#cybersecurity

[ follow ]
fromFortune
1 day ago

Baker McKenzie crisis leads on risk-proofing the future: Do you have a blind spot in the boardroom? | Fortune

This renewed focus has brought economic statecraft to the forefront, as governments increasingly deploy trade restrictions, foreign investment scrutiny, and sanctions as foreign policy tools to advance their agendas and exert influence. After decades of near-unwavering commitment to free trade and the rapid globalization of markets across the Western world, we are witnessing a protectionist turn, with U.S. tariff levels reaching heights not seen in nearly a century.
World politics
Information security
fromWIRED
1 day ago

Hackers Dox ICE, DHS, DOJ, and FBI Officials

Multiple major privacy and security failures exposed sensitive communications, election infrastructure consolidation, and massive criminal cryptocurrency seizure, alongside new vulnerabilities in authentication and VPNs.
Health
fromDataBreaches.Net
1 day ago

Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident - DataBreaches.Net

Heywood and Athol hospitals experienced a cybersecurity-related network outage, took systems offline, engaged a third-party firm, and remain open while recovery continues.
US news
fromTelecompetitor
1 day ago

T-Mobile Announces Cyber Defense and Executive Briefing Centers

T-Mobile opened a Cyber Defense Center and an Executive Briefing Center to strengthen real-time cyber threat response and showcase enterprise technology solutions.
Information security
fromIrish Independent
2 days ago

'Shame on you!' - Brian O'Driscoll's speech interrupted by protesters at tech event linked to Israeli military

A protester interrupted Mr O'Driscoll at a Dublin cyber summit hosted by Check Point, citing the company's Israeli military links and actions in Gaza.
Information security
fromIT Pro
2 days ago

Thousands of exposed civil servant passwords are up for grabs online

Over 3,000 UK civil servants' passwords were exposed publicly, with hundreds of unique and repeated credentials across multiple government departments and councils.
#agentic-ai
fromInfoWorld
2 days ago
Artificial intelligence

Agents of chaos

Autonomous, self-learning AI agents enable real-world automation while increasing compliance, governance, and cybersecurity risks that organizations must manage.
fromIT Pro
1 week ago
Information security

Agentic AI poses major challenge for security professionals, says Palo Alto Networks' EMEA CISO

Agentic AI projects will likely fail at much higher rates and create major cybersecurity challenges unless strict strategic and technical controls are implemented.
fromIT Pro
1 week ago
Information security

Agentic AI poses major challenge for security professionals, says Palo Alto Networks' EMEA CISO

Information security
fromChannelPro
2 days ago

Observability opens up new opportunities for the channel

Observability platforms are rapidly growing, creating SaaS opportunities for channel partners as organizations invest to protect cloud investments and improve operational and security visibility.
fromFortune
3 days ago

Gen Z's digital native status is a double-edged sword. They have cyber blind spots | Fortune

Members of Gen Z are often referred to as "digital natives." They were born and raised in the internet era and have been engaging with computers, tablets, smartphones, and other connected devices from an early age. In many ways, this gives Gen Z an advantage in today's increasingly digital working environments-but that isn't always the case. In fact, research has consistently shown that each generation has its own unique blind spots when it comes to safely navigating the digital realm.
Information security
fromComputerWeekly.com
3 days ago

Securing the AI era: Huawei's cyber security strategy for the GCC | Computer Weekly

One of the fundamental principles of Huawei is to ensure compliance with international standards, industry best practices, customer requirements and local laws and regulations,
Information security
fromThe Hacker News
3 days ago

Beware the Hidden Costs of Pen Testing

Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money - while producing inferior results. The benefits of pen testing are clear. By empowering "white hat" hackers to attempt to breach your system using similar tools and techniques to an adversary, pen testing can provide reassurance that your IT set-up is secure. Perhaps more importantly, it can also flag areas for improvement.
Information security
#ransomware
fromThe Walrus
3 days ago
Information security

The Cyberattack That Stole 280,000 Identities-and Showed How Easily We Can Be Duped | The Walrus

Information security
fromTheregister
2 weeks ago

No suds for you! Asahi attack leaves Japanese drinkers dry

A ransomware attack disabled Asahi's Japanese distribution and call-center systems, forcing manual order processing and causing domestic supply shortages while investigations continue.
US news
fromDataBreaches.Net
2 weeks ago

Judge throws out lawsuit against Columbus over data breach - DataBreaches.Net

A judge dismissed a lawsuit claiming Columbus failed data security after a Rhysida ransomware attack that exposed over 6 TB of city data.
fromThe Walrus
3 days ago
Information security

The Cyberattack That Stole 280,000 Identities-and Showed How Easily We Can Be Duped | The Walrus

UK politics
fromwww.bbc.com
3 days ago

Cabinet Office rejects Cummings' China breach claim

Claims assert Chinese actors breached high-level UK 'Strap' systems in 2020, exposing extremely secret intelligence and Cabinet Office material, while the government denies any compromise.
Information security
fromArs Technica
3 days ago

Breach of F5 requires "emergency action" from BIG-IP users, feds warn

A nation-state hacking group breached F5, stole BIG-IP build systems, source code, and customer configurations, creating imminent supply-chain exploitation risk for thousands of networks.
fromFortune
3 days ago

AI trading is flooding Wall Street-and fueling a 1.2 trillion-message trading surge, NYSE president says | Fortune

Humans are no longer the ones setting the breakneck pace on Wall Street. The New York Stock Exchange is now processing 1.2 trillion order messages per day, a staggering threefold jump from just four years ago, according to New York Stock Exchange President Lynn Martin. The surge, she said, is being driven by AI-fueled trading, algorithmic strategies, and hyperspeed market participants that have transformed the structure of U.S. markets.
Business
Artificial intelligence
fromFortune
3 days ago

Reddit co-founder Alexis Ohanian says 'so much of the internet is dead'-and the rise of bots and 'quasi-AI, LinkedIn slop' killed it | Fortune

Automated bots and AI-generated accounts now constitute a large portion of internet traffic, raising demand for live, verifiable human engagement on social platforms.
#data-breach
Privacy technologies
fromDataBreaches.Net
4 days ago

Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches - DataBreaches.Net

Eight car insurance companies paid $14.2 million for failing to protect private data of over 825,000 New Yorkers, exposing sensitive personal information to hackers.
Information security
fromwww.independent.co.uk
5 days ago

Revealed: Hundreds of passwords linked to government departments leaked on dark web

Leaked credentials from multiple UK government domains and attempts to sell classified documents expose significant cybersecurity vulnerabilities that threaten national security and critical infrastructure.
fromDataBreaches.Net
4 days ago
Privacy technologies

Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches - DataBreaches.Net

fromTheregister
4 days ago

Trump admin slashes CISA staff again amid shutdown

This is just the latest round of reductions to the CISA workforce since Trump came to office in January. Employees at the Agency have been worried about cuts for months. When we reported layoff fears in April, CISA had an estimated 3,300 person workforce; according to DHS' shutdown contingency document the agency had just 2,540 people as of the end of May.
US politics
#cisa
#windows-10
Artificial intelligence
fromFast Company
4 days ago

The Boy Scouts' newest survival skills are surprising-and critical

Scouting America added AI and cybersecurity merit badges to teach scouts tech skills, ethics, and digital literacy while aiming to stay relevant and retain members.
US politics
fromwww.independent.co.uk
5 days ago

UK's cyber security agency warns of sophisticated' threat from Chinese hackers

Chinese hackers pose a growing, sophisticated threat to the UK with a 50% rise in significant incidents; independent journalism seeks public support to fund reporting.
Information security
fromTheregister
5 days ago

NCSC demands action amid 50% surge in major UK cyberattacks

Nationally and highly significant cyberattacks increased roughly 48–50 percent year-on-year while total incident volume remained essentially unchanged, indicating rising attack severity.
Miscellaneous
fromMail Online
5 days ago

Experts say a cyberattack 'can't be ruled out' for the Vodafone outage

A vendor's non-malicious software issue caused a major Vodafone outage affecting hundreds of thousands; experts say a cyberattack or staff error cannot be ruled out.
UK politics
fromIT Pro
5 days ago

Government urges large enterprises to shore up defenses as NCSC warns UK faces four 'nationally significant' cyber attacks every week

UK ministers urged major companies to make cybersecurity a board-level priority and adopt measures like Cyber Essentials, the Cyber Governance Code, and NCSC services.
fromChannelPro
5 days ago

Data at risk: helping your customers close gaps in their supply chain

You can't outsource accountability, but many organizations are doing just that, often without even realizing it. This is especially the case when it comes to data. As businesses rely more heavily on third-party suppliers to store, move, and manage their data, the risk of something going wrong multiplies. Whether that's compliance, the ability to restore lost data, or susceptibility to cyber attack.
EU data protection
Information security
fromSecuritymagazine
5 days ago

Cyber Resilience Now: Why 2025 Demands a Shift from Defense to Readiness

State-backed cyber campaigns are becoming patient, infrastructure-focused threats; organizations must prioritize resilience—withstanding attacks, recovering rapidly, and maintaining operations amid sophisticated compromises.
fromFortune
5 days ago

Top defense CEO on America's 'anachronistic' aging infrastructure: 'Our adversary can use their entire industrial base' | Fortune

"Those areas where we had large seas or oceans between us and adversaries are no longer the boundary conditions that we have experienced," she said, noting that the U.S. has adversaries that operate in "domains" beyond land, sea, and air, but also cyber and space.
US news
fromwww.bbc.com
5 days ago

Firms advised to put plans on paper in case of cyber-attack

Joe TidyCyber correspondent, BBC World Service Getty Images People should plan for potential cyber-attacks by going back to pen and paper, according to the latest advice. The government has written to chief executives across the country strongly recommending that they should have physical copies of their plans at the ready as a precaution. A recent spate of hacks has highlighted the chaos that can ensue when hackers take computer systems down.
Information security
fromeLearning Industry
5 days ago

How Gamification Is Enhancing Public Sector Preparedness

Government training has never been more critical or more complex. From active shooter preparedness to cybersecurity readiness, public servants are increasingly called to navigate high-stakes scenarios where decisions can have life-or-death consequences. Traditional training methods like static presentations, dense manuals, or infrequent workshops often fail to engage or prepare participants for the dynamic challenges they face. Enter gamification: the application of game design principles to non-game contexts.
US politics
#remote-work
fromSocial Media Explorer
1 week ago
Information security

The Biggest Challenges for Cyber Security Managers - Social Media Explorer

Remote and hybrid work dramatically increases cyber risk by expanding attack surfaces, requiring proactive, adaptive, and human-centric security beyond traditional defenses.
fromIT Brew
1 week ago
Remote teams

What it was like to be working in IT during the Covid-19 pandemic

IT professionals rapidly shifted to support a massive remote workforce, defending systems, assisting users, and maintaining infrastructure amid heightened cybersecurity and operational strain.
fromFortune
6 days ago

The search for corporate America's next Fortune 500 CEOs | Fortune

At Fortune, we've spent almost a century studying what separates the good leaders from the great ones; the ones who don't just survive disruption, but shape it. The next wave of corporate chiefs is emerging from a radically different playbook. They're products of an economy defined by technological acceleration, and operate with fluency across disciplines that didn't even exist in the CEO vocabulary a decade ago: data science, AI governance, cybersecurity, social trust, geopolitical volatility, and shifting expectations of what leadership should look like.
Business
Tech industry
fromMail Online
6 days ago

Warning to Microsoft customers as support for Windows 10 ends TOMORROW

Windows 10 support ends tomorrow, stopping security updates and leaving millions of devices vulnerable unless upgraded to Windows 11 or paid extended updates.
Law
fromABA Journal
1 week ago

Hackers gained access to 'small number' of attorney emails at Williams & Connolly, firm confirms

Hackers accessed a small number of Williams & Connolly attorney email accounts via a zero-day attack; no evidence of extraction from other IT systems.
Food & drink
fromwww.bbc.com
1 week ago

How hackers forced brewing giant Asahi back to pen and paper

A cyber-attack forced Asahi to halt most domestic production, causing manual order processing and widespread shortages across Japan's beer and beverage supply chain.
#cybercrime
fromBon Appetit
1 week ago

Japan's Supply of Asahi Beer Almost Ran (Super) Dry

No one is safe from cyber attacks, it seems-a lesson Japan's Asahi Group, maker of the popular Asahi Super Dry beer, learned last week after a significant cybersecurity breach brought its Japanese factories to a standstill. In a statement, the company said there was evidence of "a potential unauthorized transfer of data," and that they'd been the target of a ransomware attack.
Food & drink
fromIT Pro
1 week ago

'Payroll Pirates' target US universities, Microsoft warns

"However, it's important to note that any SaaS systems storing HR or payment and bank account information could be easily targeted with the same technique," Microsoft researchers said. "These attacks don't represent any vulnerability in the Workday platform or products, but rather financially motivated threat actors using sophisticated social engineering tactics and taking advantage of the complete lack of multifactor authentication (MFA) or lack of phishing-resistant MFA to compromise accounts."
Information security
fromVue.js Jobs
1 week ago

Frontend Engineer at Riot Security - VueJobs

We want to instill cybersecurity good practices to employees in a way that's actually effective, and entertaining enough so that employees don't feel like they're working. Think Duolingo but for cybersecurity. We created a platform to easily rollout a cybersecurity awareness program: the platform sends chat-based 4-minutes long courses to teams. Following the courses, the other side of the platform simulates phishing attacks, to prepare employees to face hackers - but in a safe environment.
Careers
#north-korea
fromWIRED
1 week ago
Information security

North Korean Scammers Are Doing Architectural Design Now

fromTechCrunch
1 week ago
Information security

North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say | TechCrunch

fromWIRED
1 week ago
Information security

North Korean Scammers Are Doing Architectural Design Now

fromTechCrunch
1 week ago
Information security

North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say | TechCrunch

fromTechzine Global
1 week ago

More than 100 companies likely affected by Oracle hack

Security researchers at Google say that more than 100 organizations are likely to have fallen victim to a large-scale cyberattack on Oracle E-Business Suite. The hacking campaign, carried out by the notorious CL0P group, targets business-critical systems and has already stolen "mass amounts of customer data." The attack may have started three months ago, according to Google's cybersecurity team. "This level of investment suggests the threat actor(s) responsible for the initial intrusion likely dedicated significant resources to pre-attack research," Google said.
Information security
#ai-risk
fromwww.independent.co.uk
1 week ago
Artificial intelligence

AI will pain whole swathe of UK economy before providing net benefit'

AI will inflict short-term harm on the UK economy and enable models to discover cyber vulnerabilities, while advanced AI risks biological, chemical, and autonomous threats.
fromFortune
1 week ago
Artificial intelligence

A whopping 72% of S&P 500 companies disclosed AI as a 'material risk' on their 10-Ks this year | Fortune

A growing majority of S&P 500 companies list AI as a material risk, citing reputational, cybersecurity, implementation, and regulatory threats.
fromFortune
1 week ago
Artificial intelligence

A whopping 72% of S&P 500 companies disclosed AI as a 'material risk' on their 10-Ks this year | Fortune

World politics
fromwww.aljazeera.com
1 week ago

Will Trump's tariffs push China and India closer?

India and China resume direct flights after five years to strengthen trade ties and compete over manufacturing, supply chains, and economic influence amid shifting tariffs.
fromNextgov.com
1 week ago

Senator makes new attempt to extend cyber info-sharing law by 10 years

The measure from Michigan Senator Gary Peters renames the 2015 Cybersecurity Information Sharing Act as the Protecting America from Cyber Threats Act. The rephrasing, he said, is meant to avoid confusion with the similar sounding Cybersecurity and Infrastructure Security Agency in DHS. The legislation also includes a retroactive provision to address any gaps in liability protections. The 2015 law let private sector providers transmit cyber threat intelligence with government partners with key legal protections in place.
US politics
Information security
fromThe Hacker News
1 week ago

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Attackers increasingly combine social engineering, AI-driven manipulation, and cloud exploitation, widening attack surfaces across communication platforms, devices, and cloud services.
Information security
fromDataBreaches.Net
1 week ago

Shad White's office finds nearly a third of Mississippi's state agencies fail cybersecurity requirements - DataBreaches.Net

One third of Mississippi state agencies failed to complete required third-party cybersecurity assessments, leaving critical government operations exposed to cybercrime risk.
Information security
fromSecurityWeek
1 week ago

Realm.Security Raises $15 Million in Series A Funding

Realm.Security raised $15 million Series A to expand its AI-native Security Data Pipeline platform that streamlines security data, speeds investigations, and reduces SOC costs.
Information security
fromIT Pro
1 week ago

Organizations lag on deepfake protection

Deepfake attacks are increasing across multiple vectors, causing substantial financial losses while organizational defenses, budgets, and training remain insufficiently effective.
fromSecuritymagazine
1 week ago

Cybersecurity Trust Gaps: Why Stakeholders Believe Hackers Before They Believe You

Not long ago, hackers claimed to have stolen nearly 19 million customer records from TalkTalk. Within hours, that number appeared in headlines across the U.K. and beyond. The problem was that it was not true. TalkTalk later pushed back, calling the claim "wholly inaccurate" and "very significantly overstated." But by then, the damage was done. Customers, regulators, and journalists had already absorbed the hacker's story as fact, and TalkTalk's correction barely registered in comparison.
Information security
US news
fromDataBreaches.Net
1 week ago

Policyholder Plot Twist: Cyber Insurer Sues Policyholder's Cyber Pros - DataBreaches.Net

Ace American sued CoWorx's cybersecurity vendors alleging negligence and breach of contract to recover $500,000 paid under its cyber insurance policy.
Information security
fromTechzine Global
1 week ago

Fifty years of security by design: why isn't it working?

Persistent misguided incentives, siloed stakeholders, and a speed-first Silicon Valley culture prevented adoption of security-by-design, leaving modern systems as insecure as decades ago.
fromAbove the Law
1 week ago

Williams & Connolly Hit By Foreign Hackers - Above the Law

Suspected Chinese government-backed hackers have breached computer systems of US law firm Williams & Connolly, which has represented some of America's most powerful politicians, as part of a larger spying campaign against multiple law firms, according to a letter the firm sent clients and a source familiar with the hack....Liu Pengyu, a spokesperson for the embassy, told CNN in response to a separate hacking allegation last month: "China firmly opposes and combats all forms of cyber attacks and cybercrime."
Information security
EU data protection
fromTechzine Global
1 week ago

AgentForce will fix cybersecurity threats and compliance issues automatically

Salesforce expands Agentforce with AI agents that automate threat detection, response, and compliance checks, integrating with CrowdStrike, Okta, Security Center, and Privacy Center.
Information security
fromThe Cipher Brief
1 week ago

Inside the Policy Failure Putting America's Critical Infrastructure at Risk

Expiration of key cyber-sharing and local-defense programs, combined with congressional inaction, has created a widening gap in national cyber defenses.
fromAcm
1 week ago

Cyberpsychology's Influence on Modern Computing

Cyberpsychology investigates the psychological processes related to technologically interconnected human behavior, informing disciplines such as human-computer interaction (HCI), computer science, engineering, psychology, and media and communications studies.5 The field explores how digital technologies influence and transform human cognition, emotion, and social interaction, as well as the reciprocal impact these human elements have on technologies. At its core, cyberpsychology seeks to understand the dynamic interplay between humans and technology.
Artificial intelligence
fromwww.aljazeera.com
1 week ago

Will Trump's tariffs push China and India closer?

India and China are resuming direct flights after five years of suspension and say they will strengthen trade ties. Their relationship has long been defined by rivalry, competing ambitions and a disputed border. Now, India and China are resuming direct flights after a five-year suspension. United States President Donald Trump's tariffs and a shifting trade landscape could push them closer together.
World news
US politics
fromAbove the Law
1 week ago

Morning Docket: 10.08.25 - Above the Law

Legal and political developments include official deflection over Epstein ties, law‑firm cyberattacks, OMB removal of furlough back‑pay mention, and major court and regulatory shifts.
Information security
fromIT Pro
1 week ago

Repeated cyber attacks act as a stark reminder this cybersecurity awareness month

Cyberattacks are inflicting severe operational and financial damage on businesses and their supply chains, causing production halts, revenue loss, and supplier failures.
Information security
fromComputerWeekly.com
1 week ago

The Security Interviews: David Bradbury, CSO, Okta | Computer Weekly

Okta suspended development after an October 2023 helpdesk breach and launched a Secure Identity Commitment to improve products, customer practices, industry protection, and corporate hardening.
Information security
fromSecurityWeek
1 week ago

Filigran Raises $58 Million in Series C Funding

Filigran raised $58 million Series C, totaling over $100 million, to expand internationally, hire talent, and accelerate development of XTM suite, OpenGRC, and AI.
Information security
fromSecurityWeek
1 week ago

Security Firm Exposes Role of Beijing Research Institute in China's Cyber Operations

BIETA and its subsidiary CIII operate as front organizations supporting China's Ministry of State Security, researching and supplying technologies for intelligence, counterintelligence, and military operations.
fromIT Pro
1 week ago

IT and business pros call for more tech training

With the tech skills gap showing no signs of closing, very few IT and business professionals believe they're getting enough support for tech learning. A survey of 1,500 tech executives, IT professionals, and business professionals in the US, UK, and India from tech workforce development firm Pluralsight has revealed that while 95% say building a culture of learning is a priority at their organization, the same number believe they need more support to learn tech skills.
Online learning
Information security
fromSecurityWeek
1 week ago

The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn

Time-related rollover bugs like Y2K38 and Y2036 are exploitable today, risking system failures, cybersecurity bypasses, and physical safety impacts in critical infrastructure.
Venture
fromAlleywatch
1 week ago

The Weekly Notable Startup Funding Report: 10/6/25

Fourteen startup funding deals raised $2.3B this week, led by Cerebras Systems ($1.1B), CyberCube ($180M), and multiple AI and software startups.
Information security
fromTelecompetitor
1 week ago

Nearly 35B Cybersecurity Threats in 2025: Report

A multi-layered cybersecurity defense combining AI-driven monitoring and human analysts is essential for business resilience amid billions of annual cyber events.
Information security
fromThe Drum
1 week ago

Ad of the Day: Bitdefender turns AI into weapon against scams

Bitdefender uses generative AI to demonstrate how scammers hijack trust and emotions, reframing scams as psychological warfare and reducing victim-blaming.
fromTechCrunch
2 weeks ago

A breach every month raises doubts about South Korea's digital defenses | TechCrunch

The government's approach to cybersecurity remains largely reactive, treating it as a crisis management issue rather than as critical national infrastructure," Brian Pak, the chief executive of Seoul-based cybersecurity firm Theori, told TechCrunch. Pak, who also serves as an advisor to SK Telecom's parent company's special committee on cybersecurity innovations, told TechCrunch that because government agencies tasked with cybersecurity work in silos, developing digital defenses and training skilled workers often get overlooked.
Information security
fromSecurityWeek
2 weeks ago

Oneleet Raises $33 Million for Security Compliance Platform

The solution combines attack surface management with code scanning, identifying forgotten assets and exposed services and uncovering vulnerabilities before they enter production. The company also offers penetration testing and helps organizations prepare for audits. Oneleet says its solution works with existing stacks, allowing businesses to connect cloud providers, repositories, identity platforms, and productivity utilities with its scanners and monitoring tools, for automated security.
Venture
Information security
fromIT Pro
2 weeks ago

Middlesbrough Council boosts cybersecurity spending, strategy in response to repeated cyber attacks

Middlesbrough Council is investing about £25,000 in a 12-month cybersecurity service amid a year-long security overhaul following disruptive DDoS attacks and resilience testing.
fromSecurityWeek
2 weeks ago

MokN Raises $3 Million for Phish-Back Solution

French cybersecurity startup MokN today announced raising €2.6 million (~$3 million) for its deception-based identity protection solution. The investment round was led by Moonfire, with additional support from OVNI Capital, Kima Ventures, and several angel investors. Founded in 2023, Paris-based MokN was launched last year fully bootstrapped and is already used by over 20 enterprises, including top French businesses.
Information security
[ Load more ]