Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Strategic acquisitions marks Palo Alto Networks' formal entry into the identity security space and accelerates its platform strategy. The post Palo Alto Networks to Acquire CyberArk for $25 Billion appeared first on SecurityWeek.
In this article, we will provide a brief overview of Pillar Security's platform to better understand how they are tackling AI security challenges. Pillar Security is building a platform to cover the entire software development and deployment lifecycle with the goal of providing trust in AI systems. Using its holistic approach, the platform introduces new ways of detecting AI threats, beginning
Apple on Tuesday released security updates for its entire software portfolio, including a fix for a vulnerability that Google said was exploited as a zero-day in the Chrome web browser earlier this month. The vulnerability, tracked as CVE-2025-6558 (CVSS score: 8.8), is an incorrect validation of untrusted input in the browser's ANGLE and GPU components that could result in a sandbox escape via
Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices. "The flaws, affecting the device's ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device,"
A brand-new cyberattack vector allows threat actors to use a poisoned browser extension to inject malicious prompts into all of the top generative AI tools on the market, including ChatGPT, Gemini, and others.
Orange was targeted by hackers in an attack that resulted in the disruption of services offered to corporate and individual customers. The post Telecom Giant Orange Hit by Cyberattack appeared first on SecurityWeek.
The Israeli startup helps organizations identify, monitor, and control AI agents across their environments. The post Cyata Emerges From Stealth With $8.5 Million in Funding appeared first on SecurityWeek.
Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities. The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access to
The global average cost of a breach fell to $4.44 million (the first decline in five years), but the average US cost rose to a record $10.22 million. The post Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report appeared first on SecurityWeek.
Base44 owner Wix quickly patched a critical authentication bypass vulnerability discovered by researchers at Wiz. The post Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications appeared first on SecurityWeek.
βWhoβs winning on the internet, the attackers or the defenders?β Iβm asked this all the time, and I can only ever give a qualitative hand-wavy answer. But Jason Healey and Tarang Jainβs latest Lawfare piece has amassed data. The essay provides the first framework for metrics about how we are all doing collectivelyβand not just how an individual network is doing. Healey wrote to me in email: The work rests on three key...
Minnesota Governor Tim Walz called in the National Guard to assist the City of Saint Paul in responding to a cyberattack. The post Minnesota Activates National Guard in Response to Cyberattack appeared first on SecurityWeek.
The agency has two months to publish its final rule. It will not meet that mark, but a new CISA director has the tools to move the program forward. The post CISA is facing a tight CIRCIA deadline. Hereβs how Sean Plankey can attempt to meet it appeared first on CyberScoop.
IBMβs yearly report finds that a data breach now costs U.S. organizations more than $10 million for recovery. The post Research shows data breach costs have reached an all-time high appeared first on CyberScoop.
Google has announced that it's making available a security feature called Device Bound Session Credentials (DBSC) in open beta to ensure that users are safeguarded against session cookie theft attacks. DBSC, first introduced as a prototype in April 2024, is designed to bind authentication sessions to a device so as to prevent threat actors from using stolen cookies to sign-in to victims'
The National Treasury of South Africa is among the half-dozen known victims in South Africa β along with other nations β of the mass compromise of on-premises Microsoft SharePoint servers.
Threat actors have been observed exploiting a now-patched critical SAP NetWeaver flaw to deliver the Auto-Color backdoor in an attack targeting a U.S.-based chemicals company in April 2025. "Over the course of three days, a threat actor gained access to the customer's network, attempted to download several suspicious files and communicated with malicious infrastructure linked to Auto-Color
Google Cloud's Mandiant Consulting has revealed that it has witnessed a drop in activity from the notorious Scattered Spider group, but emphasized the need for organizations to take advantage of the lull to shore up their defenses. "Since the recent arrests tied to the alleged Scattered Spider (UNC3944) members in the U.K., Mandiant Consulting hasn't observed any new intrusions directly
Minnesota Gov. Tim Walz activated the state national guard to help respond to an ongoing cyberattack on the state's capital city. The post Minnesota governor activates National Guard amid St. Paul cyberattack appeared first on CyberScoop.
The emerging cybercriminal gang, which initially targeted Microsoft Windows systems, is looking to go cross-platform using sophisticated, multithread encryption.
The Oregon Democrat has vowed to place a hold on the nomination to lead the agency until CISA releases the report. The post CISA says it will release telecom security report sought by Sen. Wyden to lift hold on Plankey nomination appeared first on CyberScoop.
Vulnerabilities discovered by Binarly in Lenovo devices allow privilege escalation, code execution, and security bypass. The post Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment appeared first on SecurityWeek.
Cybersecurity researchers have disclosed a now-patched critical security flaw in a popular vibe coding platform called Base44 that could allow unauthorized access to private applications built by its users. "The vulnerability we discovered was remarkably simple to exploit -- by providing only a non-secret 'app_id' value to undocumented registration and email verification endpoints, an attacker
The maintainers of the Python Package Index (PyPI) repository have issued a warning about an ongoing phishing attack that's targeting users in an attempt to redirect them to fake PyPI sites. The attack involves sending email messages bearing the subject line "[PyPI] Email verification" that are sent from the email address noreply@pypj[.]org (note that the domain is not "pypi[.]org"). "This is
A now-patched authentication issue on the popular vibe-coding platform gave unauthorized users open access to any private application on Base44.
With the right IGA tools, governance policies, and risk thresholds, enterprises can continuously detect and act on rogue access before attackers do.
The open source security firm will use the investment to enhance go-to-market efforts and accelerate platform expansion. The post Seal Security Raises $13 Million to Secure Software Supply Chain appeared first on SecurityWeek.
A newly emerged ransomware-as-a-service (RaaS) gang called Chaos is likely made up of former members of the BlackSuit crew, as the latter's dark web infrastructure has been the subject of a law enforcement seizure. Chaos, which sprang forth in February 2025, is the latest entrant in the ransomware landscape to conduct big-game hunting and double extortion attacks. "Chaos RaaS actors initiated
Researchers discovered backdoors, poisoned code, and malicious commits in some of the more popular tool developers, jeopardizing software supply chains.
Promptfoo has raised $18.4million in Series A funding to help organizations secure LLMs and generative AI applications. The post Promptfoo Raises $18.4Million for AI Security Platform appeared first on SecurityWeek.
The need for secure encryption in IoT and IIoT devices is obvious, and potentially critical for OT and, by extension, much of the critical infrastructure. The post Order out of Chaos β Using Chaos Theory Encryption to Protect OT and IoT appeared first on SecurityWeek.
Until recently, the cyber attacker methodology behind the biggest breaches of the last decade or so has been pretty consistent: Compromise an endpoint via software exploit, or social engineering a user to run malware on their device; Find ways to move laterally inside the network and compromise privileged identities; Repeat as needed until you can execute your desired attack β usually
The TCC bypass could expose information cached by Apple Intelligence, including geolocation and biometric data. The post Sploitlight: macOS Vulnerability Leaks Sensitive Information appeared first on SecurityWeek.
Dropzone AI has announced a Series B funding round led by Theory Ventures to boost its AI SOC solution. The post Dropzone AI Raises $37 Million for Autonomous SOC Analyst appeared first on SecurityWeek.
Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that's targeting Android and iOS platforms with fake dating, social networking, cloud storage, and car service apps to steal sensitive personal data. The cross-platform threat has been codenamed SarangTrap by Zimperium zLabs. Users in South Korea appear to be the primary focus. "This extensive campaign involved