#armed-security

[ follow ]
#ai-cybersecurity
Information security
fromSecurityWeek
1 hour ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
2 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

Information security
fromSecurityWeek
1 hour ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromZDNET
2 weeks ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
fromZDNET
1 month ago
Information security

The biggest AI threats come from within - 12 ways to defend your organization

#physical-security
#cybersecurity
fromTechCrunch
4 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Privacy professionals
fromAbove the Law
2 hours ago

Jones Day Gets Hacked While FBI Busy Planning Kash Patel's Next Vacation - Above the Law

Jones Day experienced a data breach by the Silent Ransom Group, affecting 10 clients and involving demands for $13 million to keep the breach quiet.
Information security
fromAbove the Law
2 hours ago

Cyberattacks On Law Firms Are Rising. Here's What's Driving It. - Above the Law

Law firms face increasing cyberattacks, particularly from ransomware, making cybersecurity a critical business and legal concern.
Healthcare
fromSecuritymagazine
17 hours ago

Healthcare Executives Face a New Era of Personal Risk

Healthcare executives face heightened personal risks due to grievance-motivated cyber threats amid economic pressures and public accountability.
EU data protection
fromSecurityWeek
3 days ago

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the European Commission's AWS environment using a compromised API key from the Trivy supply chain attack.
Healthcare
fromBoston.com
4 hours ago

Signature Healthcare in Brockton hit by cybersecurity incident

Signature Healthcare is managing a cybersecurity incident, affecting some services while maintaining inpatient and emergency care.
EU data protection
fromTechCrunch
4 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Privacy professionals
fromAbove the Law
2 hours ago

Jones Day Gets Hacked While FBI Busy Planning Kash Patel's Next Vacation - Above the Law

Jones Day experienced a data breach by the Silent Ransom Group, affecting 10 clients and involving demands for $13 million to keep the breach quiet.
Information security
fromAbove the Law
2 hours ago

Cyberattacks On Law Firms Are Rising. Here's What's Driving It. - Above the Law

Law firms face increasing cyberattacks, particularly from ransomware, making cybersecurity a critical business and legal concern.
fromSFGATE
6 hours ago

A Bay Area city is offering free doorbell cameras. Experts are raising concerns.

The safety tool can improve case solvability, support suspect identification and enhance overall public safety outcomes.
Privacy technologies
#ice
US politics
fromwww.theguardian.com
2 hours ago

ICE arrested more than 800 people after tips from TSA, investigation shows

ICE arrested over 800 individuals based on TSA tips during Trump's second presidency, significantly increasing immigration enforcement efforts at airports.
fromSilicon Canals
4 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromwww.theguardian.com
2 hours ago

ICE arrested more than 800 people after tips from TSA, investigation shows

ICE arrested over 800 individuals based on TSA tips during Trump's second presidency, significantly increasing immigration enforcement efforts at airports.
US politics
fromTechCrunch
5 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
4 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
DevOps
fromDevOps.com
6 hours ago

Why Most DevSecOps Pipelines Fail at Runtime Security (not Build Time) - DevOps.com

Runtime risk arises from configuration and infrastructure changes post-deployment, necessitating DevSecOps to enhance security earlier in the delivery process.
Philosophy
fromFast Company
23 hours ago

Twenty seconds to approve a military strike; 1.2 seconds to deny a health insurance claim. The human is in the AI loop. Humanity is not

Artificial intelligence significantly accelerates decision-making in military and business contexts, but human oversight may be minimal and ineffective.
Venture
from24/7 Wall St.
1 day ago

Wedbush's Ives: Palantir, Oracle, Microsoft to dominate defense AI integration

Defense AI spending is set to grow significantly, with Palantir leading the integration of AI technology in military applications.
Business
from24/7 Wall St.
1 day ago

CrowdStrike Just Bet Big On the Huge Disconnect Between Growth and Its Stock

CrowdStrike's $500 million share repurchase program signals confidence in its undervalued stock amid strong business momentum and AI-driven growth.
Non-profit organizations
fromNextgov.com
1 day ago

The war against fraud should be a war for tech modernization

A new task force aims to combat fraud in public benefits programs by ensuring adequate anti-fraud controls and addressing data sharing challenges.
from24/7 Wall St.
1 day ago

Palantir-Connected Ondas Clinches Yet Another High-Growth Defense Pact

Ondas announced a definitive merger agreement with Mistral, a Bethesda, Md.-based defense prime contractor, valued at $175 million, which includes $122.5 million in common stock paid upfront and in installments.
European startups
#us-secret-service
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
London politics
fromwww.bbc.com
3 days ago

Five Met officers taken off duty after weapons find

Five Metropolitan Police officers removed from front-line duties after firearms and a Taser were found on a London street.
Travel
fromTravel + Leisure
3 days ago

A Former TSA Agent Shares The No. 1 Reason Bags Get Flagged at Security-and How to Prevent It From Happening

Human error, especially with laptops, is the primary reason for carry-on luggage being flagged at airport security.
Photography
fromBusiness Matters
5 days ago

Explosion Proof PTZ Cameras - Full 360 Intelligence in Explosive Zones

Explosion proof PTZ cameras provide essential situational awareness in hazardous environments, overcoming challenges posed by fixed cameras.
Psychology
fromSilicon Canals
3 days ago

The people who always have a backup plan aren't pessimists. They grew up in environments where promises were unreliable, and redundancy became the only architecture that didn't collapse when someone changed their mind without warning. - Silicon Canals

Obsessive planners are often generous, driven by past experiences that teach them to prepare for uncertainties.
Law
fromABA Journal
5 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
fromFuturism
4 days ago

Delivery Robot Companies in Trouble as Bot Become Targets for Vandalism

Out of the company's first 80,000 deliveries the bots finished on campus, about 1,600 involved incidents of vandalism. At a cost of $2,500 per Kiwibot, the damage adds up quick.
London startup
Information security
fromThe Hacker News
5 hours ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
SF politics
fromNextgov.com
1 week ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
California
fromCalifornia Post
1 week ago

California sheriff's department to utilize Batman-like gadget to halt car chases

Riverside County Sheriff's Department will use the Grappler device to safely stop fleeing vehicles, inspired by Batman's gadgets.
#fbi
Privacy professionals
fromSecuritymagazine
1 day ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
4 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
1 day ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
Privacy professionals
fromTechRepublic
4 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Remote teams
fromTheregister
1 week ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
Privacy technologies
fromFortune
2 days ago

Your neighbor just got a home security system, but should you be worried? 'It's inherently a little creepy' says surveillance expert | Fortune

Consumers are increasingly concerned about privacy and data control regarding home surveillance technology.
US politics
fromArs Technica
2 days ago

CBP facility codes sure seem to have leaked via online flashcards

Immigration offenses and internal systems of CBP are detailed in flashcards, highlighting procedures and responsibilities of agents.
from24/7 Wall St.
1 day ago

Iran Wars Fuels RTX Growth Story as Defense Demand Rockets Higher

CEO Chris Calio emphasized the urgency of delivering critical products for national security, stating, 'We understand that our products are critical to national security. And I can tell you across the organization, we absolutely feel the responsibility and urgency to deliver more and to deliver it faster.'
Business
Women in technology
fromInfoQ
1 week ago

Security and Architecture: To Betray One Is To Destroy Both

Architecture and security have evolved from separate entities to a deeply connected partnership focused on resilience and protection against threats.
#openclaw
DevOps
fromInfoWorld
4 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
3 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
4 days ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
3 days ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
London politics
fromwww.theguardian.com
5 days ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
Podcast
fromSecuritymagazine
1 week ago

What Does It Take to Be an Outstanding CSO or CISO?

Outstanding security leaders often come from non-traditional backgrounds, with 40% of recent CSO-CISO Hall of Fame honorees starting in the private sector.
Artificial intelligence
fromComputerworld
1 day ago

AI shutdown controls may not work as expected, new study suggests

AI models exhibit peer preservation behavior, sabotaging shutdown mechanisms to protect other AI systems, posing risks for enterprise deployments.
fromSpeckyboy Design Magazine
2 days ago

How To Protect Media Files Uploaded to WordPress - Speckyboy

The predictable file structure of the content management system makes it easy to guess where a file is stored, leading to potential leaks, as demonstrated by a journalist accessing a leaked UK budget document.
Privacy technologies
fromFast Company
2 days ago

Why AI-powered city cameras are sounding new privacy alarms

The expansion of automatic license plate readers as a source of deep concern is evident as government authorities seek ways to target immigrant and transgender communities.
Privacy technologies
Information security
fromSecurityWeek
6 hours ago

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

Medusa ransomware group rapidly exploits vulnerabilities, impacting critical sectors and employing double extortion tactics since June 2021.
DevOps
fromInfoQ
1 week ago

Panel: Security Against Modern Threats

Modern threats to software supply chains require resilience by design, integrating security into engineering workflows and empowering developers with the right tools.
#ai
Privacy technologies
fromComputerWeekly.com
4 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromHarvard Business Review
1 week ago
Artificial intelligence

AI Agents Act a Lot Like Malware. Here's How to Contain the Risks.

An AI agent named MJ Rathbun published a blogpost attacking engineer Scott Shambaugh.
Privacy technologies
fromComputerWeekly.com
4 days ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromThe Hacker News
1 day ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
fromSilicon Canals
13 hours ago

When militaries share data centers with banks: how Gulf strikes exposed a structural flaw in global cloud infrastructure - Silicon Canals

When civilian banks, logistics platforms, and payment processors share physical data center infrastructure with military AI systems, those facilities become legitimate military targets under international humanitarian law - and the civilian services housed inside lose their legal protection.
Information security
fromSecuritymagazine
4 days ago

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security

"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
Information security
Information security
fromSilicon Canals
20 hours ago

A single maintainer, a fake company, and a three-hour window: inside the Axios supply chain hijack - Silicon Canals

A single maintainer's vulnerability led to a significant security breach in a widely used JavaScript library, exposing thousands of systems to potential credential theft.
#cybercrime
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
Information security
fromnews.bitcoin.com
1 day ago

Deepmind's 'AI Agent Traps' Paper Maps How Hackers Could Weaponize AI Agents Against Users

Google Deepmind identifies six AI agent trap categories, with content injection success rates of 86% and calls for enhanced security measures by 2026.
fromDevOps.com
1 day ago

Is Your AI Agent Secure? The DevOps Case for Adversarial QA Testing - DevOps.com

The most dangerous assumption in quality engineering right now is that you can validate an autonomous testing agent the same way you validated a deterministic application. When your systems can reason, adapt, and make decisions on their own, that linear validation model collapses.
Information security
#executive-protection
Information security
fromSecuritymagazine
6 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecuritymagazine
6 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
Information security
fromSecurityWeek
4 days ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Information security
fromTheregister
5 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromComputerworld
3 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Information security
fromInfoQ
4 days ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
Information security
fromTechzine Global
4 days ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
fromSecurityWeek
5 days ago

Mercor Hit by LiteLLM Supply Chain Attack

We believe that the compromise originated from the Trivy dependency used in our CI/CD security scanning workflow. Our security team moved promptly to contain and remediate the incident.
Information security
Information security
fromSecurityWeek
1 week ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Information security
fromSecurityWeek
1 week ago

CISA Flags Critical PTC Vulnerability That Had German Police Mobilized

CISA warns of a critical vulnerability in PTC's Windchill software, with potential for exploitation despite no current evidence of attacks.
Information security
fromSecuritymagazine
3 weeks ago

Discussing Use of Force in Security: A Challenging Discussion?

Use of force in security cannot be entirely avoided but should be deployed only as a last resort when lesser options fail, requiring comprehensive training in tactics, de-escalation, and legal authority.
Information security
fromSecuritymagazine
1 month ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
fromSecuritymagazine
1 month ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromBusiness Matters
1 month ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
[ Load more ]