#cybersecurity

[ follow ]
fromLondon Business News | Londonlovesbusiness.com
36 minutes ago

How machine learning enhances fraud detection - London Business News | Londonlovesbusiness.com

According to the Office for National Statistics, there were 4.2 million fraud incidents in England and Wales for the year ending March 2025 (ONS). That's a massive 31% increase year-on-year. It's the highest number of fraud instances since the ONS records began in 2017. The issue is that online fraud is becoming so much more sophisticated than it ever was because of artificial intelligence. Fraud is more convincing than ever, so the strategy is emerging to use the same technology for detection and deterrence.
Artificial intelligence
fromFast Company
2 hours ago

The business impact of deepfakes

Once a fringe curiosity, the deepfake economy has grown to become a $7.5 billion market, with some predictions projecting that it will hit $38.5 billion by 2032. Deepfakes are now everywhere, and the stock market is not the only part of the economy that is vulnerable to their impact. Those responsible for the creation of deepfakes are also targeting individual businesses, sometimes with the goal of extracting money and sometimes simply to cause damage.
Artificial intelligence
fromTheregister
2 hours ago

Europe's energy grid faces growing cyber threat

It was a sunny morning in late April when a massive power outage suddenly rippled across Spain, Portugal, and parts of southwestern France, leaving tens of millions of people without electricity for hours. Cities were plunged into darkness. Trains stopped and metro lines had to be evacuated. Flights were cancelled. Mobile networks and internet providers went down. Roads were gridlocked as traffic lights stopped working.
Miscellaneous
Startup companies
fromAlleywatch
19 hours ago

The Weekly Notable Startup Funding Report: 11/3/25

Notable startups raised $1.3B this week, led by Sublime Security ($150M), ConductorOne ($79M), and multiple AI, health, and consumer deals.
#generative-ai
Women in technology
fromBusiness Matters
1 week ago

Women in tech urged to trust their instincts and lead change

Women in technology are urged to trust instincts, back ideas, and challenge barriers to pursue AI leadership and expand gender diversity and opportunities.
Information security
fromChannelPro
1 week ago

Arctic Wolf celebrates partner growth milestone in the UK and Ireland

Arctic Wolf expanded rapidly in the UK and Ireland since 2021, reaching 510 customers and 119 partners through its AI-driven Aurora security platform.
fromTheregister
1 week ago

Ex-CISA chief says AI could mean the end of cybersecurity

But ultimately, this is all the result of bad software, ridden with vulnerabilities. "We don't have a cybersecurity problem. We have a software quality problem," she said. The main reason for this was software vendors' prioritization of speed to market and reducing cost over safety. AI is making attackers more capable, helping them create stealthier malware and "hyper-personalized phishing," and also to spot and surface vulnerabilities and flaws more quickly.
Information security
#agentic-ai
fromIT Pro
6 days ago
Artificial intelligence

Agentic AI carries huge implications for security teams - here's what leaders should know

Agentic AI is rapidly being adopted across industries, promising productivity gains while introducing novel security risks from autonomous, goal-driven agents.
fromInfoWorld
2 weeks ago
Artificial intelligence

Agents of chaos

Autonomous, self-learning AI agents enable real-world automation while increasing compliance, governance, and cybersecurity risks that organizations must manage.
fromIT Pro
6 days ago
Artificial intelligence

Agentic AI carries huge implications for security teams - here's what leaders should know

Information security
fromTheregister
6 days ago

Iran's MOIS-linked Ravin Academy hit by data breach

Ravin Academy, an Iranian cyber training school tied to intelligence, suffered a breach exposing names, phone numbers, and other personal data of associates and students.
#ransomware
fromwww.bbc.com
2 weeks ago
Information security

MoD probes claims Russian hackers stole files on bases

Russian hackers allegedly stole and published hundreds of sensitive UK military documents, prompting a MoD investigation and a Dodd Group ransomware response.
fromThe Walrus
2 weeks ago
Information security

The Cyberattack That Stole 280,000 Identities-and Showed How Easily We Can Be Duped | The Walrus

Ransomware attacks on Canadian utilities and businesses have exposed massive personal data, caused significant financial losses, and revealed inadequate cybersecurity preparedness.
fromThe Walrus
2 weeks ago
Information security

The Cyberattack That Stole 280,000 Identities-and Showed How Easily We Can Be Duped | The Walrus

fromeLearning Industry
6 days ago

Future-Proofing Compliance: Strategic Training Priorities For Business Leaders In 2026

According to PwC's 2025 Global Compliance Survey, [1] more than 40% of global companies reported at least one compliance failure that led to fines, penalties, or back pay. Staying on top of regulatory compliance requirements has only gotten more complex, and the stakes have never been higher. TD Bank's USD 3.1 billion penalty for "pervasive and systemic failure to maintain an adequate" anti-money laundering (AML) compliance program [2] demonstrates this and has incentivized companies of all sizes to invest in compliance training platforms that can be used to demonstrate compliance in audits and regulatory defense scenarios.
Information security
Artificial intelligence
fromSecuritymagazine
6 days ago

PredictiveAI Security: Guarding the Intelligence Behind the GenAI Spotlight

Predictive AI remains critical across industries, making mission-critical decisions and requiring robust security despite generative AI's prominence.
Information security
fromThe Hacker News
1 day ago

Why Early Threat Detection Is a Must for Long-Term Business Growth

Early threat detection and rapid response reduce incident costs, preserve revenue and reputation, and enable security to become a business growth enabler.
Information security
fromComputerWeekly.com
1 day ago

Pulling the plug: A way to halt a cyber attacker in your network? | Computer Weekly

Isolating affected network zones and pausing malicious communications can contain attackers while preserving remaining business operations and limiting data access.
fromresund Startups
5 days ago

Cyber Security Festival 2025: With Tech Visionary David Heinemeier Hansson

Cyber Security Festival 2025, one of the regions premier cybersecurity event, is set to bring together over 1,200 IT professionals, experts, and thought leaders - including David Heinemeier Hansson, the creator of Ruby on Rails, co-founder of 37signals, and New York Times-bestselling author. Two days of discussions, hands-on workshops, and networking await participants. Taking place on November 4-5, 2025, at TAP1 in Copenhagen, the festival will tackle the most pressing challenges in cybersecurity, from AI-driven threats to geopolitical cyber warfare.
Information security
Startup companies
fromTechCrunch
5 days ago

AccessGrid raises $4.4M to help turn phones into key fobs | TechCrunch

AccessGrid provides APIs that embed secure, revocable digital key fobs into Apple and Google Wallets to modernize access control.
Information security
fromIT Pro
5 days ago

Enterprises can't keep a lid on surging cyber incident costs

Organizations face rising cyber costs, widening attack surfaces, critical skills shortages, and growing AI reliance despite concerns about reduced analyst autonomy.
Startup companies
fromTechCrunch
5 days ago

CyDeploy wants to create a replica of a company's system to help it test updates before pushing them out - catch it at Disrupt 2025 | TechCrunch

CyDeploy uses machine learning to create digital twins of critical systems for pre-deployment testing, reducing risk and speeding patch rollout without impacting live environments.
#data-breach
fromDataBreaches.Net
1 week ago
Information security

Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - DataBreaches.Net

fromDataBreaches.Net
1 week ago
Information security

Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - DataBreaches.Net

Information security
fromTheregister
4 days ago

Major telecom supplier compromised by nation-state crew

Nation-state actors infiltrated Ribbon Communications' network in December, remained undetected for nine months, and accessed four older files belonging to three customers.
#ai
fromHarvard Business Review
4 days ago
Artificial intelligence

How AI Will Forge the Next Generation of Cybersecurity Talent - SPONSOR CONTENT FROM PALO ALTO NETWORKS

AI will not make cybersecurity roles obsolete; it will automate routine tasks and increase demand for humans with judgment, creativity, and AI-governance skills.
fromFortune
1 day ago
Information security

AI is the common threat-and the secret sauce-for security startups in the Fortune Cyber 60 | Fortune

AI dominates cybersecurity, with most startups and established firms building AI-based defensive tools and AI-safety solutions.
fromFortune
1 day ago
Information security

AI is the common threat-and the secret sauce-for security startups in the Fortune Cyber 60 | Fortune

Information security
fromSustainable Bus
4 days ago

Ruter identifies cybersecurity risks in connected electric buses during tests - Sustainable Bus

Over-the-air software updates in modern electric buses introduce cybersecurity risks that require fleet-level protections and national cybersecurity standards.
fromTheregister
4 days ago

Cyberpunks mess with Canada's water, energy, farm systems

The victims included a municipal water facility where pressure values were changed, an oil and gas company whose tank gauge was tampered with, and a farm silo where drying temperatures were altered, "resulting in potentially unsafe conditions if not caught on time." Officials stressed these weren't sophisticated, state-sponsored operations but opportunistic intrusions that caused real-world disruption ranging from false alarms to degraded service. The attackers didn't need custom malware or insider access either - just a connection and curiosity.
Canada news
Artificial intelligence
fromThe Verge
3 days ago

AI browsers are a cybersecurity time bomb

AI-integrated web browsers increase convenience but introduce significant cybersecurity vulnerabilities, corruptible agents, enhanced tracking, and heightened risk of data leaks and unknown attacks.
fromThe Cipher Brief
3 days ago

The War You Can't See: Gray Zone Operations Are Reshaping Global Security

Meanwhile, in Warsaw and Vilnius, shoppers flee as flames engulf two of the largest city malls. Investigators soon discover the arsonists are teenagers recruited online, guided by encrypted messages, and paid by actors connected to hostile state agencies. The chaos sows fear, erodes social trust, and sends shockwaves through European communities-proxy sabotage that destabilizes societies while providing plausible deniability to those orchestrating the acts.
Miscellaneous
Privacy technologies
fromTheregister
3 days ago

Proton Data Breach Observatory to expose infosec cover-ups

Proton launched a Data Breach Observatory to scan the dark web and publish unreported organizational breaches, identifying hundreds of millions of leaked records.
Health
fromTheregister
3 days ago

NHS quarantines devices as suppliers drag feet on Windows 11

A few suppliers' incompatible medical devices are preventing NHS trusts from fully upgrading to Windows 11, exposing systems to security and patient-care risks.
#ai-adoption
fromSecuritymagazine
1 week ago
Artificial intelligence

How Artificial Intelligence Is Amplifying Data Breach Risks - and Enhancing Mitigation

Rapid AI adoption amplifies cyberattack sophistication, speed, and scale while U.S. lacks comprehensive federal AI regulation compared with the EU.
Alternative transportation
fromSustainable Bus
3 days ago

From weight reduction to ride dynamics: inside JOST's BusLink articulation system - Sustainable Bus

JOST develops and produces lightweight articulated bus systems, dampers, bellows, and control units while scaling global production and enhancing predictive maintenance and cybersecurity.
Artificial intelligence
fromwww.theguardian.com
5 days ago

Alan Turing institute launches new mission to protect UK from cyber-attacks

The Alan Turing Institute will refocus on defending UK infrastructure from cyber-attacks and align research with national security and defence AI priorities.
fromFortune
2 days ago

The haunting consequences of ignoring tech debt in an agentic AI world | Fortune

According to some estimates, tech debt, or the costs incurred when having to constantly fix aging or clunky software systems, has ballooned to more than $1.52 trillion in the U.S. alone. With technology like agentic AI being heavily embedded on top of companies' aging technology systems and operations, this rising cost of tech debt makes sense. Many organizations are quickly implementing new technologies without addressing underlying systems first.
Artificial intelligence
Information security
fromwww.theguardian.com
4 days ago

Australian man living in Washington DC pleads guilty to selling trade secrets to Russian broker

Australian contractor stole US national-security software trade secrets and sold them to a Russian cyber-tools broker; he pleaded guilty to theft charges.
Miscellaneous
fromTheregister
2 days ago

Russia arrests three suspected Meduza infostealer devs

Three alleged developers of the Meduza infostealer were arrested in Moscow and the surrounding region, with devices seized and linked malware targeting protection tools and creating botnets.
Information security
fromTechCrunch
2 days ago

Government hackers breached telecom giant Ribbon for months before getting caught | TechCrunch

Government-backed hackers accessed Ribbon's IT network from December 2024 and remained undetected for almost a year before the company discovered and removed them.
#cisa
Information security
fromFast Company
2 days ago

5 business continuity and disaster recovery mistakes

Resilience requires people-focused, prioritized BCDR planning that includes identity verification, clear recovery priorities, and preparation for cyber and human constraints.
Information security
fromtechcrunch.com
2 days ago

Hackers threaten to leak data after breaching University of Pennsylvania to send mass emails

Hackers used Penn email accounts to send offensive fraudulent messages aimed at suppressing alumni donations while the university's incident response team addresses the email breach.
Artificial intelligence
fromFuturism
1 week ago

Meta Tells Employees Their Jobs Are Being Automated

Meta will eliminate many roles in its risk management division by automating processes with AI, shifting routine decisions to technology.
Information security
fromFuturism
1 week ago

If You're a Tech Worker With an Attractive Girlfriend, We Have Extremely Bad News

Foreign intelligence services allegedly use romantic relationships to extract secrets from Western tech professionals, reviving Cold War-era "honey trap" tactics.
Gadgets
fromThe Verge
1 week ago

Neato's cloud is shutting down, leaving its robovacs stuck in manual mode

Neato robot vacuums will lose cloud connectivity and app control, reverting to manual-only operation as legacy cloud services are discontinued for security and compliance reasons.
Information security
from24/7 Wall St.
1 week ago

CrowdStrike (NASDAQ: CRWD) Stock Price Prediction and Forecast 2025-2030 (Oct 2025)

CrowdStrike expanded its Falcon platform, partnered with Salesforce on AI security, and delivered strong stock gains and record Fal.Con 2025 attendance.
Information security
fromThe Hacker News
1 week ago

The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently

Organizational leaders often overestimate cybersecurity readiness compared with mid-level and operational teams, creating a perception gap that risks underinvestment and growing blind spots.
fromTechzine Global
1 week ago

Three Ways Secure Modern Networks Unlock the True Power of AI

Cisco's recent AI Readiness Index shows that in EMEA, only 11% of companies are completely ready for AI compared to 13% worldwide. This is a number that hasn't changed much in three years. While 82% of organizations intend to use AI, and 44% anticipate a significant increase in AI workloads within a year, only 30% believe their current IT infrastructure can support today's AI technologies.
Artificial intelligence
Information security
fromTheregister
1 week ago

Former L3Harris cyber director charged with selling secrets

A former L3Harris Trenchant manager, Peter Williams, is charged with stealing seven trade secrets and selling them to a Russian buyer for $1.3 million.
Artificial intelligence
fromFuturism
1 week ago

OpenAI's New AI Web Browser Is a Bit of Mess

OpenAI's Atlas browser integrates ChatGPT for task automation but exhibits limited search relevance, usability shortcomings, and notable cybersecurity concerns.
Tech industry
fromwww.theguardian.com
1 week ago

Attacks will get through': head of GCHQ urges companies to do more to fight cybercrime

Companies must implement and test contingency plans, including physical paper backups and communication methods, because cyber-attacks are rising and can disable entire systems.
fromBusiness Matters
1 week ago

The Online Gambling Boom: Why UK Players Demand Safer, Regulated Platforms

One only has to look at the official figures released by the UK's Gambling Commission to see that online gambling is a booming sector. Now worth £6.9 billion a year, it outstrips the land-based activity that recorded a gross revenue of £4.6 billion for the period between April 2023 and March 2024. The real stars of the show are the online casinos, responsible for £4.4 billion in revenue and,
E-Commerce
Information security
fromComputerWeekly.com
1 week ago

The US government shutdown is a wake-up call for cyber self-reliance | Computer Weekly

Organisations must rely on internal cyber defenses—zero-trust, supply-chain security, and proactive monitoring—rather than expecting governments to be primary protectors.
Information security
fromSheFinds
1 week ago

The Alarming Reason You Should Stop Using Public Wi-Fi

Public Wi‑Fi, especially unsecured networks, can expose users and devices to hacking and lack cybersecurity protections, so caution is required when using them.
UK news
fromBusiness Matters
1 week ago

FCA chief warns UK financial system "not prepared" for rising global and cyber risks

The UK financial system is not prepared tactically or strategically to withstand rising geopolitical and cyber threats that affect balance sheets, markets, and consumers.
fromFortune
1 week ago

Experts warn OpenAI's ChatGPT Atlas has security vulnerabilities that could turn it against users-revealing sensitive data, downloading malware, and worse | Fortune

The AI company launched Atlas on Tuesday, with the goal of introducing an AI browser that can eventually help users execute tasks across the internet as well as search for answers. Someone planning a trip, for example, could also use Atlas to search for ideas, plan an itinerary, and then ask it to book flights and accommodations directly. ChatGPT Atlas has several new features, such as "browser memories," which allow ChatGPT to remember key details from a user's web browsing to improve chat responses.
Information security
Information security
fromDataBreaches.Net
1 week ago

Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs - DataBreaches.Net

A Mass Assignment vulnerability in the FIA Driver Categorization Portal allowed administrative takeover and exposed drivers' passports, licenses, and personal data within minutes.
fromDataBreaches.Net
1 week ago

Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers - DataBreaches.Net

New York State Department of Financial Services (DFS) Acting Superintendent Kaitlin Asrow today issued new cybersecurity guidance addressing the risks associated with entities becoming increasingly reliant on third-party service providers (TPSPs). The guidance builds on the Department's ongoing work to protect New Yorkers and DFS-regulated entities from cybersecurity risks through its nation-leading cybersecurity regulation.
Information security
Miscellaneous
fromComputerWeekly.com
1 week ago

Jaguar Land Rover attack to cost UK 1.9bn, say cyber monitors | Computer Weekly

The Jaguar Land Rover cyberattack caused systemic disruption across the UK automotive supply chain, costing about £1.9bn and threatening prolonged production outages into 2026.
fromNon Profit News | Nonprofit Quarterly
1 week ago

Digital Transformation, A Nonprofit Primer - Non Profit News | Nonprofit Quarterly

On a weekday morning in suburban Maryland, a behavioral health therapist logs into her dashboard before meeting her first client. The screen displays real-time caseloads, treatment plans, and risk alerts. One name flashes yellow-a client whose recent history suggests heightened hospitalization risk. Rather than waiting for crisis, the therapist addresses this proactively. This moment illustrates how thoughtfully designed digital systems don't replace human care; they sharpen it.
Data science
Information security
fromIT Pro
1 week ago

Former NCSC head says the Jaguar Land Rover attack was the 'single most financially damaging cyber event ever to hit the UK' as impact laid bare

The Jaguar Land Rover cyberattack caused an estimated UK financial loss of about £1.9 billion, making it the country's single most costly cyber incident to date.
Information security
fromIT Pro
1 week ago

Mimecast names Graham Douglas as chief customer and revenue officer

Mimecast appointed Graham Douglas as chief customer and revenue officer to lead global customer and revenue operations and drive its next phase of growth.
Business
fromFortune
1 week ago

Fear sweeps the C-suite-companies pour millions into security as threats against executives surge | Fortune

Corporate security protocols for CEOs and executives are intensifying with more personal, home, travel, and cybersecurity protections after several high-profile violent incidents.
Information security
fromTechzine Global
1 week ago

Pax8 wants MSP's to become MIP's: what does that mean?

Managed Service Providers must evolve into Managed Intelligence Providers to deliver AI-driven productivity and scalable services to SMBs, mirroring the cybersecurity transition.
fromDataBreaches.Net
1 week ago

KT Chief to Resign After Cybersecurity Breach Resolution - DataBreaches.Net

I will take responsibility once the situation is resolved,
World news
fromSecuritymagazine
1 week ago

How To Counter Evolving Cybersecurity Threats: The North Korean IT Worker Edition

The United States Department of Justice (DOJ) has intensified its nationwide crackdown on schemes involving North Korean information technology (IT) workers who fraudulently obtained employment at U.S. businesses. Over the past few years, the U.S. government issued multiple advisories to detect and combat the North Korean remote IT workers' attempts to infiltrate U.S. businesses, the latest of which came in July this year.
US news
fromABC7 Los Angeles
1 week ago

North Carolina man's crypto account drained of $80,000 after he clicks on link for virtual meeting

"I started to create videos about cryptocurrency and launch my own exchange on cryptocurrency," the Durham, North Carolina, resident said.
Information security
Information security
fromwww.mediaite.com
1 week ago

Cyberguy' Speculates About AWS Global Outage on Fox News

An Amazon Web Services outage disrupted thousands of websites and home security systems, exposing infrastructure vulnerability and uncertainty over attack versus technical glitch.
Artificial intelligence
fromFuturism
1 week ago

Inventor of Vibe Coding Admits He Hand-Coded His New Project

Vibe coding accelerates prototyping but creates security leaks, hallucinations, and unreliable software, so human developers and oversight remain essential.
World news
fromThe Hacker News
2 weeks ago

MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems

China accuses the U.S. NSA of a premeditated cyberattack on the National Time Service Center targeting Beijing Time and staff devices.
fromFortune
2 weeks ago

Baker McKenzie crisis leads on risk-proofing the future: Do you have a blind spot in the boardroom? | Fortune

This renewed focus has brought economic statecraft to the forefront, as governments increasingly deploy trade restrictions, foreign investment scrutiny, and sanctions as foreign policy tools to advance their agendas and exert influence. After decades of near-unwavering commitment to free trade and the rapid globalization of markets across the Western world, we are witnessing a protectionist turn, with U.S. tariff levels reaching heights not seen in nearly a century.
World politics
Information security
fromWIRED
2 weeks ago

Hackers Dox ICE, DHS, DOJ, and FBI Officials

Multiple major privacy and security failures exposed sensitive communications, election infrastructure consolidation, and massive criminal cryptocurrency seizure, alongside new vulnerabilities in authentication and VPNs.
Health
fromDataBreaches.Net
2 weeks ago

Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident - DataBreaches.Net

Heywood and Athol hospitals experienced a cybersecurity-related network outage, took systems offline, engaged a third-party firm, and remain open while recovery continues.
US news
fromTelecompetitor
2 weeks ago

T-Mobile Announces Cyber Defense and Executive Briefing Centers

T-Mobile opened a Cyber Defense Center and an Executive Briefing Center to strengthen real-time cyber threat response and showcase enterprise technology solutions.
Information security
fromIrish Independent
2 weeks ago

'Shame on you!' - Brian O'Driscoll's speech interrupted by protesters at tech event linked to Israeli military

A protester interrupted Mr O'Driscoll at a Dublin cyber summit hosted by Check Point, citing the company's Israeli military links and actions in Gaza.
Information security
fromIT Pro
2 weeks ago

Thousands of exposed civil servant passwords are up for grabs online

Over 3,000 UK civil servants' passwords were exposed publicly, with hundreds of unique and repeated credentials across multiple government departments and councils.
Information security
fromChannelPro
2 weeks ago

Observability opens up new opportunities for the channel

Observability platforms are rapidly growing, creating SaaS opportunities for channel partners as organizations invest to protect cloud investments and improve operational and security visibility.
fromFortune
2 weeks ago

Gen Z's digital native status is a double-edged sword. They have cyber blind spots | Fortune

Members of Gen Z are often referred to as "digital natives." They were born and raised in the internet era and have been engaging with computers, tablets, smartphones, and other connected devices from an early age. In many ways, this gives Gen Z an advantage in today's increasingly digital working environments-but that isn't always the case. In fact, research has consistently shown that each generation has its own unique blind spots when it comes to safely navigating the digital realm.
Information security
fromComputerWeekly.com
2 weeks ago

Securing the AI era: Huawei's cyber security strategy for the GCC | Computer Weekly

One of the fundamental principles of Huawei is to ensure compliance with international standards, industry best practices, customer requirements and local laws and regulations,
Information security
fromThe Hacker News
2 weeks ago

Beware the Hidden Costs of Pen Testing

Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money - while producing inferior results. The benefits of pen testing are clear. By empowering "white hat" hackers to attempt to breach your system using similar tools and techniques to an adversary, pen testing can provide reassurance that your IT set-up is secure. Perhaps more importantly, it can also flag areas for improvement.
Information security
UK politics
fromwww.bbc.com
2 weeks ago

Cabinet Office rejects Cummings' China breach claim

Claims assert Chinese actors breached high-level UK 'Strap' systems in 2020, exposing extremely secret intelligence and Cabinet Office material, while the government denies any compromise.
Information security
fromArs Technica
2 weeks ago

Breach of F5 requires "emergency action" from BIG-IP users, feds warn

A nation-state hacking group breached F5, stole BIG-IP build systems, source code, and customer configurations, creating imminent supply-chain exploitation risk for thousands of networks.
fromFortune
2 weeks ago

AI trading is flooding Wall Street-and fueling a 1.2 trillion-message trading surge, NYSE president says | Fortune

Humans are no longer the ones setting the breakneck pace on Wall Street. The New York Stock Exchange is now processing 1.2 trillion order messages per day, a staggering threefold jump from just four years ago, according to New York Stock Exchange President Lynn Martin. The surge, she said, is being driven by AI-fueled trading, algorithmic strategies, and hyperspeed market participants that have transformed the structure of U.S. markets.
Business
Artificial intelligence
fromFortune
2 weeks ago

Reddit co-founder Alexis Ohanian says 'so much of the internet is dead'-and the rise of bots and 'quasi-AI, LinkedIn slop' killed it | Fortune

Automated bots and AI-generated accounts now constitute a large portion of internet traffic, raising demand for live, verifiable human engagement on social platforms.
fromTheregister
2 weeks ago

Trump admin slashes CISA staff again amid shutdown

This is just the latest round of reductions to the CISA workforce since Trump came to office in January. Employees at the Agency have been worried about cuts for months. When we reported layoff fears in April, CISA had an estimated 3,300 person workforce; according to DHS' shutdown contingency document the agency had just 2,540 people as of the end of May.
US politics
Artificial intelligence
fromFast Company
2 weeks ago

The Boy Scouts' newest survival skills are surprising-and critical

Scouting America added AI and cybersecurity merit badges to teach scouts tech skills, ethics, and digital literacy while aiming to stay relevant and retain members.
US politics
fromwww.independent.co.uk
2 weeks ago

UK's cyber security agency warns of sophisticated' threat from Chinese hackers

Chinese hackers pose a growing, sophisticated threat to the UK with a 50% rise in significant incidents; independent journalism seeks public support to fund reporting.
[ Load more ]