#cybersecurity

[ follow ]
Marketing
fromBarchart.com
22 hours ago

Digital.Marketing Featured as Top Cybersecurity Digital Marketing Agency by SEC.co

SEC.co recognized Digital.Marketing as the top cybersecurity digital marketing agency for cybersecurity specialization, compliance-aware strategy, and revenue-focused execution.
Information security
fromTheregister
11 hours ago

Deepfake job seeker applied to work for an AI security firm

Deepfake videos and fabricated profiles are increasingly used to apply for cybersecurity roles, deceiving experienced professionals and exploiting hiring platforms like LinkedIn.
Miscellaneous
fromTechCrunch
18 hours ago

Meet the new European unicorns of 2026 | TechCrunch

Five European-rooted tech startups reached valuations above $1 billion in January, signaling strong VC appetite despite valuations not equaling commercial success.
Social media marketing
fromBusiness Insider
1 day ago

Misleading TikTok posts are going viral and driving backlash against brands. They're part of a gift card scheme.

A viral TikTok falsely claimed Sephora fired an employee; the account appears tied to a gift-card scheme harvesting personal data.
fromTechCrunch
2 days ago

Informant told FBI that Jeffrey Epstein had a 'personal hacker' | TechCrunch

A confidential informant told the FBI in 2017 that Jeffrey Epstein had a "personal hacker," according to a document released by the Department of Justice on Friday. The document, which was released as part of the Justice Department's legally required effort to publish documents related to its investigation into the late sex offender, does not identify who the alleged hacker was, but does include several details about them.
Information security
#data-breach
fromDataBreaches.Net
1 week ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

fromDataBreaches.Net
1 week ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

Information security
fromTechCrunch
2 days ago

Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch

Russian government hackers exploited weak security to breach Polish wind, solar, and heat-and-power systems and deployed destructive wiper malware that disabled monitoring systems.
#cisa
#artificial-intelligence
#venture-capital
#startup-funding
fromAlleywatch
2 days ago
Startup companies

The Weekly Notable Startup Funding Report: 1/26/26

Notable startup funding rounds totaled $2.1B for the week ending 1/24/25, led by major rounds including Baseten, Claroty, and Neurophos.
fromAlleywatch
6 days ago
Startup companies

The Weekly Notable Startup Funding Report: 1/26/26

Week ending 1/24/25 recorded $2.1B across 26 startup funding rounds, led by Baseten ($300M), Claroty ($150M), and Neurophos ($110M).
Information security
fromTechzine Global
2 days ago

Cisco launches agentic security tools for autonomous AI security

Cisco Foundation AI adds agentic security tools—Foundation-sec-8B-Reasoning, Adaptive AI Search Framework, and PEAK—to enable transparent, human-controllable autonomous threat analysis.
#remote-jobs
#remote-work
Miscellaneous
fromwww.aljazeera.com
3 days ago

Italy's Winter Olympics security plan keeps ICE in advisory role

Italy will lead all Olympic security operations with about 6,000 officers, drones, and a 24-hour cyber control room while ICE presence is limited to US diplomatic offices.
World news
fromEmptywheel
3 days ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
fromEmptywheel
3 days ago

The FBI: Now, with 48% More Domestic Surveillance ... but No Banksters

The FBI produced a self-congratulatory report of the changes they've made since 9/11. It describes the FBI's new intelligence focus. It boasts that it has a functional computer system (which for the FBI is an accomplishment) and 10,200 SCI work stations. Oh, and it proclaims with joy that the FBI has had a 48% growth in surveillance teams and capacity since 9/11. Let us rejoice in the proliferation of domestic spying!
Information security
fromEmptywheel
3 days ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
fromTechCrunch
4 days ago

AI security startup Outtake raises $40M from Iconiq, Satya Nadella, Bill Ackman and other big names | TechCrunch

Outtake, founded in 2023 by a former Palantir engineer, Alex Dhillon, has found a way to automate what has largely been the manual problem of spotting and taking down digital identity posers: impersonation accounts, malicious domains posing as the company's, rogue apps, fraudulent ads, and more. This problem has grown even more difficult because AI has enabled attackers to be more convincing and faster in their efforts.
Artificial intelligence
fromwww.computer.org
4 days ago

Build Future-Ready Software Teams with Modern Frameworks

The recently updated SWEBOK Guide v4.0a represents a needful industry standard, following a thorough peer review and a consensus-based approach. With the rise of AI, a significant skills gap in IT and cybersecurity is emerging alongside changes in the global workforce. There has never been a greater need for a consensus-based framework. This guide, created and thoroughly reviewed by industry professionals, serves as a dynamic and evolving resource.
Software development
Canada news
fromwww.cbc.ca
4 days ago

More criminals are using AI for ransomware attacks, cybersecurity centre warns | CBC News

Ransomware attacks in Canada are increasing and evolving rapidly, with criminals using AI to identify vulnerabilities, create malware, and automate extortion.
Privacy technologies
fromEngadget
5 months ago

The best VPN deals: Up to 87 percent off ProtonVPN, Surfshark, ExpressVPN, NordVPN and more

Long-term VPN plans often offer steep discounts, making annual or multi-year subscriptions substantially cheaper while adding privacy and extra security features.
EU data protection
fromThe Local Germany
4 days ago

What are the most commonly leaked passwords in Germany?

Many Germans still use simple, commonly leaked passwords—numeric sequences, English words, and reused combinations—creating significant cybersecurity risks.
Information security
fromAbove the Law
5 days ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
fromSilicon Canals
5 days ago

Andersen Consulting Strengthens Cybersecurity Capabilities with Addition of RedLegg - Silicon Canals

Founded in 2008 and headquartered in the U.S., RedLegg delivers tailored cybersecurity solutions with a focus on risk mitigation, managed security services, and penetration testing. Its offerings include managed detection and response (MDR), incident response, policy development, and virtual CISO advisory. Serving mid-market clients across finance, insurance, legal, and healthcare, RedLegg combines automation, threat intelligence, and a dedicated Security Operations Center (SOC) to help organizations streamline cybersecurity operations and build long-term resilience.
Information security
fromTechRepublic
1 month ago

Coupang CEO Quits After Breach Hits 33.7M South Koreans - TechRepublic

The e-commerce giant's data breach exposed 33.7 million customers-nearly two-thirds of the entire country's population-after hackers operated undetected for five months through overseas servers. Police have identified a former Chinese employee as the primary suspect, who exploited stolen encryption keys and authentication vulnerabilities to access customer names, phone numbers, email addresses, and delivery information. The suspect fled the country before authorities could make an arrest.
World news
#uk-china-relations
Information security
fromIndependent
5 days ago

Ireland faces disinformation and hacking threats from 'hostile actors' ahead of EU presidency

Ireland faces disinformation and cyber disruption threats from hostile states ahead of its EU presidency.
#ai-security
Information security
fromSecuritymagazine
1 week ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
Information security
fromMail Online
6 days ago

When is Q-Day? Scientists predict date of quantum computing advance

Quantum computers capable of breaking current encryption ('Q-Day') could arrive within years to decades, requiring immediate global preparation and post-quantum protection.
fromwww.dw.com
1 week ago

Germany news: Majority see Trump as threat to nation

A new nationwide opinion poll finds a majority of Germans feel threatened by the actions of the US, a country that helped liberate and rebuild Germany and one that has been its most important ally for more than 80 years Germany's interior minister has promised a new, aggressive approach to cybersecurity, vowing to 'strike back' at bad actors The president of Germany's Bundesbank said his institution defends itself against 5,000 attempted cyberattacks every minute
Germany news
from24/7 Wall St.
1 week ago

CrowdStrike (NASDAQ: CRWD) Stock Price Prediction and Forecast 2025-2030 (Feb 2025)

A U.S. judge recently dismissed a shareholder lawsuit that accused cybersecurity company CrowdStrike Holdings Inc. ( NASDAQ: CRWD) of making false statements about its software testing before the 2024 global outage. Also, it has announced its intent to acquire Seraphic and SGNL, as well as new strategic partnership with Nord Security. The share price is 6.3% lower than a month ago and down 3.9% from six months ago, underperforming the Nasdaq in both time frames.
Information security
Information security
fromSecurityWeek
1 week ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
fromTechCrunch
1 week ago

Researchers say Russian government hackers were behind attempted Poland power outage | TechCrunch

A failed December effort to bring down parts of Poland's energy grid was the work of Russian government hackers known for causing past energy disruptions, according to a security research firm that investigated the incident. Last week, Polish Energy Minister Milosz Motyka told reporters that the attempted cyberattack on December 29 and 30 saw hackers targeting two heat and power plants, as well as trying to disrupt the communication links between renewable installations, such as wind turbines and power distribution operators.
Miscellaneous
Information security
fromChannelPro
1 week ago

Mid-market firms bring cybersecurity in-house as vendor trust wanes

Mid-market UK organizations are increasingly bringing cybersecurity in-house, with 65% managing security internally amid declining confidence in external vendors.
Artificial intelligence
fromInfoWorld
1 week ago

JetBrains IDEs integrate OpenAI Codex

GPT-5.2-Codex is integrated into JetBrains IDEs, enabling developers to plan, write, test, review, and deploy code from within supported JetBrains editors.
fromAlleywatch
1 week ago

The AlleyWatch Startup Daily Funding Report: 1/22/2026

Claroty - $150M Series F CYBERSECURITY Claroty, an end-to-end cybersecurity platform for industrial applications, has raised $150M in Series F funding led by Golub Growth. Founded by Amir Zilberstein, Benny Porat, and Galina Antova in 2015, Claroty has now raised a total of $890M in reported equity funding. Cubby Storage - $63M Series A Cubby Storage, a property management platform for storage operators, has raised $63M in Series A funding led by Goldman Sachs Alternatives. Cubby Storage was founded by Adam Fleming in 2021.
NYC startup
Information security
fromThe Verge
1 week ago

The TikTok deal is done, finally

USDS Joint Venture will secure U.S. user data, apps, and algorithm in Oracle's U.S. cloud with audited cybersecurity, software assurance, and trust-and-safety controls.
Information security
fromArs Technica
1 week ago

Hacker who stole 120,000 bitcoins wants a second chance-and a security job

Former black hat hacker Lichtenstein reformed in prison and seeks to use adversary skills in cybersecurity while working to regain community trust.
US politics
fromWIRED
1 week ago

Legislators Push to Make Companies Tell Customers When Their Products Will Die

Massachusetts bills would require companies to disclose when software support for connected devices will end to improve cybersecurity and consumer protection.
#biglaw
fromAbove the Law
1 week ago
Law

Alienating Our Affections - Above the Law

Sullivan & Cromwell adopted an income-partner model, accelerating the decline of single-tier law firm partnerships across Biglaw.
fromAbove the Law
1 week ago
Law

Partnerships, Legal Education, Marriages... Lawyers Were Destroying Everything Last Week - See Generally - Above the Law

Consolidation in Biglaw, state interference in legal education, and a Supreme Court cybersecurity breach signal shrinking opportunities and systemic institutional vulnerabilities.
fromAbove the Law
1 week ago
Law

Partnerships, Legal Education, Marriages... Lawyers Were Destroying Everything Last Week - See Generally - Above the Law

fromenglish.elpais.com
1 week ago

Israel blocks Spain's judicial investigation into Pegasus spyware scandal

Judge Jose Luis Calama, of the Audiencia Nacional high court, stated that Israel has blocked the investigation into a spying case against several members of Prime Minister Pedro Sanchez's government using a spyware called Pegasus, marketed and developed by an Israeli company. The probe found preliminary evidence of crimes involving the disclosure of secrets, which jeopardized the security of the Spanish State.
Miscellaneous
Information security
fromTechzine Global
1 week ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
fromTheregister
1 week ago

Davos panel warns AI agents could run amok

We have enough difficulty getting the humans trained to be effective at preventing cyberattacks. Now I've got to do it for humans and agents in combination,
Artificial intelligence
Artificial intelligence
fromTelecompetitor
1 week ago

AI and rural broadband: Interview with Shirley Bloomfield

AI can significantly improve efficiency, troubleshooting, cybersecurity, network design, and customer experience for rural broadband providers when applied correctly.
Information security
fromTheregister
1 week ago

Best of British: UK's infosec envoys are mostly US firms

UK government appointed company ambassadors to promote the Software Security Code of Practice, aiming to improve software supply chain security, commercial trust, and cyber defenses.
Information security
fromTechzine Global
1 week ago

Why AI adoption requires a dedicated approach to cyber governance

Enterprises must overhaul cyber governance to address AI's expanded attack surface and AI-supply-chain risks, because traditional SaaS governance and GRC tools are inadequate.
Information security
fromTechzine Global
1 week ago

What are the cyber threats to the Winter Olympics?

Major sporting events like the Winter Olympics attract cybercriminals and state-sponsored hackers targeting critical infrastructure, high-value individuals, and using phishing, spoofed Wi‑Fi, and DDoS attacks.
fromZDNET
1 week ago

9 strategic imperatives every business leader must master to survive and thrive in 2026

As we enter 2026, we mark this anniversary by bringing together three leaders navigating the most complex intersection of technology, geopolitics, and organizational change we have ever witnessed. André Pienaar, Dr. David Bray, and Ken Banta joined us to discuss what boards and CEOs must understand to remain competitive in an era defined by cascading disruptions and incomplete information. The conversation focused on the critical questions every board should be asking this year.
Artificial intelligence
US politics
fromNextgov.com
1 week ago

Funding bill extends TMF and cyber measures through September

A congressional funding package would extend authorization for the Technology Modernization Fund and several cybersecurity statutes through Sept. 30, 2026, if enacted.
Information security
fromSecuritymagazine
1 week ago

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Rebuilding trust after a cybersecurity breach requires sustained, transparent, aligned communications that demonstrate accountability, empathy, and strategic action across internal and external channels.
Information security
fromThe Hacker News
1 week ago

Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More

Automation and interconnected systems are increasing attack surfaces, enabling attackers to exploit small flaws and remain undetected, outpacing defenders.
Information security
fromDataBreaches.Net
2 weeks ago

How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East - DataBreaches.Net

A WhatsApp phishing campaign targeted Iran-related activists during the country’s longest nationwide internet shutdown amid widespread protests.
World news
fromwww.theguardian.com
2 weeks ago

Guterres warns of powerful forces' undermining global cooperation'

Powerful forces increasingly undermine global cooperation through rising military spending, climate inaction, digital disinformation, and reduced humanitarian funding.
fromNextgov.com
2 weeks ago

Katie Arrington departs DOD to rejoin private sector

"If you go on LinkedIn one more time and tell me how hard CMMC is, I'm going to beat you," she said at an AFCEA DC luncheon in April.
Information security
US news
fromDataBreaches.Net
2 weeks ago

Act Now: Survey on Threats Researchers and Journalists Experience Ends January 18 - DataBreaches.Net

Security researchers and journalists face legal threats, injunctions, government searches, and violent threats from cybercriminals, prompting a survey collecting their experiences.
Information security
fromDataBreaches.Net
2 weeks ago

Website that leaked thousands of ICE agents' personal information is down after DDoS attack - DataBreaches.Net

A website exposing ICE and Border Patrol personnel was hit by a DDoS cyberattack suspected to originate from Russian bot farms.
fromWIRED
2 weeks ago

Former CISA Director Jen Easterly Will Lead RSA Conference

The organization puts on the prominent annual gathering of cybersecurity experts, vendors, and researchers that started in 1991 as a small cryptography event hosted by the corporate security giant RSA. RSAC is now a separate company with events and initiatives throughout the year, but its conference in San Francisco is still its flagship offering with tens of thousands of attendees each spring.
Information security
Law
fromabovethelaw.com
2 weeks ago

Hacked Database To Match Their Hack Opinions - See Also

Repeated hacks of the Supreme Court, a former Biglaw partner accused of murdering his wife, an xAI deepfake investigation, and a citation-bias dispute.
California
fromwww.eastbaytimes.com
2 weeks ago

Alameda briefs: Assembly's Bonta responds to release of ChatGPT Health

Combining AI with personal medical records raises serious data privacy, cybersecurity, and consumer protection concerns that require legislative safeguards.
fromTNW | Data-Security
2 weeks ago

Belgian cybersecurity startup Aikido becomes unicorn

Aikido's core proposition is rooted in the conviction that traditional application security tools have not kept pace with the rapid evolution of software development. Modern engineering teams ship code more frequently, and the widespread adoption of AI tools for coding has heightened both velocity and risk. Legacy scanners and point solutions can generate noise and distract developers, rather than offering actionable insights at the right moment.
Venture
fromTechzine Global
2 weeks ago

Dell PowerStore 4.3 supports 30TB QLC drives and enhanced cybersecurity

The new version combines lower costs with improved cybersecurity and offers up to 2 petabytes of storage in a 2U rack space. Companies are struggling with explosive data growth, increasing cyber threats, and limited budgets. Dell Technologies is responding to this with PowerStore 4.3, a platform that addresses storage challenges without compromising performance or security. The latest version brings innovations that double storage density and reduce energy costs.
Information security
#ai
fromFortune
3 weeks ago
Artificial intelligence

Crystal Ball: What 2026 holds for cybersecurity, healthcare, robotics, and more | Fortune

fromFortune
3 weeks ago
Artificial intelligence

Crystal Ball: What 2026 holds for cybersecurity, healthcare, robotics, and more | Fortune

#ai-adoption
fromNextgov.com
2 weeks ago
Artificial intelligence

Report: Workforce shortages, security fears among biggest hindrances to agency AI adoption

fromNextgov.com
2 weeks ago
Artificial intelligence

Report: Workforce shortages, security fears among biggest hindrances to agency AI adoption

Artificial intelligence
fromComputerWeekly.com
2 weeks ago

Cutting through the noise: SaaS accelerators vs. enterprise AI | Computer Weekly

Choose SaaS AI accelerators for fast automation and measurable gains; use enterprise AI when trusted, verifiable, network-contained outputs are required for cross-team or sensitive-data work.
fromTechzine Global
2 weeks ago

America puts an end to international cyber cooperation

On the instructions of President Donald Trump, the United States is withdrawing from international organizations that focus on cybersecurity and hybrid threats. There are concerns within the cybersecurity sector that this decision could undermine global resilience to digital threats. As reported by Computing, the US government claims that these partnerships are not sufficiently effective and are not in line with national interests.
US politics
Information security
fromComputerWeekly.com
2 weeks ago

How one IT chief shifted the needle on a reactive IT strategy | Computer Weekly

Norsk Global overhauled outdated IT infrastructure to improve resiliency, reduce costs, and enable operational continuity, customer API availability, and future innovation.
Information security
fromwww.housingwire.com
2 weeks ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
Europe politics
fromwww.theguardian.com
2 weeks ago

Cypriot president says he has nothing to fear' over corruption allegations

Cyprus's president denies involvement in a viral corruption video as investigations and claims of hybrid attack prompt resignations and cybersecurity inquiries.
fromwww.bbc.com
2 weeks ago

Instagram denies breach after many receive emails asking to reset password

Instagram has denied it has been victim to a data breach after many users received emails prompting them to reset their password. The firm said it had resolved a problem which allowed "an external party" to get the social media platform to send out legitimate password reset requests to users. Instagram said there had been no breach of its systems, and told users their accounts were secure.
Information security
from24/7 Wall St.
2 weeks ago

Upgrades: Analysts are Still Bullish on Nvidia (NVDA), Crowdstrike (CRWD) and Oracle (ORCL) Upside

"The reality is there's one chip in the world, fueling the AI revolution, and that's Nvidia. And I think as it plays out, numbers are significantly underestimated. I think 15% to 20% at a minimum going into 2026. You put that together, I think we're looking at a $250 stock in a base case to end 2026,"
Business
Miscellaneous
fromTechzine Global
2 weeks ago

EU calls on open source to break way from US firms

European Commission seeks stakeholder feedback to create an independent, sustainable open-source strategy focusing on cloud, AI, cybersecurity and hardware to reduce dependency on US tech.
World news
fromwww.aljazeera.com
2 weeks ago

India's VPN ban in Kashmir adds to psychological pressure', say residents

A two-month government ban on VPNs in Indian-administered Kashmir threatens IT professionals' ability to secure sensitive data and risks job displacement.
UK politics
fromTheregister
3 weeks ago

Should the UK cyber resilience bill cover the public sector?

UK's CSR Bill excludes central and local government despite rising public-sector cyberattacks and calls to impose equivalent statutory security requirements.
Miscellaneous
fromwww.thelocal.se
3 weeks ago

Swede suspected of spying for Russia, prosecutor says

A 33-year-old Swedish IT consultant was arrested on suspicion of spying for Russia and is charged with assisting Russia's intelligence service.
San Francisco
fromsfist.com
3 weeks ago

Day Around the Bay: SF Traffic Deaths Decreased in 2025 Thanks to Vision Zero Initiatives

Traffic deaths fell from 43 in 2024 to 25 in 2025 after daylighting and speed cameras; pedestrians accounted for most fatalities.
UK news
fromComputerWeekly.com
3 weeks ago

Computer Misuse Act reform is overdue - not all anniversaries should be celebrated | Computer Weekly

The Computer Misuse Act is outdated, actively harming cybersecurity professionals, the economy, and national safety, and urgently requires comprehensive overhaul to protect good-faith activity.
Information security
fromNextgov.com
3 weeks ago

Chinese hackers targeted email systems of US congressional staff, people familiar say

Chinese state-aligned hackers targeted email inboxes of staff in multiple House committees, risking exposure of legislative communications.
Information security
fromFortune
3 weeks ago

Invictus-backed cybersecurity company ThreatModeler acquires competitor IriusRisk for over $100 million | Fortune

ThreatModeler acquired rival IriusRisk for over $100 million, combining roughly $50 million ARR to scale automated vulnerability detection amid accelerating AI-driven coding risks.
[ Load more ]