Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
The deal reflects growing cybersecurity concerns as companies rapidly deploy artificial intelligence systems. The post F5 to acquire AI security firm CalypsoAI for $180 million appeared first on CyberScoop.
In May 2025, the European Union levied financial sanctions on the owners ofStark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new data shows those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other...
The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to researchers.
Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard out of the box to verify the origin and history of digital content. To that end, support for C2PA's Content Credentials has been added to Pixel Camera and Google Photos apps for Android. The move, Google said, is designed to further digital media
Join the webinar as we reveal a new model for AI pen testing β one grounded in social engineering, behavioral manipulation, and even therapeutic dialogue. The post Webinar Today: Breaking AI β Inside the Art of LLM Pen Testing appeared first on SecurityWeek.
U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for what he called "gross cybersecurity negligence" that enabled ransomware attacks on U.S. critical infrastructure, including against healthcare networks. "Without timely action, Microsoft's culture of negligent cybersecurity, combined with its de facto monopolization of the
High-severity flaws in IOS XR could lead to ISO image verification bypass and denial-of-service conditions. The post Cisco Patches High-Severity IOS XR Vulnerabilities appeared first on SecurityWeek.
LNER said the security incident involved a third-party supplier and resulted in contact information and other data being compromised. The post UK Train Operator LNER Warns Customers of Data Breach appeared first on SecurityWeek.
Google patched a critical use-after-free vulnerability in Chrome that could potentially lead to code execution. The post Critical Chrome Vulnerability Earns Researcher $43,000 appeared first on SecurityWeek.
The Akira ransomware group is likely exploiting a combination of three attack vectors to gain unauthorized access to vulnerable appliances. The post Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw appeared first on SecurityWeek.
Researchers exploited K2 Thinkβs built-in explainability to dismantle its safety guardrails, raising new questions about whether transparency and security in AI can truly coexist. The post UAEβs K2 Think AI Jailbroken Through Its Own Transparency Features appeared first on SecurityWeek.
The tools manufacturer was targeted in a ransomware attack claimed by the Cactus group. The post 100,000 Impacted by Cornwell Quality Tools Data Breach appeared first on SecurityWeek.
Researchers thought a Russian APT used a compromised employee email to attack Kazakhstan's biggest oil company. The company later confirmed it was a pen test.
Researchers discovered that measures designed to make AI more transparent to users and regulators can also make it easier for bad actors to abuse.
With security teams drowning in alerts, many suppress detection rules and accept hidden risks. AI promises relief through automation and triageβbut without human oversight, it risks becoming part of the problem. The post AI Emerges as the Hopeβand Riskβfor Overloaded SOCs appeared first on SecurityWeek.
AegisAI uses autonomous AI agents to prevent phishing, malware, and BEC attacks from reaching inboxes. The post Email Security Startup AegisAI Launches With $13 Million in Funding appeared first on SecurityWeek.
CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective security stack. They understand how to staff out their organization. They understand the intricacies of compliance. They understand what it takes to reduce risk. Yet one question comes up again and again in our conversations with these security leaders: how do I make the impact
Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7 said it observed a spike in intrusions involving SonicWall appliances over the past month, particularly following reports about renewed Akira ransomware activity since late July 2025. SonicWall subsequently revealed the SSL VPN activity aimed at its
Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to steal sensitive data. The malvertising campaign, per Bitdefender, is designed to push fake "Meta Verified" browser extensions named SocialMetrics Pro that claim to unlock the blue check badge for Facebook and Instagram profiles. At least 37 malicious ads
As bad actors often simply waltz through companiesβ digital front doors with a key, hereβs how to keep your own door locked tight
Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management (RMM) software, to deliver a fleshless loader that drops a remote access trojan (RAT) called AsyncRAT to steal sensitive data from compromised hosts. "The attacker used ScreenConnect to gain remote access, then executed a layered VBScript and
The Oregon senator said Microsoftβs default settings for Windows and other products are enabling ransomware attacks, like the one against Ascension hospital system in 2024. The post Wyden calls on FTC to investigate Microsoft for βgross cybersecurity negligenceβ in protecting critical infrastructure appeared first on CyberScoop.
Two major hacking groups have pushed the bureau to adapt how they respond to stealthier, more patient attacks, a top FBI official said. The post Chinaβs βTyphoonsβ changing the way FBI hunts sophisticated threats appeared first on CyberScoop.
The threats may not be malicious, but they are more than many security teams can handle.
California, Colorado and Connecticut are contacting businesses that arenβt using legally mandated technology to provide consumers with universal opt-out rights. The post Three states team up in investigative sweep of companies flouting data opt-out laws appeared first on CyberScoop.
Chinese state-backed threat actors are suspected of posing as Michigan congressman John Moolenaar in a series of spear-phishing attacks.
An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a previously undocumented fileless malware framework called EggStreme. "This multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads," Bitdefender
After announcing that the cyberattack-caused disruption to factories would continue, Jaguar Land Rover is now confirming a data breach. The post Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack appeared first on SecurityWeek.
Disaster was averted after widely used open-source packages were compromised via social engineering. The post The npm incident frightened everyone, but ended up being nothing to fret about appeared first on CyberScoop.
The post Acting federal cyber chief outlines his three priorities for the next year appeared first on CyberScoop.
As Kubernetes becomes the foundation of enterprise infrastructure, the underlying operating system must evolve alongside it.
The system, a five-year effort to address memory safety βat scale,β is the result of spyware developers making zero-click exploits that targeted a deviceβs memory. The post Appleβs new Memory Integrity Enforcement system deals a huge blow to spyware developers appeared first on CyberScoop.
Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote access trojan (RAT) named ZynorRAT that can target both Windows and Linux systems. According to an analysis from Jamf Threat Labs, ChillyHell is written in C++ and is developed for Intel architectures. CHILLYHELL is the name assigned to a malware
Geordie has developed a platform that gives enterprises deep visibility into AI agents and what they are doing. The post Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform appeared first on SecurityWeek.
The investment will accelerate product innovation and will fuel the security companyβs expansion in the US. The post Red Access Raises $17 Million for Agentless Security Platform appeared first on SecurityWeek.