#threat-detection

[ follow ]
Psychology
fromSilicon Canals
1 day ago

There's a type of person who can hear one sentence from a stranger and know exactly what kind of household they grew up in. They're not psychic. They were just raised in a home where reading people accurately was the difference between a calm evening and a terrible one. - Silicon Canals

Trauma survivors' exceptional ability to read emotions and social cues stems from childhood threat detection training, not innate intuition or empathy, resulting in exhausting hypervigilance.
#ai-cybersecurity
fromBusiness Insider
3 days ago
Information security

This Israeli cyber startup is launching with $40 million in funding during the Iran war: 'It's part of our reality and part of our strength'

fromZDNET
1 week ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromBusiness Insider
3 days ago

This Israeli cyber startup is launching with $40 million in funding during the Iran war: 'It's part of our reality and part of our strength'

Israeli cybersecurity startup Bold raised $40 million and launched AI agents protecting enterprise devices from cyberattacks while operating during wartime.
fromZDNET
1 week ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

#cybersecurity
Venture
fromSecurityWeek
4 days ago

Scanner Raises $22 Million for AI-Powered Threat Hunting

Scanner raised $22 million in Series A funding to provide cloud-native security data lakes enabling faster threat hunting and AI-powered continuous detection and response.
#cloud-security
DevOps
fromTechzine Global
4 days ago

Amazon Web Services expands Security Hub for multicloud security

AWS Security Hub expands to centralize security alerts and risks across multiple cloud environments and external security tools into a single platform.
Psychology
fromSilicon Canals
5 days ago

I used to think I had a terrible memory until I realized I can recall every tone shift in every argument my parents ever had but not what I ate yesterday. My memory works fine. It was just trained on threat detection instead of daily life. - Silicon Canals

People from unpredictable environments develop heightened memory for threat signals and emotional cues as a survival mechanism, not a memory deficiency.
Venture
fromTechCrunch
5 days ago

Mandiant's founder just raised $190M for his autonomous AI agent security startup | TechCrunch

Kevin Mandia launched Armadin, an AI-native cybersecurity startup, raising a record $189.9 million in combined seed and Series A funding to develop autonomous cybersecurity agents that combat AI-powered threats.
Information security
fromThe Hacker News
1 week ago

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Tier 1 SOC analysts process the highest alert volume with the least experience, creating a structural vulnerability where alert fatigue, decision fatigue, and cognitive overload directly undermine organizational security performance and increase incident costs.
Miscellaneous
fromEngadget
2 weeks ago

OpenAI will notify authorities of credible threats after Canada mass shooter's second account was discovered

OpenAI commits to strengthening safety protocols and notifying law enforcement of credible threats earlier, even without specific target or timing details.
Psychology
fromSilicon Canals
2 weeks ago

Psychology says the people who are hardest to manipulate aren't the most intelligent they're the ones who grew up having to decode what adults actually meant versus what they said - Silicon Canals

Children who learn to detect emotional inconsistencies between words and meaning develop heightened manipulation resistance in adulthood through automatic dual-processing of literal and emotional content.
fromComputerWeekly.com
2 weeks ago

Fake UK government website redirect detection time reduced to eight days | Computer Weekly

The Vulnerability Monitoring Service has transformed how quickly we can spot and fix weaknesses before they're exploited so we can protect against that. We've cut cyber attack fix times by 84% and reduced the backlog of critical issues by three-quarters. And as the service expands to cover more types of cyber threats, fix times are falling there, too.
UK news
#evolutionary-psychology
#ai-security
Information security
fromThe Hacker News
2 weeks ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromSecurityWeek
1 month ago

Cybersecurity M&A Roundup: 34 Deals Announced in January 2026

Major cybersecurity consolidation occurred in January 2026, with 34 announced deals including CrowdStrike acquiring SGNL and Seraphic, and several strategic identity, GRC, and MSSP transactions.
fromPsychology Today
3 months ago

Do Psychopaths Experience Fear?

The prototypical psychopath is pictured as callous, unemotional, impulsive, and fearless. While psychopaths may seem fearless, it does not mean they are not fearful. Fearlessness is not always the opposite of fearfulness. From my own observation, the psychopathic female is especially fearful and anxious. Psychopaths can experience fear Psychopathy researchers Sylco Hoppenbrouwers, Berend Bulten, and Inti Brazil analyzed 16 research reports relating to psychopathy that included measures of fear.
Psychology
fromThe Hacker News
4 months ago

CISO's Expert Guide To AI Supply Chain Attacks

AI-enabled supply chain attacks are exploding in scale and sophistication - Malicious package uploads to open-source repositories jumped 156% in the past year. AI-generated malware has game-changing characteristics - It's polymorphic by default, context-aware, semantically camouflaged, and temporally evasive. Real attacks are already happening - From the 3CX breach affecting 600,000 companies to NullBulge attacks weaponizing Hugging Face and GitHub repositories.
Information security
Information security
fromInfoQ
4 months ago

Slack Security: Inside the New Anomaly Event Response Architecture

Slack's Anomaly Event Response autonomously detects high-confidence threat behaviors and rapidly terminates affected sessions, reducing detection-to-mitigation time from hours to minutes.
fromThe Hacker News
5 months ago

The State of AI in the SOC 2025 - Insights from Recent Study

A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can download the full report here. The research, conducted primarily among US-based organizations, shows that AI adoption in security operations has shifted from experimental to essential as teams struggle to keep pace with an ever-growing stream of security alerts.
Information security
Psychology
fromCornell Chronicle
5 months ago

Safety first: Babies heighten adults' perception of threats | Cornell Chronicle

Caring for a baby causes adults to perceive environment as more dangerous, increasing threat detection and perceived speed of oncoming cars, especially for crawling infants.
#dlp
fromIT Pro
5 months ago

Getting a grip on digital identity

I think what you're seeing now is the adversaries, the bad guys, they're basically focused on, 'look where's the weakest link, where is the place where we've spent the least?' And infrastructure people are about throughput and speed and access, and security is about protection. And if you have a domain that is split between those two, you're going to find weaknesses.
Information security
Psychology
fromPsychology Today
5 months ago

Why Yawns Help Us Spot Spiders and Cockroaches Faster

Contagious yawning functions as a social alarm that increases group vigilance, improving rapid detection of threats like spiders and cockroaches.
#ai
fromIT Pro
9 months ago
Artificial intelligence

How AI agents are being deployed in the real world

The use of AI agents in security enhances threat detection and response efficiency, crucial in light of rising cyber threats.
fromTechzine Global
10 months ago
Artificial intelligence

Vectra AI Analyst assists alert-fatigued security teams

Vectra AI introduces a complete agent portfolio, enhancing threat detection capabilities while reducing security alert noise.
#ai-in-cybersecurity
Information security
fromThe Hacker News
6 months ago

Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

Organizations detect only one in seven attacks due to SIEM log collection failures and ineffective detection rules, leaving networks highly vulnerable.
Information security
fromTechzine Global
6 months ago

Okta publishes open-source detection rules for Auth0

A GitHub-hosted Customer Detection Catalog delivers ready-to-use Sigma detection rules for Auth0, enabling faster, broader threat detection and community contributions.
Privacy technologies
fromTechzine Global
7 months ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Privacy professionals
fromForbes
8 months ago

Google Play Store Warning-Find And Delete All Apps On This List

Users should delete over 350 malicious apps identified by Human Security's Satori team that generate unwanted ad requests.
fromTechzine Global
8 months ago

Thales introduces API security against BOLA attacks

API security is no longer optional - it's fundamental to maintaining business continuity and trust. Without robust measures, organizations risk significant data and trust losses.
Information security
fromInfoQ
8 months ago

AWS Introduces Extended Threat Detection for EKS via GuardDuty

AWS's expansion of GuardDuty's capabilities now includes runtime monitoring for EKS clusters, enhancing threat detection for container-level threats through managed eBPF technology.
DevOps
fromSecuritymagazine
8 months ago

Fog Ransomware Group Uses Unconventional Toolset, New Research Finds

The real danger in this case isn't the ransom note - it's how Fog turns a simple screen-recorder into a hidden camera. Software is an essential driver of growth and innovation for every company; however, business apps we install on autopilot can suddenly become spy tools, which means trust is the weak spot. Security teams should keep a live map of where every monitoring app is allowed to run and flag it the moment one pops up somewhere odd.
Information security
fromTechzine Global
10 months ago

Permiso links risk management to threat detection with new platform

Permiso's platform uniquely addresses identity threats by combining risk management with comprehensive monitoring of both human and non-human identities across environments.
Privacy professionals
Privacy professionals
fromThe Hacker News
10 months ago

Product Walkthrough: A Look Inside Wing Security's Layered SaaS Identity Defense

Understanding that most SaaS breaches stem from identity misconfigurations is critical to improving security.
Adopting a comprehensive approach to visibility in SaaS applications can significantly reduce attack vectors.
[ Load more ]