Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Mini Shai-Hulud Supply Chain Attack Compromises Packages Compromised
May 19, 2026
Critical PostgreSQL Flaws Allow Code Execution & SQL
May 19, 2026
Critical Apache Flink Vulnerability Enables Remote code execution
May 19, 2026
Home/CyberSecurity News/Microsoft Edge Fails to Load Saved Passwords at Startup
CyberSecurity News

Microsoft Edge Fails to Load Saved Passwords at Startup

Microsoft Edge users will see a notable security improvement: the browser will no longer load saved passwords into process memory at startup. This change, announced by Microsoft, aims to bolster user...

Marcus Rodriguez
Marcus Rodriguez
May 19, 2026 2 Min Read
2 0

Microsoft Edge users will see a notable security improvement: the browser will no longer load saved passwords into process memory at startup. This change, announced by Microsoft, aims to bolster user data protection.

The change comes as part of the company’s broader Secure Future Initiative (SFI), which aims to strengthen defense-in-depth protections across its products.

The update follows a public disclosure by security researcher Tom Jøran Sønstebyseter Rønning, who found that Microsoft Edge loaded stored passwords into memory in clear text during browser startup.

While Microsoft acknowledged the finding, it clarified that the behavior aligned with its existing threat model and did not introduce a new security vulnerability.

According to Microsoft, the reported scenario assumes that an attacker already has control over the victim’s device.

In such cases, where malicious code can execute locally with elevated privileges, browsers and other applications are generally unable to prevent credential access.

Edge Stops Password Memory

This limitation is consistent across all modern browsers and is considered outside the scope of standard browser threat models.

Despite this, Microsoft emphasized that reducing unnecessary exposure of sensitive data remains a priority.

As a result, the company has implemented a defense-in-depth improvement to prevent passwords from being loaded into memory during startup.

“This change is a proactive step to minimize potential attack surfaces, even in scenarios that fall outside our defined security boundaries,” Microsoft stated.

The fix has already been deployed in Edge Canary builds and will be rolled out across all supported versions, including Stable, Beta, Dev, and Extended Stable channels.

The Microsoft Edge 148 update arrives automatically with no user action required.

Microsoft reassured users that there is no new exposure or increased risk associated with the previously reported behavior.

The company reiterated that access to in-memory credentials would only be possible if an attacker had already compromised the system at an advanced stage of intrusion beyond typical browser-level protections.

In addition to this change, Microsoft highlighted its continued investment in layered security mechanisms.

These include sandboxing technologies, renderer isolation, and proactive defenses such as the Scareware Blocker, which helps protect users from malicious websites.

The company also acknowledged the importance of the security research community. It indicated that it is reviewing its internal processes for handling vulnerability reports.

Microsoft plans to improve response speed, communication clarity, and the integration of defense-in-depth considerations earlier in the evaluation process.

This move reflects a broader industry trend toward hardening software against complex, multi-stage attacks.

By limiting how and when sensitive data, such as passwords, is exposed in memory, Microsoft Edge aims to reduce the risk of credential theft, even in edge-case scenarios.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Attackers Exfiltrate Files via Cloudflare Storage Endpoints

Next Post

Compromised GitHub Action Exfiltrates Workflow Credentials to

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Microsoft Edge Fails to Load Saved Passwords at Startup
May 19, 2026
Attackers Exfiltrate Files via Cloudflare Storage Endpoints
May 19, 2026
VoidStealer Malware Bypasses Chrome Encryption Chrome’s App-Bound
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us