#cybersecurity

[ follow ]
Artificial intelligence
fromenglish.elpais.com
2 hours ago

Neuroscientists and military vets: the inner workings of the team that hacks' Microsoft's AI tools before their public debut

Microsoft emphasizes the importance of guardrails in AI usage, particularly regarding military applications and ethical considerations.
Artificial intelligence
fromTechRepublic
10 hours ago

AI Factories, Security Flaws, and Workforce Shifts Define This Week in Tech - TechRepublic

The race to build smarter AI systems is accelerating, bringing increased risks and costs across various tech sectors.
#phishing
Privacy technologies
fromTechRepublic
6 hours ago

Apple Mail's 'Trusted Sender' Label Misused in New Phishing Scheme

Apple Mail's 'trusted sender' label can mislead users, allowing phishing scams to exploit perceived familiarity without verifying sender legitimacy.
Information security
fromBusiness Matters
23 hours ago

How to build an effective employee phishing training program in 2026

Effective employee phishing training programs focus on behavior change and continuous education to reduce security risks and improve reporting rates.
#iran
Privacy professionals
fromTechCrunch
8 hours ago

U.S. accuses Iran's government of operating hacktivist group that hacked Stryker | TechCrunch

Iran's government is accused of operating the hacktivist group Handala, responsible for a cyberattack on Stryker.
Privacy professionals
fromTechCrunch
8 hours ago

U.S. accuses Iran's government of operating hacktivist group that hacked Stryker | TechCrunch

Iran's government is accused of operating the hacktivist group Handala, responsible for a cyberattack on Stryker.
Privacy professionals
fromSFGATE
8 hours ago

Bay Area city paralyzed by cyberattack

A ransomware attack has paralyzed Foster City's government and potentially compromised public data, prompting officials to declare a state of emergency.
Information security
fromComputerWeekly.com
8 hours ago

UK Cyber Monitoring Centre plans expansion in US amid risk of Category 5 attack | Computer Weekly

A UK initiative to measure the financial impact of cyber attacks will be replicated in the US due to increasing risks.
Remote teams
fromBusiness Matters
23 hours ago

Hybrid work continues to drive demand for virtual desktop infrastructure

52% of employees with remote-capable jobs work in hybrid arrangements, prompting organizations to rethink cybersecurity strategies.
#data-breach
Information security
fromSecurityWeek
8 hours ago

In Other News: New Android Safeguards, Operation Alice, UK Toughens Cyber Reporting

Unprotected databases and vulnerabilities in KVM devices highlight ongoing cybersecurity threats and the need for vigilance in protecting sensitive information.
Information security
fromTechRepublic
2 weeks ago

LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability

An unpatched React vulnerability in LexisNexis systems enabled hackers to access nearly 4 million database records, exposing thousands of accounts and 2 gigabytes of data across dark web platforms.
Privacy technologies
fromTheregister
2 weeks ago

Transport for London says 2024 breach affected 7M customers

Transport for London's 2024 data breach exposed over 7 million people's information, vastly exceeding the initial 5,000 customer estimate, with potential access to names, contact details, email addresses, home addresses, and bank account data.
Information security
fromSecurityWeek
8 hours ago

In Other News: New Android Safeguards, Operation Alice, UK Toughens Cyber Reporting

Unprotected databases and vulnerabilities in KVM devices highlight ongoing cybersecurity threats and the need for vigilance in protecting sensitive information.
Privacy professionals
fromSecuritymagazine
2 days ago

8M Confidential Crime Tips Hacked, Compromised

A hacker group breached P3 Global Intel's tip platform, compromising over 8 million confidential tips totaling 93 gigabytes, revealing unencrypted data and secret de-anonymization capabilities despite promised anonymity.
Privacy professionals
fromSecuritymagazine
4 days ago

Verizon Retail Customer Database Allegedly for Sale by Hackers: 6.3M Customers at Risk

Russell Cellular, a major Verizon Authorized Retailer, may have suffered a data breach exposing over 6.3 million customer records, with a 61GB database allegedly sold on a hacker forum for $1,200.
Privacy professionals
fromSecurityWeek
5 days ago

Loblaw Data Breach Impacts Customer Information

Loblaw, Canada's largest food and pharmacy retailer, suffered a data breach exposing customer names, emails, and phone numbers, though passwords, health information, and credit card data remained secure.
Business
from24/7 Wall St.
14 hours ago

The $87 Billion Reason Tech ETFs Are About to Move

Three tech ETFs show divergent performances in 2026, reflecting market preference for focused investments over broader exposure.
Information security
fromTheregister
11 hours ago

Feds disrupt IoT botnets behind record-breaking DDoS attacks

The US government disrupted major IoT botnets responsible for record DDoS attacks, compromising over three million devices worldwide.
Information security
fromSecuritymagazine
1 day ago

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Cybersecurity practitioners face data overload, struggling to extract meaningful insights while focusing on relevant threats to reduce business risk.
UK politics
fromTheregister
11 hours ago

JLR cyber bailout risks dangerous precedent, watchdog warns

The UK's £1.5 billion bailout of Jaguar Land Rover risks creating a troubling precedent for handling major cyber crises without clear criteria.
Information security
fromwww.dw.com
12 hours ago

Germany: Police dismantle major cyberattack 'botnets'

Investigators shut down Aisuru and Kimwolf botnets, which used millions of infected devices for large-scale DDoS attacks, posing significant threats to IT infrastructure.
Information security
fromSecurityWeek
13 hours ago

Thousands of Magento Sites Hit in Ongoing Defacement Campaign

Over 7,500 Magento sites were defaced in a campaign exploiting file upload vulnerabilities, affecting global brands and various organizations.
Information security
fromSecurityWeek
15 hours ago

Allure Security Raises $17 Million for Online Brand Protection

Allure Security raised $17 million in Series B funding, totaling $43 million, to enhance its AI platform for brand protection against fraud.
Information security
fromSecurityWeek
15 hours ago

Critical Langflow Vulnerability Exploited Hours After Public Disclosure

Threat actors exploited a critical Langflow vulnerability for remote code execution within 20 hours of its public disclosure.
Information security
fromSecurityWeek
16 hours ago

Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation

The US Justice Department disrupted several IoT botnets used for DDoS attacks, targeting Aisuru, Kimwolf, JackSkid, and Mossad.
Information security
fromThe Hacker News
17 hours ago

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

The U.S. Department of Justice disrupted several IoT botnets, including AISURU and Kimwolf, in a coordinated international law enforcement operation.
fromAxios
1 day ago

Scoop: Anthropic meets with House Homeland Security behind closed doors

The discussion focused largely on issues like model distillation - shrinking powerful AI systems into smaller versions - and export controls. The Pentagon dispute was not a central focus of the conversation, per two sources. The tone of the meeting was "friendly," according to multiple sources.
Artificial intelligence
Bootstrapping
fromEntrepreneur
1 day ago

Economic Outlook: What's in Store for Small Business in 2026

Small businesses adopting digital-first models, optimizing cross-border payments, managing cash flow strategically, and investing in cybersecurity will build resilience and achieve sustainable growth in 2026.
fromSecuritymagazine
2 days ago

Stryker Update: FBI Seizes Website of Iran-Linked Hackers

Law enforcement authorities determined this domain was used to conduct, facilitate, or support malicious cyber activities on behalf of, or in coordination with, a foreign state actor.
Privacy professionals
Information security
fromComputerWeekly.com
1 day ago

Cisa tells US organisations to harden endpoint management after Stryker attack | Computer Weekly

CISA urges organizations to immediately harden endpoint management system configurations following cyber attacks on Stryker and other firms by Iran-linked threat actors.
Privacy professionals
fromTechCrunch
1 day ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
Information security
fromTechCrunch
1 day ago

CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices | TechCrunch

Pro-Iran hackers breached Stryker's device management systems and mass-wiped thousands of employee devices, prompting CISA to urge companies to implement multi-administrator approval for sensitive endpoint changes.
Information security
fromThe Hacker News
2 days ago

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Interlock ransomware exploits critical Cisco Secure Firewall vulnerability CVE-2026-20131 as zero-day since January 26, 2026, enabling unauthenticated remote code execution with root privileges.
Privacy technologies
fromSecuritymagazine
3 days ago

Fear of Surveillance Leads to Increased VPN Use

36% of U.S. adults use VPNs, primarily to prevent tracking by private companies (65%) and government surveillance (35%), with privacy and security cited as the dominant motivation by 65% of users.
#fraud-prevention
Information security
fromTNW | Google
3 days ago

Big Tech signs Industry Accord Against Online Scams

Eleven major companies committed to sharing threat intelligence and coordinating defenses against AI-driven fraud through Google's Global Signal Exchange platform.
Privacy technologies
fromTechRepublic
5 days ago

Google, Microsoft, Amazon, and Others Unite Under New Anti-Scam Pact

Eleven major tech companies formed the Online Services Accord Against Scams to coordinate fraud prevention across platforms through shared intelligence, best practices, and AI-powered tools.
Privacy technologies
fromEngadget
4 days ago

Tech companies are teaming up to combat scammers

Major tech companies signed the Online Services Accord Against Scams to implement unified fraud detection, security features, and verification measures across platforms while encouraging information sharing with law enforcement.
Information security
fromTNW | Google
3 days ago

Big Tech signs Industry Accord Against Online Scams

Eleven major companies committed to sharing threat intelligence and coordinating defenses against AI-driven fraud through Google's Global Signal Exchange platform.
Privacy technologies
fromTechRepublic
5 days ago

Google, Microsoft, Amazon, and Others Unite Under New Anti-Scam Pact

Eleven major tech companies formed the Online Services Accord Against Scams to coordinate fraud prevention across platforms through shared intelligence, best practices, and AI-powered tools.
Privacy technologies
fromEngadget
4 days ago

Tech companies are teaming up to combat scammers

Major tech companies signed the Online Services Accord Against Scams to implement unified fraud detection, security features, and verification measures across platforms while encouraging information sharing with law enforcement.
Privacy professionals
fromwww.housingwire.com
3 days ago

Reducing risk: Why logging, protection, and review matter

Application logs are critical cybersecurity safeguards that provide visibility into system behavior, enabling early detection of security threats and operational issues in real estate and mortgage lending organizations.
Information security
fromSecuritymagazine
4 days ago

Document Protection: Why Hybrid Storage Is the Future of Security

A hybrid approach combining digital storage for frequently accessed documents and physical storage for sensitive historical information provides optimal security and efficiency.
fromGlobal IP & Technology Law Blog
4 days ago

At A Crossroads Issue #3

Connected vehicles are becoming software-defined, sensor-rich, and permanently online. This evolution expands both legal exposure across sectors and legal frameworks that were traditionally unfamiliar for the automotive and transportation industry: (i) telecoms licensing and cross-border connectivity, (ii) data protection and data-sharing (e.g. with insurers/ad-tech), (iii) cybersecurity and safe Over-The-Air (OTA) governance, (iv) product liability for automated/Advanced Driver Assistance Systems (ADAS) features, (v) eCall obligations amid 2G/3G mobile network sunsets, (vi) national-security supply-chain controls, and (vii) IP disputes.
Alternative transportation
Information security
fromAbove the Law
4 days ago

Lawyers And Cybersecurity: Talk To An Expert - Before It's Too Late - Above the Law

AI accelerates cybersecurity threats while business leaders remain complacent, creating critical vulnerabilities in law firms and organizations that struggle to respond to breaches occurring within 29 minutes.
#google-acquisition
Venture
fromTechCrunch
5 days ago

Wiz investor unpacks Google's $32B acquisition | TechCrunch

Google completed its $32 billion acquisition of cybersecurity company Wiz, the largest venture-backed startup acquisition in history, driven by convergence of AI, cloud, and security spending trends.
Tech industry
fromBusiness Insider
1 week ago

Google officially snaps up Wiz as it closes mammoth $32 billion deal

Google completes its $32 billion acquisition of cybersecurity firm Wiz to strengthen cloud security capabilities amid rising AI-driven threats.
Venture
fromTechCrunch
5 days ago

Wiz investor unpacks Google's $32B acquisition | TechCrunch

Google completed its $32 billion acquisition of cybersecurity company Wiz, the largest venture-backed startup acquisition in history, driven by convergence of AI, cloud, and security spending trends.
Tech industry
fromBusiness Insider
1 week ago

Google officially snaps up Wiz as it closes mammoth $32 billion deal

Google completes its $32 billion acquisition of cybersecurity firm Wiz to strengthen cloud security capabilities amid rising AI-driven threats.
Privacy technologies
fromenglish.elpais.com
1 week ago

The Kremlin tests blocking mobile internet in Moscow

Moscow's week-long internet blackout, ordered by Russian security services, demonstrates the Kremlin's capability and willingness to implement total digital isolation as a security measure.
Venture
fromTechCrunch
1 week ago

The $32B acquisition that one VC is calling the 'Deal of the Decade' | TechCrunch

Google acquired cybersecurity startup Wiz for $32 billion, the largest venture-backed acquisition ever, driven by converging trends in AI, cloud computing, and security spending.
Artificial intelligence
fromZDNET
1 week ago

NanoClaw is in your Docker sandbox now - can this restrain AI agents from running amok?

NanoClaw and Docker partnership integrates the open-source AI agent platform into Docker Sandboxes, isolating each agent task in containers for enhanced security and simplified deployment.
fromGSMArena.com
1 week ago

Spam campaign impersonating us targets T-Online users in Germany

The spammers are spoofing our email address - this means they are falsely setting GSMArena.com as the sender of the email. Specifically, it looks like the email came from tpjdlgcj@gsmarena.com, but that's not an active account on our server (that random jumble of letters is clearly randomly generated). Instead the emails are coming from a server owned by Microsoft (52.103.140.27) and one owned by Oracle (92.5.13.127), neither of which is part of our infrastructure.
Mobile UX
UK news
fromwww.independent.co.uk
1 week ago

Warning criminals are exploiting AI after record number of UK scam reports

UK fraud reports reached record 445,000 in 2025, with identity theft as the most common type, driven by criminals increasingly exploiting artificial intelligence and digital technologies.
fromTechzine Global
1 week ago

AI agents are the perfect insider

AI on the dark side has done three things particularly well: speed, scale, and sophistication. As a result, the time between a successful intrusion and the actual theft of data has decreased significantly over the past three years. Whereas three years ago the average period was nine days, it is now one day. The fastest case documented by Palo Alto Networks was even 72 minutes.
Information security
Artificial intelligence
fromBusiness Insider
1 week ago

China rushed to use OpenClaw. Now, some stressed-out users are forking out cash to uninstall the AI agent.

A new service industry emerged in China charging users to uninstall OpenClaw AI agents after initial installation hype, driven by government security restrictions on the tool in state institutions.
Law
fromAbove the Law
1 week ago

Seven Essential Security Strategies For Law Firms And Legal Departments - Above the Law

Legal professionals must prioritize cybersecurity as a leadership imperative, with one in three law firms targeted by breaches costing over five million dollars annually, requiring proactive vendor management and transparent security practices.
Roam Research
fromArs Technica
1 week ago

14,000 routers are infected by malware that's highly resistant to takedowns

A 14,000-device botnet called KadNap primarily compromises unpatched Asus routers to create a takedown-resistant proxy network for cybercrime using peer-to-peer Kademlia architecture.
Venture
fromSecurityWeek
1 week ago

Scanner Raises $22 Million for AI-Powered Threat Hunting

Scanner raised $22 million in Series A funding to provide cloud-native security data lakes enabling faster threat hunting and AI-powered continuous detection and response.
Venture
fromSecurityWeek
1 week ago

Jazz Emerges From Stealth With $61M in Funding for AI-Powered DLP

Jazz, a DLP startup founded by Israeli intelligence veterans, raised $61 million to transform data loss prevention through intent and context understanding rather than rigid rules.
fromNextgov.com
1 week ago

Senate confirms Josh Rudd to lead NSA and Cyber Command

The country needs an NSA director with experience in U.S. signals intelligence activities around the world. General Rudd does not have that experience. This statement from Sen. Ron Wyden expressed his primary concern about the nominee's qualifications for the position.
SF politics
fromZDNET
1 week ago

Firewalla Orange review: This router gave my home network a meaningful security upgrade

I see a lot of people referring to Firewalla hardware as a firewall or security tool, and while that's correct, it also offers so much more. Think of the tech as having your very own personal network administrator, making even complex networking tasks as simple as flicking a virtual switch.
Gadgets
#phishing-attacks
Privacy technologies
fromwww.mediaite.com
1 week ago

Secure Messaging App Warns Government Officials and Journalists' Had Accounts Stolen After Falling For Scam

Signal users including government officials and journalists experienced account takeovers through sophisticated phishing attacks targeting SMS codes and PINs, though Signal's encryption and infrastructure remain uncompromised.
Privacy technologies
fromwww.mediaite.com
1 week ago

Secure Messaging App Warns Government Officials and Journalists' Had Accounts Stolen After Falling For Scam

Signal users including government officials and journalists experienced account takeovers through sophisticated phishing attacks targeting SMS codes and PINs, though Signal's encryption and infrastructure remain uncompromised.
fromTheregister
1 week ago

Polish cyber police busts gang of alleged teen DDoS peddlers

Using the tools they administer, popular websites such as auction and sales portals, IT domains, hosting services, and accommodation booking services were attacked. The youths, aged between 12 and 16 at the time of the alleged offenses, all face charges related to selling DDoS tools in what police described as a purely profit-driven scheme.
Information security
#on-premises-security
Silicon Valley
fromSecurityWeek
1 week ago

Cylake Raises $45 Million to Secure Organizations Barred From Cloud

Cylake, a cybersecurity startup founded by Palo Alto Networks veterans, raised $45 million to build an on-premises AI-native security platform for regulated organizations unable to use public cloud services.
Silicon Valley
fromSecurityWeek
1 week ago

Cylake Raises $45 Million to Secure Organizations Barred From Cloud

Cylake, a cybersecurity startup founded by Palo Alto Networks veterans, raised $45 million to build an on-premises AI-native security platform for regulated organizations unable to use public cloud services.
Privacy technologies
fromwww.socialmediatoday.com
1 week ago

Meta outlines improved scam protection in Messenger app

Meta's Safe Browsing feature in Messenger protects users from malicious links in DMs using on-device models and an expanded Advanced Browsing Protection with a watchlist of millions of potentially dangerous websites.
fromArs Technica
2 weeks ago

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.
Information security
SF politics
fromNextgov.com
2 weeks ago

Mullin's appointment to lead DHS raises questions about future of CISA

Trump appointed Oklahoma Senator Markwayne Mullin as DHS Secretary after firing Kristi Noem, amid CISA's significant workforce reductions and leadership instability.
Healthcare
fromTechCrunch
2 weeks ago

TriZetto confirms 3.4M people's health and personal data was stolen during breach | TechCrunch

TriZetto confirmed that hackers stole personal and health information from 3.4 million people in a 2024 cyberattack that went undetected for nearly a year.
#online-scams
Media industry
fromwww.independent.co.uk
2 weeks ago

Warning issued to shoppers over fake Tesco and Amazon sites made by scammers

Over 28,000 scam websites impersonating major retailers like Tesco and Amazon were discovered in January, with typosquatting being a primary method to deceive online shoppers into revealing personal information.
fromBusiness Insider
2 weeks ago

Read the pitch deck of an ex-Google Cloud exec who raised $38 million to catch 'silent' security failures

Nobody really knows if their detection rules are silent because they were secure or because something got broken in the data plumbing a couple of months ago. Large companies rely on dozens of fragmented tools to detect threats, and those systems can quietly stop working effectively over time as they're updated and adjusted.
Venture
Privacy technologies
fromTechCrunch
2 weeks ago

Italian prosecutors confirm journalist was hacked with Paragon spyware | TechCrunch

Italian authorities confirmed that journalist Francesco Cancellato and two activists were infected with Paragon spyware on December 14, 2024, though the source of Cancellato's infection remains unknown.
Information security
fromMail Online
2 weeks ago

Iran targets critical US infrastructure as Middle East war spirals

Iran-linked APT group Seedworm infiltrated US critical infrastructure including banks, airports, and defense contractors, installing backdoors for persistent access and potential future attacks.
Information security
fromZDNET
2 weeks ago

The average tax scam victim loses $1,020 - and they're younger than you'd think

Tax scams are increasingly sophisticated and widespread, with 82% of Americans concerned about tax fraud, 23% having fallen victim, and average losses reaching $1,020.
Tech industry
fromFortune
2 weeks ago

Tech billionaire Shlomo Kramer: the cyber selloff proved that Wall Street can't price tech anymore | Fortune

Market overreaction to Anthropic's Claude Code Security release revealed that investors treat AI and cybersecurity as interchangeable despite their distinct architectures, buyers, and economics.
Information security
fromenglish.elpais.com
2 weeks ago

John Martinis, winner of 2025 Nobel Prize in Physics: I wouldn't want quantum computing to be known for breaking the internet'

Quantum computers will break current encryption within this decade, requiring immediate transition to quantum-safe cryptography to protect digital infrastructure and global economy.
Privacy technologies
fromThe Verge
2 weeks ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy professionals
fromwww.bbc.com
2 weeks ago

We have more privacy controls yet less privacy than ever

Young people increasingly view online privacy as inevitable loss rather than a right, accepting data sharing as currency for digital services while older privacy advocates warn this threatens fundamental freedoms.
fromSecurityWeek
2 weeks ago

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively

I got a rush from feeling challenged. The computer would say 'No', and I would think, 'Well, we'll see'. In his own words it was more a case of Rage Against the Machine than simply Stayin' Alive.
Digital life
Business
from24/7 Wall St.
2 weeks ago

CrowdStrike Holds Steady on Wednesday While GitLab Plunges 9% After Earnings

CrowdStrike delivered strong earnings with positive GAAP net income and 24% ARR growth, stabilizing its stock, while GitLab disappointed investors with weaker results.
Information security
fromSecurityWeek
2 weeks ago

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

Free pirated software often contains malware that can compromise corporate security, steal credentials, and enable ransomware attacks on company endpoints.
fromSecurityWeek
2 weeks ago

Global Coalition Publishes 6G Security and Resilience Principles

The security and resilience of 6G networks are critical aspects of that wider picture. 6G networks - both public and private - will come to play a vital role in the everyday life of people around the world, with much of our lives reliant on their efficient and secure operation.
Information security
Information security
fromTechzine Global
2 weeks ago

Eurofiber and Colt want quantum-secure connections

Eurofiber and Colt Technology Services launched a quantum-secure fiber optic connection between Amsterdam, London, and Brussels to protect financial institutions from future quantum computer-based cyberattacks.
fromSecuritymagazine
2 weeks ago

Brian Harrell - Top Cybersecurity Leaders 2026

Geopolitical and cyber convergence is real. Geopolitical developments will very likely influence the cyber threat landscape in 2026 and beyond. We can't just monitor our own systems and stay compliant with the latest compliance standards. This can have significant impact to you, your supply chain, and your interdependencies. Security is local but it's also worldwide.
Information security
Information security
fromwww.bbc.com
2 weeks ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Privacy professionals
fromDataBreaches.Net
2 weeks ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data - DataBreaches.Net

Hacktivists claiming to be 'Department of Peace' breached DHS and leaked contracts between the agency, ICE, and over 6,000 companies including defense and tech firms.
Miscellaneous
fromZDNET
2 weeks ago

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

AI tools from major companies can automate code debugging and reduce software flaws, but cybersecurity remains too complex for AI alone to solve comprehensively.
Information security
fromTheregister
2 weeks ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
fromAlleywatch
2 weeks ago

The Weekly Notable Startup Funding Report: 3/2/26

Avisi Technologies develops nanotechnology-based ophthalmic devices to address vision loss from glaucoma and related eye conditions. Founded by Adarsh Battu, Brandon Kao, and Rui Jing Jiang in 2017, Avisi Technologies has now raised a total of $18.7M in total equity funding and is backed by Accanto Partners, Gemseki, Golden Seeds, Good Growth Capital, Life Sciences Greenhouse of Pennsylvania, MedVenture Partners, OneOneFive, Quaker Capital Investments, LLC, SBI US Gateway Fund, and Sherpa Healthcare Partners.
Startup companies
fromSecurityWeek
2 weeks ago

Madison Square Garden Data Breach Confirmed Months After Hacker Attack

In the Oracle EBS hacking campaign, the Cl0p ransomware and extortion group exploited zero-day vulnerabilities to gain access to data stored by more than 100 organizations in the enterprise management software. Madison Square Garden (MSG), the world-famous arena located in New York City, was named by the hackers as a victim of the campaign in November 2025.
Privacy professionals
Information security
fromPsychology Today
3 weeks ago

The Importance of Media Psychology in Cybersecurity

Cybersecurity breaches exploit human psychological vulnerabilities through media psychology principles including persuasion, attention manipulation, and cognitive biases.
fromZDNET
3 weeks ago

Why scammers call you and say nothing - and how to respond safely

Calls where no one responds are rarely accidental. In many cases, they are automated reconnaissance events. Fraud operations run at industrial scale, and before they invest human effort in a target, they validate that a number is active and answered by a real person.
Information security
Information security
fromSecurityWeek
3 weeks ago

Trend Micro Patches Critical Apex One Vulnerabilities

TrendAI released patches for eight vulnerabilities in Apex One endpoint security, including two critical flaws allowing remote code execution on the management console.
[ Load more ]