#cybersecurity

[ follow ]
Information security
fromArs Technica
21 minutes ago

Hacker who stole 120,000 bitcoins wants a second chance-and a security job

Former black hat hacker Lichtenstein reformed in prison and seeks to use adversary skills in cybersecurity while working to regain community trust.
US politics
fromWIRED
40 minutes ago

Legislators Push to Make Companies Tell Customers When Their Products Will Die

Massachusetts bills would require companies to disclose when software support for connected devices will end to improve cybersecurity and consumer protection.
#biglaw
fromAbove the Law
2 hours ago
Law

Alienating Our Affections - Above the Law

Sullivan & Cromwell adopted an income-partner model, accelerating the decline of single-tier law firm partnerships across Biglaw.
fromAbove the Law
2 days ago
Law

Partnerships, Legal Education, Marriages... Lawyers Were Destroying Everything Last Week - See Generally - Above the Law

Consolidation in Biglaw, state interference in legal education, and a Supreme Court cybersecurity breach signal shrinking opportunities and systemic institutional vulnerabilities.
fromAbove the Law
2 days ago
Law

Partnerships, Legal Education, Marriages... Lawyers Were Destroying Everything Last Week - See Generally - Above the Law

fromenglish.elpais.com
6 hours ago

Israel blocks Spain's judicial investigation into Pegasus spyware scandal

Judge Jose Luis Calama, of the Audiencia Nacional high court, stated that Israel has blocked the investigation into a spying case against several members of Prime Minister Pedro Sanchez's government using a spyware called Pegasus, marketed and developed by an Israeli company. The probe found preliminary evidence of crimes involving the disclosure of secrets, which jeopardized the security of the Spanish State.
Miscellaneous
Information security
fromTechzine Global
11 hours ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
#ai-agents
fromComputerWeekly.com
1 day ago

UK and China reach out across cyber no-man's land | Computer Weekly

The so-called 'Cyber Dialogue' will supposedly help manage cyber threats to both country's national security, revealed Bloomberg, which was first to reported the move citing anonymous sources with knowledge of the forum, It claimed that the forum will improve communication, enable private discussions, and deescalate tensions. It also establishes a direct line between London and Beijing to enable senior officials to discuss ongoing cyber incidents.
Information security
#cisa
Artificial intelligence
fromTelecompetitor
1 day ago

AI and rural broadband: Interview with Shirley Bloomfield

AI can significantly improve efficiency, troubleshooting, cybersecurity, network design, and customer experience for rural broadband providers when applied correctly.
Information security
fromTheregister
1 day ago

Best of British: UK's infosec envoys are mostly US firms

UK government appointed company ambassadors to promote the Software Security Code of Practice, aiming to improve software supply chain security, commercial trust, and cyber defenses.
Information security
fromTechzine Global
1 day ago

Why AI adoption requires a dedicated approach to cyber governance

Enterprises must overhaul cyber governance to address AI's expanded attack surface and AI-supply-chain risks, because traditional SaaS governance and GRC tools are inadequate.
Information security
fromTechzine Global
1 day ago

What are the cyber threats to the Winter Olympics?

Major sporting events like the Winter Olympics attract cybercriminals and state-sponsored hackers targeting critical infrastructure, high-value individuals, and using phishing, spoofed Wi‑Fi, and DDoS attacks.
fromZDNET
1 day ago

9 strategic imperatives every business leader must master to survive and thrive in 2026

As we enter 2026, we mark this anniversary by bringing together three leaders navigating the most complex intersection of technology, geopolitics, and organizational change we have ever witnessed. André Pienaar, Dr. David Bray, and Ken Banta joined us to discuss what boards and CEOs must understand to remain competitive in an era defined by cascading disruptions and incomplete information. The conversation focused on the critical questions every board should be asking this year.
Artificial intelligence
US politics
fromNextgov.com
2 days ago

Funding bill extends TMF and cyber measures through September

A congressional funding package would extend authorization for the Technology Modernization Fund and several cybersecurity statutes through Sept. 30, 2026, if enacted.
Information security
fromSecuritymagazine
2 days ago

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Rebuilding trust after a cybersecurity breach requires sustained, transparent, aligned communications that demonstrate accountability, empathy, and strategic action across internal and external channels.
#ai-security
#remote-work
Information security
fromThe Hacker News
3 days ago

Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More

Automation and interconnected systems are increasing attack surfaces, enabling attackers to exploit small flaws and remain undetected, outpacing defenders.
Information security
fromDataBreaches.Net
4 days ago

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East - DataBreaches.Net

A WhatsApp phishing campaign targeted Iran-related activists during the country’s longest nationwide internet shutdown amid widespread protests.
World news
fromwww.theguardian.com
5 days ago

Guterres warns of powerful forces' undermining global cooperation'

Powerful forces increasingly undermine global cooperation through rising military spending, climate inaction, digital disinformation, and reduced humanitarian funding.
fromNextgov.com
6 days ago

Katie Arrington departs DOD to rejoin private sector

"If you go on LinkedIn one more time and tell me how hard CMMC is, I'm going to beat you," she said at an AFCEA DC luncheon in April.
Information security
US news
fromDataBreaches.Net
6 days ago

Act Now: Survey on Threats Researchers and Journalists Experience Ends January 18 - DataBreaches.Net

Security researchers and journalists face legal threats, injunctions, government searches, and violent threats from cybercriminals, prompting a survey collecting their experiences.
Information security
fromDataBreaches.Net
1 week ago

Website that leaked thousands of ICE agents' personal information is down after DDoS attack - DataBreaches.Net

A website exposing ICE and Border Patrol personnel was hit by a DDoS cyberattack suspected to originate from Russian bot farms.
fromWIRED
1 week ago

Former CISA Director Jen Easterly Will Lead RSA Conference

The organization puts on the prominent annual gathering of cybersecurity experts, vendors, and researchers that started in 1991 as a small cryptography event hosted by the corporate security giant RSA. RSAC is now a separate company with events and initiatives throughout the year, but its conference in San Francisco is still its flagship offering with tens of thousands of attendees each spring.
Information security
Law
fromabovethelaw.com
1 week ago

Hacked Database To Match Their Hack Opinions - See Also

Repeated hacks of the Supreme Court, a former Biglaw partner accused of murdering his wife, an xAI deepfake investigation, and a citation-bias dispute.
California
fromwww.eastbaytimes.com
1 week ago

Alameda briefs: Assembly's Bonta responds to release of ChatGPT Health

Combining AI with personal medical records raises serious data privacy, cybersecurity, and consumer protection concerns that require legislative safeguards.
fromTNW | Data-Security
1 week ago

Belgian cybersecurity startup Aikido becomes unicorn

Aikido's core proposition is rooted in the conviction that traditional application security tools have not kept pace with the rapid evolution of software development. Modern engineering teams ship code more frequently, and the widespread adoption of AI tools for coding has heightened both velocity and risk. Legacy scanners and point solutions can generate noise and distract developers, rather than offering actionable insights at the right moment.
Venture
Artificial intelligence
fromBusiness Matters
1 week ago

AI set to 'turbocharge' Britain's road and rail network, says Transport Select Committee chair

AI and digital technologies will transform Britain's road and rail networks, improving maintenance, reliability and supporting economic growth, with cybersecurity safeguards required.
fromTechzine Global
1 week ago

Dell PowerStore 4.3 supports 30TB QLC drives and enhanced cybersecurity

The new version combines lower costs with improved cybersecurity and offers up to 2 petabytes of storage in a 2U rack space. Companies are struggling with explosive data growth, increasing cyber threats, and limited budgets. Dell Technologies is responding to this with PowerStore 4.3, a platform that addresses storage challenges without compromising performance or security. The latest version brings innovations that double storage density and reduce energy costs.
Information security
#ai
fromFortune
2 weeks ago
Artificial intelligence

Crystal Ball: What 2026 holds for cybersecurity, healthcare, robotics, and more | Fortune

fromFortune
2 weeks ago
Artificial intelligence

Crystal Ball: What 2026 holds for cybersecurity, healthcare, robotics, and more | Fortune

#ai-adoption
fromNextgov.com
1 week ago
Artificial intelligence

Report: Workforce shortages, security fears among biggest hindrances to agency AI adoption

fromNextgov.com
1 week ago
Artificial intelligence

Report: Workforce shortages, security fears among biggest hindrances to agency AI adoption

Artificial intelligence
fromComputerWeekly.com
1 week ago

Cutting through the noise: SaaS accelerators vs. enterprise AI | Computer Weekly

Choose SaaS AI accelerators for fast automation and measurable gains; use enterprise AI when trusted, verifiable, network-contained outputs are required for cross-team or sensitive-data work.
fromTechzine Global
1 week ago

America puts an end to international cyber cooperation

On the instructions of President Donald Trump, the United States is withdrawing from international organizations that focus on cybersecurity and hybrid threats. There are concerns within the cybersecurity sector that this decision could undermine global resilience to digital threats. As reported by Computing, the US government claims that these partnerships are not sufficiently effective and are not in line with national interests.
US politics
Information security
fromComputerWeekly.com
1 week ago

How one IT chief shifted the needle on a reactive IT strategy | Computer Weekly

Norsk Global overhauled outdated IT infrastructure to improve resiliency, reduce costs, and enable operational continuity, customer API availability, and future innovation.
Information security
fromwww.housingwire.com
1 week ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
Europe politics
fromwww.theguardian.com
1 week ago

Cypriot president says he has nothing to fear' over corruption allegations

Cyprus's president denies involvement in a viral corruption video as investigations and claims of hybrid attack prompt resignations and cybersecurity inquiries.
fromwww.bbc.com
1 week ago

Instagram denies breach after many receive emails asking to reset password

Instagram has denied it has been victim to a data breach after many users received emails prompting them to reset their password. The firm said it had resolved a problem which allowed "an external party" to get the social media platform to send out legitimate password reset requests to users. Instagram said there had been no breach of its systems, and told users their accounts were secure.
Information security
from24/7 Wall St.
1 week ago

Upgrades: Analysts are Still Bullish on Nvidia (NVDA), Crowdstrike (CRWD) and Oracle (ORCL) Upside

"The reality is there's one chip in the world, fueling the AI revolution, and that's Nvidia. And I think as it plays out, numbers are significantly underestimated. I think 15% to 20% at a minimum going into 2026. You put that together, I think we're looking at a $250 stock in a base case to end 2026,"
Business
Miscellaneous
fromTechzine Global
1 week ago

EU calls on open source to break way from US firms

European Commission seeks stakeholder feedback to create an independent, sustainable open-source strategy focusing on cloud, AI, cybersecurity and hardware to reduce dependency on US tech.
World news
fromwww.aljazeera.com
1 week ago

India's VPN ban in Kashmir adds to psychological pressure', say residents

A two-month government ban on VPNs in Indian-administered Kashmir threatens IT professionals' ability to secure sensitive data and risks job displacement.
#public-sector
Miscellaneous
fromwww.thelocal.se
1 week ago

Swede suspected of spying for Russia, prosecutor says

A 33-year-old Swedish IT consultant was arrested on suspicion of spying for Russia and is charged with assisting Russia's intelligence service.
San Francisco
fromsfist.com
1 week ago

Day Around the Bay: SF Traffic Deaths Decreased in 2025 Thanks to Vision Zero Initiatives

Traffic deaths fell from 43 in 2024 to 25 in 2025 after daylighting and speed cameras; pedestrians accounted for most fatalities.
UK news
fromComputerWeekly.com
1 week ago

Computer Misuse Act reform is overdue - not all anniversaries should be celebrated | Computer Weekly

The Computer Misuse Act is outdated, actively harming cybersecurity professionals, the economy, and national safety, and urgently requires comprehensive overhaul to protect good-faith activity.
Information security
fromNextgov.com
2 weeks ago

Chinese hackers targeted email systems of US congressional staff, people familiar say

Chinese state-aligned hackers targeted email inboxes of staff in multiple House committees, risking exposure of legislative communications.
Information security
fromFortune
2 weeks ago

Invictus-backed cybersecurity company ThreatModeler acquires competitor IriusRisk for over $100 million | Fortune

ThreatModeler acquired rival IriusRisk for over $100 million, combining roughly $50 million ARR to scale automated vulnerability detection amid accelerating AI-driven coding risks.
fromFortune
2 weeks ago

Exclusive: Cyera CEO Yotam Segev on raising $400 million and why the stakes in cybersecurity are getting higher | Fortune

The wings are lifting the valuation of Segev's startup too. In June, Cyera was valued at $6 billion in its seventh funding round. Now, just six months later, Cyera is worth $9 billion. Cyera raised $400 million in its recently closed Series F funding, the company exclusively confirmed to Fortune. Blackstone Growth led the round, with participation from existing investors including Accel, Coatue, Cyberstarts, Georgian, Greenoaks, Lightspeed Venture Partners, Redpoint, Sapphire Ventures, Sequoia Capital, and Spark.
Information security
Information security
fromwww.bbc.com
2 weeks ago

Data stolen in Kensington and Chelsea cyber attack

A cyberattack on Kensington and Chelsea Council exposed personal details of hundreds of thousands, potentially enabling sophisticated scams.
#data-breach
fromwww.standard.co.uk
2 weeks ago

London council warns 100,000 households' personal details could have been stolen in cyber attack

Kensington and Chelsea Council has written to 100,000 households warning their personal details may have been taken in a recent cyber attack. The town hall urged residents to follow National Cyber Security Centre advice and warned criminals could use the information to make scams seem more legitimate, according to an update on its website. The council said the attack was carried out "with criminal intent"
UK news
Software development
from24/7 Wall St.
2 weeks ago

These 5 Software Stocks Prove Profitability Beats Growth in 2026

Profitability at scale, not just revenue growth, determines top software winners as markets reward companies converting dominance into strong earnings and expanding margins.
UK politics
fromTheregister
2 weeks ago

MoJ spent 50M on security at Legal Aid Agency before attack

The Ministry of Justice spent £50 million on Legal Aid Agency cybersecurity, yet a December 2024 intrusion went undetected until April 2025, exposing major oversight failures.
Education
fromSecuritymagazine
2 weeks ago

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

A strong, modern, and secure school network is essential to support AI, protect data, and enable scalable, reliable digital learning across districts.
fromNextgov.com
2 weeks ago

Analysts watch for heightened cyber, disinformation campaigns following Venezuela raid

Various groups are keeping their eyes peeled for hacking and information warfare efforts launched in response to an unprecedented U.S. operation conducted over the weekend that captured Venezuelan leader Nicolás Maduro and brought him to New York to face criminal charges. The Cybersecurity and Infrastructure Security Agency is continuing to monitor the cyber landscape in the raid's aftermath. In a written statement, CISA acting Director Madhu Gottumukkala did not acknowledge any disinformation tracking, but said that the recent events in Venezuela demand "heightened vigilance" across sectors.
Information security
fromTechCrunch
2 weeks ago

How World Cup champion Mario Gotze built a parallel career as an angel investor | TechCrunch

I only agree to invest if the startup and its founders check all the boxes,
Soccer (FIFA)
#hacktivism
fromTechCrunch
2 weeks ago
Information security

Hacktivist deletes white supremacist websites live on stage during hacker conference | TechCrunch

fromTechCrunch
2 weeks ago
Information security

Hacktivist deletes white supremacist websites live on stage during hacker conference | TechCrunch

Miscellaneous
fromFuturism
2 weeks ago

Woman Hacks "Tinder for Nazis," Tricks the Racist Users Into Falling in Love With AI Chatbots

Hacktivists exploited weak cybersecurity to delete white supremacist dating and service platforms and used AI to extract user information.
UK news
fromwww.theguardian.com
2 weeks ago

Kemi Badenoch says Trump's Venezuela raid was morally' right UK politics live

Government unveils a £210m cyber action plan to strengthen online public-service security, accelerate incident response, and protect citizens' data across benefits, taxes and healthcare.
fromNextgov.com
2 weeks ago

Kirsten Davies sworn in as Pentagon CIO

Kirsten Davies has been sworn in as the Pentagon's chief information officer, giving the Defense Department its first permanent IT head during Trump 2.0. Davies was confirmed by the Senate on Dec. 18 as part of a group of tech nominations, which included Ethan Klein to be the U.S. chief technology officer and Pedro Allende to lead the Department of Homeland Security's Science and Technology office. The LinkedIn page for the DOD CIO office said Davies was officially sworn in on Dec. 23.
Information security
fromTheregister
2 weeks ago

Palo Alto isn't saying if it will buy security start-up Koi

Koi offers endpoint software security and boasts that it can "Secure anything with an 'Install' button." Koi was founded by three members of the IDF's 8200 Intelligence Corps who claim it took them 30 minutes to create and publish an extension that could bypass most security environments, including those at large enterprises. Born from that was Koi, which they say "scans, governs, and monitors self-provisioned enterprise software at scale."
Silicon Valley
Privacy professionals
fromDataBreaches.Net
2 weeks ago

NZ: High Court grants injunction over ManageMyHealth cyber breach - DataBreaches.Net

A High Court injunction bars sharing Manage My Health stolen data, but limited jurisdiction and unserved attackers make the injunction unlikely to prevent further dissemination.
#ransomware
Public health
fromTheregister
2 weeks ago

New Zealand orders review into ManageMyHealth cyberattack

A cyberattack on ManageMyHealth exposed sensitive health records, affecting over 100,000 patients and prompting a government-ordered review and coordinated security response.
#mergers--acquisitions
Information security
fromDataBreaches.Net
2 weeks ago

Reminder: Survey on threats experienced by journalists and security researchers - DataBreaches.Net

Security researchers and journalists are asked to complete and share a survey on legal and violent threats they have experienced; responses accepted until January 28.
World news
fromTheregister
2 weeks ago

UK cyber pro lands Aussie visa after uncovering govt exploit

A British security researcher received an invite-only Australian Subclass 858 visa after discovering and responsibly reporting a critical vulnerability in a government system.
Information security
fromThe Hacker News
3 weeks ago

ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories

Threat actors are evolving rapidly, exploiting many small openings with precise, low-noise tactics that blur the line between normal operations and compromise.
Information security
fromChannelPro
3 weeks ago

The changing role of the MSP: What does this mean for security?

MSPs face rising cyberattacks because their privileged access can give attackers entry into many client networks and critical systems.
Information security
from24/7 Wall St.
3 weeks ago

Global X Cybersecurity's ETF May Be 2026's Best Investment As Cybercrime Explodes | BUG

Cybersecurity demand is rising, but BUG ETF underperformed in 2025 because investors now expect perfection from high-growth software companies.
fromNextgov.com
3 weeks ago

Microsegmentation: the unsung hero of cybersecurity (and why it should be your top priority)

Think of your network like an apartment building. You've got a locked front door - that's your perimeter. But once someone gets inside, there's no front desk checking IDs, no elevator security and the same outdated lock on every unit. An intruder can roam freely, entering any apartment they choose. Microsegmentation is the internal security system. It's the keycard for the elevator, the camera in the hallway, the unique lock on your door. It's what stops one compromised device from becoming a full-blown breach.
Information security
fromSocial Media Explorer
3 weeks ago

The Cost of Ignoring AI-Based Threats Going Into 2026 - Social Media Explorer

AI-Enhanced Phishing and Deepfakes: No longer are phishing emails riddled with obvious errors. AI tools can instantly craft convincing messages by harvesting content from social media and corporate sites, personalizing scams to increase their effectiveness. Adding to this, deepfake technology enables cybercriminals to mimic voices and even video images of executives to authorize wire transfers or issue fake instructions, making fraud exponentially harder to detect.
Information security
Law
fromSocial Media Explorer
3 weeks ago

Why Law Firms Choose Industry-Specific Managed IT - Social Media Explorer

Law firms must use specialized managed IT services to protect client confidentiality, meet compliance, and maintain competitive advantage.
fromSocial Media Explorer
3 weeks ago

Why Financial Businesses Need IT to Stay Secure - Social Media Explorer

The financial industry operates on a foundation of trust. Clients entrust financial institutions with their most sensitive data, from personal identification to investment portfolios. In an era where digital threats are constantly evolving, maintaining that trust is more challenging than ever. This makes robust security not just an operational need but a core business requirement. Implementing specialized IT solutions for financial experts is essential for protecting sensitive information, ensuring regulatory compliance, and preserving the integrity that underpins the entire sector.
Information security
#ai-safety
fromFortune
3 weeks ago
Artificial intelligence

OpenAI is hiring a 'head of preparedness' with a $550,000 salary to mitigate AI dangers that CEO Sam Altman warns will be 'stressful' | Fortune

fromIrish Independent
3 weeks ago
Artificial intelligence

ChatGPT maker offering $555,000 salary for 'head of preparedness' to head off threats to humanity from AI

fromFortune
3 weeks ago
Artificial intelligence

OpenAI is hiring a 'head of preparedness' with a $550,000 salary to mitigate AI dangers that CEO Sam Altman warns will be 'stressful' | Fortune

fromIrish Independent
3 weeks ago
Artificial intelligence

ChatGPT maker offering $555,000 salary for 'head of preparedness' to head off threats to humanity from AI

Artificial intelligence
fromwww.theguardian.com
3 weeks ago

This will be a stressful job': Sam Altman offers $555k salary to fill most daunting role in AI

OpenAI is hiring a head of preparedness to defend against AI-driven threats to mental health, cybersecurity, biological weapons, and self-training AIs.
fromwww.theguardian.com
3 weeks ago

Why should we pay these criminals?': the hidden world of ransomware negotiations

They call it stopping the bleeding: the vital window to prevent an entire database from being ransacked by criminals or a production line grinding to a halt. When a call comes into the cybersecurity firm S-RM, headquartered on Whitechapel High Street in east London, a hacked business or institution may have just minutes to protect themselves. S-RM, which helped a high-profile retail client recover from a Scattered Spider cyber-attack has become a quiet, often word-of-mouth, success.
Information security
Information security
fromDataBreaches.Net
4 weeks ago

Industry Continues to Push Back on HIPAA Security Rule Overhaul - DataBreaches.Net

Healthcare organizations oppose HHS’s proposed HIPAA Security Rule updates due to new financial burdens and unrealistic implementation deadlines.
UK news
fromwww.independent.co.uk
3 weeks ago

How 2025 became the year of the cyber hack - and what British businesses face next

Coverage of major issues relies on donations to fund unrestricted, paywall-free journalism while businesses face rising costs and increasing cyberattacks.
Medicine
fromFast Company
3 weeks ago

The 'internet of beings' is the next fronteir that could change humanity and healthcare

Implanted microscopic sensors will connect human organs to the internet, enabling continuous health monitoring, active biological intervention, and major medical, ethical, and security consequences.
[ Load more ]