#cybersecurity

[ follow ]
Law
fromAbove the Law
8 hours ago

Seven Essential Security Strategies For Law Firms And Legal Departments - Above the Law

Legal professionals must prioritize cybersecurity as a leadership imperative, with one in three law firms targeted by breaches costing over five million dollars annually, requiring proactive vendor management and transparent security practices.
Roam Research
fromArs Technica
8 hours ago

14,000 routers are infected by malware that's highly resistant to takedowns

A 14,000-device botnet called KadNap primarily compromises unpatched Asus routers to create a takedown-resistant proxy network for cybercrime using peer-to-peer Kademlia architecture.
Venture
fromSecurityWeek
16 hours ago

Scanner Raises $22 Million for AI-Powered Threat Hunting

Scanner raised $22 million in Series A funding to provide cloud-native security data lakes enabling faster threat hunting and AI-powered continuous detection and response.
#google-acquisition
Tech industry
fromBusiness Insider
16 hours ago

Google officially snaps up Wiz as it closes mammoth $32 billion deal

Google completes its $32 billion acquisition of cybersecurity firm Wiz to strengthen cloud security capabilities amid rising AI-driven threats.
Venture
fromSecurityWeek
1 day ago

Jazz Emerges From Stealth With $61M in Funding for AI-Powered DLP

Jazz, a DLP startup founded by Israeli intelligence veterans, raised $61 million to transform data loss prevention through intent and context understanding rather than rigid rules.
fromNextgov.com
1 day ago

Senate confirms Josh Rudd to lead NSA and Cyber Command

The country needs an NSA director with experience in U.S. signals intelligence activities around the world. General Rudd does not have that experience. This statement from Sen. Ron Wyden expressed his primary concern about the nominee's qualifications for the position.
SF politics
fromZDNET
1 day ago

Firewalla Orange review: This router gave my home network a meaningful security upgrade

I see a lot of people referring to Firewalla hardware as a firewall or security tool, and while that's correct, it also offers so much more. Think of the tech as having your very own personal network administrator, making even complex networking tasks as simple as flicking a virtual switch.
Gadgets
#phishing-attacks
Privacy technologies
fromwww.mediaite.com
2 days ago

Secure Messaging App Warns Government Officials and Journalists' Had Accounts Stolen After Falling For Scam

Signal users including government officials and journalists experienced account takeovers through sophisticated phishing attacks targeting SMS codes and PINs, though Signal's encryption and infrastructure remain uncompromised.
Privacy technologies
fromwww.mediaite.com
2 days ago

Secure Messaging App Warns Government Officials and Journalists' Had Accounts Stolen After Falling For Scam

Signal users including government officials and journalists experienced account takeovers through sophisticated phishing attacks targeting SMS codes and PINs, though Signal's encryption and infrastructure remain uncompromised.
fromTheregister
1 day ago

Polish cyber police busts gang of alleged teen DDoS peddlers

Using the tools they administer, popular websites such as auction and sales portals, IT domains, hosting services, and accommodation booking services were attacked. The youths, aged between 12 and 16 at the time of the alleged offenses, all face charges related to selling DDoS tools in what police described as a purely profit-driven scheme.
Information security
#on-premises-security
Silicon Valley
fromSecurityWeek
1 day ago

Cylake Raises $45 Million to Secure Organizations Barred From Cloud

Cylake, a cybersecurity startup founded by Palo Alto Networks veterans, raised $45 million to build an on-premises AI-native security platform for regulated organizations unable to use public cloud services.
Silicon Valley
fromSecurityWeek
1 day ago

Cylake Raises $45 Million to Secure Organizations Barred From Cloud

Cylake, a cybersecurity startup founded by Palo Alto Networks veterans, raised $45 million to build an on-premises AI-native security platform for regulated organizations unable to use public cloud services.
Privacy technologies
fromwww.socialmediatoday.com
3 days ago

Meta outlines improved scam protection in Messenger app

Meta's Safe Browsing feature in Messenger protects users from malicious links in DMs using on-device models and an expanded Advanced Browsing Protection with a watchlist of millions of potentially dangerous websites.
fromArs Technica
5 days ago

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.
Information security
SF politics
fromNextgov.com
5 days ago

Mullin's appointment to lead DHS raises questions about future of CISA

Trump appointed Oklahoma Senator Markwayne Mullin as DHS Secretary after firing Kristi Noem, amid CISA's significant workforce reductions and leadership instability.
#data-breach
Privacy professionals
fromSecurityWeek
1 week ago

New LexisNexis Data Breach Confirmed After Hackers Leak Files

LexisNexis confirmed a data breach involving legacy data from before 2020, with hackers exfiltrating over 2GB of data through React2Shell vulnerability exploitation and improperly secured AWS instances.
Privacy professionals
fromTheregister
1 week ago

LexisNexis Legal & Professional confirms data breach

LexisNexis Legal & Professional division experienced a data breach affecting legacy servers, with Fulcrumsec claiming responsibility for exploiting a vulnerable React container to access approximately 2 GB of data.
Privacy professionals
fromTheregister
1 week ago

Brit games studio Cloud Imperium admits to data breach

Cloud Imperium Games delayed disclosure of a January 21st data breach affecting user personal data, announcing it only through a subtle popup without proactive communication to affected users.
Privacy professionals
fromTechzine Global
1 week ago

All data from dutch Telco Odido hack now online

ShinyHunters released all stolen data from Odido's 6.5 million customers and 600,000 companies online after the company refused ransom payment, exposing names, addresses, social security numbers, ID documents, and sensitive personal information.
Healthcare
fromTechCrunch
5 days ago

TriZetto confirms 3.4M people's health and personal data was stolen during breach | TechCrunch

TriZetto confirmed that hackers stole personal and health information from 3.4 million people in a 2024 cyberattack that went undetected for nearly a year.
#online-scams
fromwww.independent.co.uk
5 days ago
Media industry

Warning issued to shoppers over fake Tesco and Amazon sites made by scammers

Over 28,000 scam websites impersonating major retailers like Tesco and Amazon were discovered in January, with typosquatting being a primary method to deceive online shoppers into revealing personal information.
fromwww.mercurynews.com
6 days ago
US news

Larry Magid: Beware of online scams

Americans lost at least $16.6 billion to scams in 2024, with older adults disproportionately targeted through phishing and romance scams that exploit trust and technological unfamiliarity.
Media industry
fromwww.independent.co.uk
5 days ago

Warning issued to shoppers over fake Tesco and Amazon sites made by scammers

Over 28,000 scam websites impersonating major retailers like Tesco and Amazon were discovered in January, with typosquatting being a primary method to deceive online shoppers into revealing personal information.
fromBusiness Insider
5 days ago

Read the pitch deck of an ex-Google Cloud exec who raised $38 million to catch 'silent' security failures

Nobody really knows if their detection rules are silent because they were secure or because something got broken in the data plumbing a couple of months ago. Large companies rely on dozens of fragmented tools to detect threats, and those systems can quietly stop working effectively over time as they're updated and adjusted.
Venture
Privacy technologies
fromTechCrunch
6 days ago

Italian prosecutors confirm journalist was hacked with Paragon spyware | TechCrunch

Italian authorities confirmed that journalist Francesco Cancellato and two activists were infected with Paragon spyware on December 14, 2024, though the source of Cancellato's infection remains unknown.
Information security
fromMail Online
6 days ago

Iran targets critical US infrastructure as Middle East war spirals

Iran-linked APT group Seedworm infiltrated US critical infrastructure including banks, airports, and defense contractors, installing backdoors for persistent access and potential future attacks.
Information security
fromZDNET
6 days ago

The average tax scam victim loses $1,020 - and they're younger than you'd think

Tax scams are increasingly sophisticated and widespread, with 82% of Americans concerned about tax fraud, 23% having fallen victim, and average losses reaching $1,020.
Tech industry
fromFortune
6 days ago

Tech billionaire Shlomo Kramer: the cyber selloff proved that Wall Street can't price tech anymore | Fortune

Market overreaction to Anthropic's Claude Code Security release revealed that investors treat AI and cybersecurity as interchangeable despite their distinct architectures, buyers, and economics.
#quantum-computing
fromenglish.elpais.com
6 days ago
Information security

John Martinis, winner of 2025 Nobel Prize in Physics: I wouldn't want quantum computing to be known for breaking the internet'

Quantum computers will break current encryption within this decade, requiring immediate transition to quantum-safe cryptography to protect digital infrastructure and global economy.
fromFast Company
3 weeks ago
Information security

Why should you care about quantum computing?

Organizations must urgently adopt quantum-resistant cryptography to prevent future decryption of currently harvested encrypted data.
Information security
fromenglish.elpais.com
6 days ago

John Martinis, winner of 2025 Nobel Prize in Physics: I wouldn't want quantum computing to be known for breaking the internet'

Quantum computers will break current encryption within this decade, requiring immediate transition to quantum-safe cryptography to protect digital infrastructure and global economy.
Privacy technologies
fromThe Verge
6 days ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy professionals
fromwww.bbc.com
1 week ago

We have more privacy controls yet less privacy than ever

Young people increasingly view online privacy as inevitable loss rather than a right, accepting data sharing as currency for digital services while older privacy advocates warn this threatens fundamental freedoms.
fromSecurityWeek
1 week ago

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively

I got a rush from feeling challenged. The computer would say 'No', and I would think, 'Well, we'll see'. In his own words it was more a case of Rage Against the Machine than simply Stayin' Alive.
Digital life
Business
from24/7 Wall St.
1 week ago

CrowdStrike Holds Steady on Wednesday While GitLab Plunges 9% After Earnings

CrowdStrike delivered strong earnings with positive GAAP net income and 24% ARR growth, stabilizing its stock, while GitLab disappointed investors with weaker results.
Information security
fromSecurityWeek
1 week ago

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

Free pirated software often contains malware that can compromise corporate security, steal credentials, and enable ransomware attacks on company endpoints.
fromSecurityWeek
1 week ago

Global Coalition Publishes 6G Security and Resilience Principles

The security and resilience of 6G networks are critical aspects of that wider picture. 6G networks - both public and private - will come to play a vital role in the everyday life of people around the world, with much of our lives reliant on their efficient and secure operation.
Information security
Information security
fromTechzine Global
1 week ago

Eurofiber and Colt want quantum-secure connections

Eurofiber and Colt Technology Services launched a quantum-secure fiber optic connection between Amsterdam, London, and Brussels to protect financial institutions from future quantum computer-based cyberattacks.
fromSecuritymagazine
1 week ago

Brian Harrell - Top Cybersecurity Leaders 2026

Geopolitical and cyber convergence is real. Geopolitical developments will very likely influence the cyber threat landscape in 2026 and beyond. We can't just monitor our own systems and stay compliant with the latest compliance standards. This can have significant impact to you, your supply chain, and your interdependencies. Security is local but it's also worldwide.
Information security
Information security
fromwww.bbc.com
1 week ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Privacy professionals
fromDataBreaches.Net
1 week ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data - DataBreaches.Net

Hacktivists claiming to be 'Department of Peace' breached DHS and leaked contracts between the agency, ICE, and over 6,000 companies including defense and tech firms.
#ai-security
fromZDNET
1 week ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

fromFortune
2 weeks ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

fromZDNET
1 week ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

fromFortune
2 weeks ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

Information security
fromTheregister
1 week ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
fromAlleywatch
1 week ago

The Weekly Notable Startup Funding Report: 3/2/26

Avisi Technologies develops nanotechnology-based ophthalmic devices to address vision loss from glaucoma and related eye conditions. Founded by Adarsh Battu, Brandon Kao, and Rui Jing Jiang in 2017, Avisi Technologies has now raised a total of $18.7M in total equity funding and is backed by Accanto Partners, Gemseki, Golden Seeds, Good Growth Capital, Life Sciences Greenhouse of Pennsylvania, MedVenture Partners, OneOneFive, Quaker Capital Investments, LLC, SBI US Gateway Fund, and Sherpa Healthcare Partners.
Startup companies
fromSecurityWeek
1 week ago

Madison Square Garden Data Breach Confirmed Months After Hacker Attack

In the Oracle EBS hacking campaign, the Cl0p ransomware and extortion group exploited zero-day vulnerabilities to gain access to data stored by more than 100 organizations in the enterprise management software. Madison Square Garden (MSG), the world-famous arena located in New York City, was named by the hackers as a victim of the campaign in November 2025.
Privacy professionals
Information security
fromPsychology Today
1 week ago

The Importance of Media Psychology in Cybersecurity

Cybersecurity breaches exploit human psychological vulnerabilities through media psychology principles including persuasion, attention manipulation, and cognitive biases.
fromZDNET
1 week ago

Why scammers call you and say nothing - and how to respond safely

Calls where no one responds are rarely accidental. In many cases, they are automated reconnaissance events. Fraud operations run at industrial scale, and before they invest human effort in a target, they validate that a number is active and answered by a real person.
Information security
Information security
fromSecurityWeek
1 week ago

Trend Micro Patches Critical Apex One Vulnerabilities

TrendAI released patches for eight vulnerabilities in Apex One endpoint security, including two critical flaws allowing remote code execution on the management console.
fromTechCrunch
2 weeks ago

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

Peter Williams, a former executive at U.S. defense contractor L3Harris, was sentenced on Tuesday to 87 months in prison for leaking his former company's trade secrets in exchange for $1.3 million in crypto between 2022 and 2025. Williams sold the exploits to Operation Zero, which the U.S. government calls 'one of the world's most nefarious exploit brokers.'
Information security
Information security
from24/7 Wall St.
2 weeks ago

Fortinet Is Down 28% YTD, But Its Free Cash Flow Just Hit a Record $2.21 Billion

Fortinet demonstrates strong financial fundamentals with record free cash flow of $2.21 billion and 16% billings growth, while Sovereign SASE technology positions the company for significant market expansion despite recent stock decline.
#agentic-ai
fromNieman Lab
2 weeks ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
from24/7 Wall St.
2 weeks ago

PANW Is Down 19% But Its AI Security Bet May Change That

Headline numbers were solid: revenue grew 15% year-over-year to $2.59 billion, adjusted EPS of $1.03 beat expectations, and next-generation security ARR jumped 33% to $6.33 billion. But management trimmed its full-year profit outlook due to acquisition costs, and Q3 EPS guidance missed expectations, sending shares down 5-7% in after-hours trading.
Information security
Information security
fromThe Hacker News
2 weeks ago

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

An L3Harris defense contractor employee sold eight zero-day exploits to Russian broker Operation Zero for millions in cryptocurrency, receiving a seven-year prison sentence for theft of trade secrets.
fromFuturism
2 weeks ago

AI Is Destroying Grocery Supply Chains

Whole Foods shelves sit empty after a data breach shut down its wholesale distributor. Meat packers working for JBS Foods are paralyzed as an $11 million ransomware attack takes out their processing facilities. Some 2.2 million workers at Stop & Shop and Hannaford have their personal data exposed as the result of a cyberattack on parent company Ahold Delhaize USA. These scenarios, straight from a William Gibson novel, are becoming increasingly common in supply chains across the world.
Food & drink
Information security
fromDataBreaches.Net
2 weeks ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
Information security
fromSecurityWeek
2 weeks ago

Chip Testing Giant Advantest Hit by Ransomware

Advantest detected a February 15 ransomware intrusion that may have affected parts of its network; investigation is ongoing and potential data impact is under review.
US politics
fromTheregister
2 weeks ago

GAO urges NSF CIO to fix cloud SLAs, tighten IT oversight

NSF must improve IT planning, cloud procurement and SLAs, complete annual IT portfolio reviews, overhaul cloud contracts, and address open cybersecurity recommendations.
#tp-link
Artificial intelligence
fromFortune
2 weeks ago

'I'm deeply uncomfortable': Anthropic CEO warns that a cadre of AI leaders, including himself, should not be in charge of the technology's future | Fortune

Anthropic's CEO advocates stronger AI regulation, transparency, and broader oversight rather than leaving safety decisions to a few tech leaders.
fromBusiness Matters
3 weeks ago

The Digital Balancing Act: How Growing Businesses Can Move Faster Without Sacrificing Security

Because of this massive shift, the pressure on business owners has never been higher. Consumers today have zero patience. If your mobile application is slow, or if your website lacks the features they want, they will instantly move to a competitor. To survive and grow, a modern business must be able to create and update its digital tools incredibly fast. However, rushing to build technology introduces a terrible risk: you might accidentally leave your digital doors wide open to criminals.
Software development
Information security
fromFast Company
2 weeks ago

Google's threat intel chief explains why AI is now both the weapon and the target

Generative AI systems are becoming core infrastructure and simultaneously increasing cyber risk as models become high-value targets susceptible to model-extraction and AI-enabled attacks.
Information security
fromDataBreaches.Net
2 weeks ago

Data Protection Failures on Moldovan Portals Leave Citizens at Risk - DataBreaches.Net

Moldova's government job portal exposed thousands of applicants' personal records for years through an unauthenticated, URL-indexed repository requiring only simple URL manipulation.
#ddos-attack
fromNextgov.com
3 weeks ago

FAA launches competition to modernize aging IT portfolio

In an effort to transform this portfolio, the agency is launching a challenge to gather ideas from industry on how to move these old systems to cloud-native architectures and reduce its technical debt. According to a Tuesday notice on Sam.gov, the agency is forgoing a traditional acquisition in favor of a challenge-based approach. The multi-phase competition will allow the FAA to watch vendors perform, not just pitch.
Science
fromTechRepublic
3 weeks ago

Substack Breach May Have Leaked Nearly 700,000 User Details Online

On February 3rd, we identified evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers, and other internal metadata,
Information security
Information security
from24/7 Wall St.
3 weeks ago

Why Palo Alto Networks (PANW) Is Really Down 6.5% This Morning

Palo Alto Networks reported solid Q2 results, but weak Q3 profit guidance and acquisition-related integration costs triggered a sharp share price decline.
fromTheregister
3 weeks ago

German train line back on track after DDoS yanks the brakes

"Deutsche Bahn has been and continues to be subject to attacks on its IT systems," the company said in an update posted hours after the initial service restoration. "The current attack is specifically targeted at DB and has occurred in waves. "The scale of the attack is considerable. Our defense mechanisms are working. We will not comment on speculation regarding the background of the attack."
Germany news
Information security
fromThe Local Germany
3 weeks ago

Deutsche Bahn's app and website hit by 'considerable' cyberattack

A sustained DDoS cyberattack is disrupting Deutsche Bahn's ticketing systems and timetable services, intermittently affecting bookings and customer access.
fromAol
3 weeks ago

10 Work-From-Home Jobs That Pay at Least $110,000 a Year

Data scientists pore over data to tease out key insights. For example, they may gather data from a survey or by scraping the internet. They then develop algorithms and models to analyze data, helping their organizations craft effective business strategies. A bachelor's degree in mathematics, statistics or computer science is often required for this role. As with many tech jobs, data scientists can work from almost anywhere, including home.
Careers
Information security
fromTechzine Global
3 weeks ago

Palo Alto lowers profit forecast after CyberArk deal

Palo Alto Networks has acquired multiple security firms and is integrating them, increasing costs and lowering profit guidance despite higher revenue forecasts.
Information security
fromThe Hacker News
3 weeks ago

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

Cybersecurity must be structural reinforcement ensuring operational continuity, visibility, and controlled adaptation amid continuous AI-driven threats, regulatory constraints, and geopolitical pressure.
Miscellaneous
fromLondon Business News | Londonlovesbusiness.com
3 weeks ago

UK security services are hunting Russian agents on home soil - London Business News | Londonlovesbusiness.com

Britain's intelligence agencies actively dismantle Russian spy networks, intercept communications, disrupt cyberattacks, expel operatives, and protect dissidents through coordinated counterintelligence operations.
Artificial intelligence
fromZDNET
3 weeks ago

What Aristotle and Socrates can teach us about using generative AI

AI language models can erode human creativity, while other AI models and local intelligence can strengthen critical thinking and resilience amid geopolitical and cyber threats.
Artificial intelligence
fromWIRED
3 weeks ago

Meta and Other Tech Companies Ban OpenClaw Over Cybersecurity Concerns

Companies are restricting or banning OpenClaw because it can autonomously control computers, behave unpredictably, and create privacy and security risks.
UK news
fromComputerWeekly.com
3 weeks ago

Businesses may be caught by government proposals to restrict VPN use | Computer Weekly

Limiting VPN use to under-16s risks disrupting legitimate business operations and weakening privacy and cybersecurity protections without clear carve-outs or implementation details.
Information security
fromBusiness Matters
3 weeks ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
fromDataBreaches.Net
3 weeks ago

Montana hospital restores phones as cyber-related network disruptions persist - DataBreaches.Net

Livingston HealthCare in Livingston, Montana, says its phone system has been restored after a cybersecurity incident disrupted communications and led the hospital to take some systems offline, but network disruptions continue as restoration work proceeds. The nonprofit hospital said Feb. 13 that a "potential cybersecurity incident" disrupted its phone systems and network and that it temporarily took certain systems offline "out of an abundance of caution" while it assessed the situation and worked with outside experts.
Healthcare
EU data protection
fromThe Hacker News
3 weeks ago

Safe and Inclusive ESociety: How Lithuania Is Bracing for AIDriven Cyber Fraud

Lithuania strengthens cyber resilience through a government-funded initiative coordinating universities and companies to deploy secure, market-ready digital solutions protecting citizens and critical infrastructure.
fromSecuritymagazine
3 weeks ago

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Organizations traditionally approach security risk through a narrow lens, often equating "security" primarily with cybersecurity. While cybersecurity is critically important, it represents only one subset of a much broader security landscape. Cybersecurity focuses on the protection of technologies that collect, store, process and transmit data. By contrast, security-related risk encompasses all forms of loss arising from the failure to protect organizational assets.
Information security
[ Load more ]