former DoJ attorney John Carlin writes about hackback, which he defines thus: “A hack back is a type of cyber response that incorporates a counterattack designed to proactively engage with, disable, or collect evidence about an attacker. ...

Google Paid Out $458,000 at Live Hacking Event

Researchers submitted 107 bug reports during the bugSWAT hacking event at the ESCAL8 conference in New Mexico. The post Google Paid Out $458,000 at Live Hacking Event appeared first on SecurityWeek.

Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215)

Microsoft has delivered a rather light load of patches for November 2025 Patch Tuesday: some 60+ vulnerabilities have received a fix, among them an actively exploited Windows Kernel flaw (CVE-2025-62215). CVE-2025-62215 CVE-2025-62215 is a memory ...

Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel

Intel, AMD and Nvidia have published security advisories describing vulnerabilities found recently in their products. The post Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel appeared first on SecurityWeek.

Avast delivers AI-powered protection for Android and iOS

Avast launched Scam Guardian and Scam Guardian Pro for mobile devices. Building on the desktop product, this mobile expansion brings in AI-powered scam protection directly to people’s smartphones and tablets. Scam Guardian is available at ...

Why we should start code signing LLM models

As AI models move from the cloud to edge devices, the risk of tampering grows. Unsigned language models can be manipulated, threatening integrity and trust. It’s time to apply code-signing principles to AI models because the machines are ...

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider

An Aveva vulnerability also impacts Schneider Electric products and both vendors have published advisories. The post ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider appeared first on SecurityWeek.

NSFOCUS Monthly APT Insights – September 2025

Regional APT Threat Situation In September 2025, the global threat hunting system of Fuying Lab detected a total of 24 APT attack activities. These activities were primarily concentrated in regions including East Asia, South Asia, as shown in the ...

When every day is threat assessment day

In this Help Net Security interview, Paul J. Mocarski, VP & CISO at Sammons Financial Group, discusses how insurance carriers are adapting their cybersecurity strategies. He explains how ongoing threat assessments, AI-driven automation, and ...

Bringing AI to the SOC is not Intended to Replace Humans 

Learn how to transform your traditional SOC into an AI-powered security hub with multi-agent collaboration, contextual intelligence, and business risk–driven insights. The post Bringing AI to the SOC is not Intended to Replace Humans  appeared ...

The Future of AI in Security: From Reactive to Proactive Protection 

Explore how AI is transforming cybersecurity from reactive threat response to proactive, predictive protection — while addressing ethics, privacy, and the human-AI balance. The post The Future of AI in Security: From Reactive to Proactive ...

Autonomous AI could challenge how we define criminal behavior

Whether we ever build AI that thinks like a person is still uncertain. What seems more realistic is a future with more independent machines. These systems already work across many industries and digital environments. Alongside human-to-human and ...

ProxyBridge: Open-source proxy routing for Windows applications

ProxyBridge is a lightweight, open-source tool that lets Windows users route network traffic from specific applications through SOCKS5 or HTTP proxies. It can redirect both TCP and UDP traffic and gives users the option to route, block, or allow ...

Shadow AI risk: Navigating the growing threat of ungoverned AI adoption

AI is transforming how businesses operate, but it’s also creating new, often hidden risks. As employees and business units eagerly embrace and experiment with AI solutions, many organizations are losing control over where and how AI is being ...

AI is forcing boards to rethink how they govern security

Boards are spending more time on cybersecurity but still struggle to show how investments improve business performance. The focus has shifted from whether to fund protection to how to measure its return and ensure it supports growth. AI, ...

What the latest data reveals about hard drive reliability

What really counts as a hard drive failure? That’s the question at the center of Backblaze’s Q3 2025 Drive Stats report, which tracks the performance of 328,348 hard drives across its global data centers. The latest findings build on more ...

Improving Single Sign-On Experiences with OpenID Connect and SCIM

Learn how to improve single sign-on (SSO) experiences using OpenID Connect (OIDC) and SCIM for streamlined authentication and user management. The post Improving Single Sign-On Experiences with OpenID Connect and SCIM appeared first on Security ...