#cybersecurity

[ follow ]
Software development
fromwww.bbc.com
2 hours ago

AI coding platform's flaws allow BBC reporter to be hacked

Orchids, a popular AI coding platform, has a significant unpatched vulnerability that allowed remote code modification and access to users' computers.
fromTheregister
19 hours ago

Google: China's APT31 used Gemini to plan US cyberattacks

A Chinese government hacking group that has been sanctioned for targeting America's critical infrastructure used Google's AI chatbot, Gemini, to auto-analyze vulnerabilities and plan cyberattacks against US organizations, the company says. While there's no indication that any of these attacks were successful, "APT groups like this continue to experiment with adopting AI to support semi-autonomous offensive operations," Google Threat Intelligence Group chief analyst John Hultquist told The Register. "We anticipate that China-based actors in particular will continue to build agentic approaches for cyber offensive scale."
Information security
Information security
fromSecurityWeek
1 day ago

Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack

Nevada implemented a four-tier data classification policy—public, sensitive, confidential, restricted—to standardize state data privacy and assign agencies responsibility for classification and compliance.
Information security
fromTechCrunch
1 day ago

DOJ says Trenchant boss sold exploits to Russian broker capable of accessing 'millions of computers and devices' | TechCrunch

A former Trenchant executive stole and sold eight hacking tools enabling potential global surveillance and cyberattacks, pleaded guilty, and faces prison, fines, and restitution.
Information security
from24/7 Wall St.
1 day ago

Surviving the SaaS-pocalypse: JPMorgan's 3 Top Cyber Stocks Ready to Surge

AI-enabled plug-ins triggered a near-$1 trillion SaaS sell-off before fears eased, while CrowdStrike’s AI-native Falcon platform positions it for sustained growth.
fromDigiday
1 day ago

In Graphic Detail: AI licensing deals, protection measures aren't slowing web scraping

New data is reinforcing a structural shift in how AI systems access publisher content: AI models are increasingly scraping publisher content, regardless of bot-blocking measures or content licensing deals meant to control usage, improve attribution or drive referral traffic. New research from analytics firms and bot-tracking companies shows AI tools are increasingly crawling publisher sites as inputs for AI-generated summaries and training, while sending back only limited referral traffic.
Artificial intelligence
#ai
fromFortune
2 days ago
Artificial intelligence

AI agents aren't eating SaaS-they're using it | Fortune

Market reactions to AI oscillate drastically, driving large SaaS valuation swings while AI advances raise cybersecurity, data-center, and model-safety concerns.
fromSecurityWeek
1 week ago
Information security

Nullify Secures $12.5 Million in Seed Funding for Cybersecurity AI Workforce

Nullify raised $12.5M seed to scale its AI-driven autonomous vulnerability management platform that detects, triages, validates, and remediates security flaws.
World news
fromThe Hacker News
2 days ago

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

North Korean operatives use stolen LinkedIn identities and verified workplace credentials to secure remote jobs for espionage, revenue generation, and data theft.
Venture
fromSecurityWeek
2 days ago

Vega Raises $120M in Series B Funding to Grow Security Analytics Platform

Vega raised $120 million Series B (total $185M), offering an AI-driven alternative to SIEM that reduces data centralization and secures large enterprise contracts.
Artificial intelligence
fromHarvard Gazette
2 days ago

Worried about how AI may affect foreign policy? You should be. - Harvard Gazette

Governments adopting AI face significant cybersecurity vulnerabilities and require oversight, regulation, and international cooperation to balance benefits and prevent misuse.
UK news
fromwww.independent.co.uk
2 days ago

Afghan data breach was wake-up call' for government's data security

Government data handling changed significantly after an Afghan breach exposed thousands' details, and a national news outlet stresses free, on-the-ground journalism funded by donations.
Information security
fromSecurityWeek
2 days ago

RSAC Releases Quantickle Open Source Threat Intelligence Visualization Tool

Quantickle is an open-source, browser-based network graph visualization tool for manual threat analysis, offering customizable visualizations, imports/exports, and REST API integrations.
Business
fromBusiness Insider
3 days ago

Salesforce is replacing 5 high-profile leaders who have left since December with 6 new execs

Salesforce appointed six new leaders and promoted internal executives to fill departing roles, reallocating responsibilities across security, marketing, architecture, Slack, and AI services.
#critical-infrastructure
fromComputerWeekly.com
3 days ago
Information security

Russia's cyber attacks on Polish utilities draws NCSC alert | Computer Weekly

Russian state cyber actors attacked Poland's electricity grid, prompting NCSC to warn UK utilities to strengthen cyber defenses and resilience.
fromTechCrunch
1 week ago
Information security

Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch

Russian government hackers exploited weak security to breach Polish wind, solar, and heat-and-power systems and deployed destructive wiper malware that disabled monitoring systems.
fromTechCrunch
1 week ago
Information security

Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch

#startup-funding
Information security
fromSecurityWeek
3 days ago

Outtake Raises $40 Million to Bolster Digital Trust Against AI-Driven Threats

Outtake raised $40M to build a unified, agentic-AI platform for maintaining digital trust and defending against AI-driven phishing, impersonation, and other modern threats.
Information security
fromBusiness Insider
3 days ago

Lema, founded by former members of Israel's elite 8200 intelligence unit, is coming out of stealth

Lema focuses on reducing third-party vendor risk to company systems and raised a $24 million Series A led by Team8.
Information security
fromThe Cipher Brief
3 days ago

The Former Head of NSA on the Future of U.S. Cybersecurity

General Nakasone continues leading cybersecurity initiatives at Vanderbilt, advises tech companies, and stresses persistent engagement and election security to prevent foreign influence.
Information security
fromSecuritymagazine
4 days ago

Product Spotlight on Analytics

Taelor Sutherland is Associate Editor at Security magazine covering enterprise security, coordinating digital content, and holding a BA in English Literature from Agnes Scott College.
UK news
fromwww.theguardian.com
4 days ago

I fell into it': ex-criminal hackers urge Manchester pupils to use web skills for good

Former hackers warn that cybercrime is petty, dangerous, and destructive, and urge talented teenagers to apply gaming and coding skills to lawful cybersecurity work.
Artificial intelligence
fromsfist.com
6 days ago

Some Waymo Robotaxis Get Assistance from Remote Workers in the Philippines When Stuck

Waymo uses remote workers, including in the Philippines, to provide guidance to robotaxis during difficult situations, raising safety, cybersecurity, and job-displacement concerns.
#substack
Artificial intelligence
fromFuturism
6 days ago

It Turns Out Waymos Are Being Controlled by Workers in the Philippines

Waymo uses overseas human operators (including in the Philippines) to provide guidance to self-driving vehicles, raising safety and cybersecurity concerns after a recent robotaxi incident.
#agentic-ai
Artificial intelligence
fromTNW | Events
6 days ago

TechEx Global returns to London with enterprise technology and AI execution

AI is shifting from providing answers to executing tasks autonomously in enterprises, with practical deployments, governance focus, and integration alongside cybersecurity and edge computing.
Information security
fromSecuritymagazine
1 week ago

How to Protect Organizations During the Winter Olympics, According to CISOs

Cybercriminals will exploit the Winter Olympics via phishing, impersonation, API misuse, compromised credentials, and trusted-access abuse while security teams prioritize availability.
Miscellaneous
fromSecurityWeek
1 week ago

Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says

Italy foiled Russian-origin cyberattacks against foreign ministry sites, Winter Olympics websites, and Cortina hotels while deploying 6,000 security officers for the Games.
World news
fromTheregister
1 week ago

'Russian origin' cyberattacks target Italy's Winter Olympics

Italy prevented Russian-origin cyberattacks targeting government foreign offices and Milano Cortina Winter Olympics sites, including hotels in Cortina.
Information security
fromZDNET
1 week ago

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Kali Linux and Parrot OS are free, Debian-based distributions focused on penetration testing; Parrot OS also offers a general-purpose edition.
fromBusiness Matters
1 week ago

Bobby Acri: What Threat Detection Looks Like in a Large Organisation

Born on 17 May 1991 at Evanston Hospital, Bobby grew up on Chicago's North Shore. He attended Hubbard Woods Elementary, Washburne Middle School, and New Trier Township High School. Early on, he gravitated towards how systems behave under pressure, not just how they look when everything is running smoothly. He built that mindset through computer science coursework, networking classes, and hands-on tech support for school events.
Information security
#quantum-computing
#microsoft
fromBusiness Insider
1 week ago
Tech industry

Microsoft hired a Google exec to replace security boss Charlie Bell, who is moving to a new IC role, internal memo shows

fromBusiness Insider
1 week ago
Tech industry

Microsoft hired a Google exec to replace security boss Charlie Bell, who is moving to a new IC role, internal memo shows

Miscellaneous
fromTheregister
1 week ago

Estonia tests Euro alternatives amid Microsoft rollout

Estonia trials European software alternatives while continuing Microsoft cloud migration to reduce dependence and prepare for possible EU restrictions or costs.
#venture-capital
fromTelecompetitor
1 week ago

AI adoption among telcos may taper off in 2026: Report

STL Partners predicts one AI-related growth area among telcos but warns of a slower adoption or pullbacks in three others. First, the AI optimism: Telcos will increasingly adopt voice-based AI, analysts believe. Already, some of the biggest global telcos are using embedded voice assistance in AI channels for enterprise customers. In 2026, telcos are likely to adopt voice technologies for customer calls as well. Immediate benefits could include live translation and integration of digital assistance services.
Artificial intelligence
Information security
fromAxios
1 week ago

Moltbook shows rapid demand for AI agents. The security world isn't ready.

Widespread adoption of OpenClaw agents on Moltbook is rapidly exposing enterprises to novel cybersecurity risks through agent-driven scams, data exfiltration, and misconfigured infrastructure.
Brooklyn
fromBrooklyn Eagle
1 week ago

Phone pickpockets hit Brooklyn concerts as cities worldwide report surge in phone thefts

Phone thefts at Brooklyn concert venues have surged, with stolen devices often resold internationally—especially to China—creating high financial value and severe security risks.
Artificial intelligence
fromArs Technica
1 week ago

The rise of Moltbook suggests viral AI prompts may be the next big security threat

Self-replicating prompts ("prompt worms") can propagate across networks of AI agents by exploiting their instruction-following behavior, risking rapid, widespread disruption similar to historical worms.
Information security
fromSecuritymagazine
1 week ago

How Banks Can Protect Their Most Valuable Asset: Customers

Banks must secure money, property, data, and reputation because incidents—crime, insider misuse, fraud, or IT failures—threaten safety, customer trust, regulatory standing, and brand.
Artificial intelligence
fromFortune
1 week ago

Meet Matt Schlicht, the man behind AI's latest Pandora's Box moment-a social network where AI agents talk to each other | Fortune

A public, chatbot-only platform called Moltbook exposed thousands of open-source AI agents, revealing capabilities, openness, and significant cyber-risk concerns.
Gadgets
fromwww.theguardian.com
1 week ago

Sure enough, it's gone': Brooklyn venues targeted for mass phone thefts during concerts

Phone thefts at concerts in New York have increased, targeting attendees (especially at metal and EDM shows) because U.S. iPhones fetch high prices abroad.
#data-breach
fromSecurityWeek
2 weeks ago
Privacy professionals

Crunchbase Confirms Data Breach After Hacking Claims

Crunchbase confirmed a cybersecurity breach with over two million records allegedly exfiltrated by ShinyHunters and more than 400 MB of stolen files publicly posted.
fromDataBreaches.Net
2 weeks ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

Dutch police systems had known cybersecurity gaps that allowed Russian hackers to access an employee email and steal nearly all 65,000 officers' personal data.
fromDataBreaches.Net
2 weeks ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

#ai-adoption
fromTNW | Eu
1 week ago

Europe's not-so-dry January: Unicorns and a new tech identity

Every January, millions take on Dry January , a ritual of restraint and resetting after the holiday season. If that's the benchmark for kicking off the year with moderation, Europe's startup ecosystem clearly didn't get the memo. In the opening weeks of 2026, the region saw five startups join the unicorn club, crossing the $1 billion valuation mark across sectors as varied as cybersecurity, cloud optimisation, defence tech, ESG software, and education technology.
Startup companies
fromSecurityWeek
1 week ago

Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China's Influence Grows

Japan and Britain agreed Saturday to accelerate cooperation on cybersecurity and the supply of critical minerals, as China's influence grows in the region. British Prime Minister Keir Starmer said his visit to Japan comes at a time "when geopolitical, economic and technological shocks are literally shaking the world." Starmer's overnight Tokyo visit comes on the heels of his trip to Beijing, where he and Chinese President Xi Jinping agreed to seek a long-term, stable "strategic partnership."
World news
Marketing
fromBarchart.com
1 week ago

Digital.Marketing Featured as Top Cybersecurity Digital Marketing Agency by SEC.co

SEC.co recognized Digital.Marketing as the top cybersecurity digital marketing agency for cybersecurity specialization, compliance-aware strategy, and revenue-focused execution.
Information security
fromTheregister
1 week ago

Deepfake job seeker applied to work for an AI security firm

Deepfake videos and fabricated profiles are increasingly used to apply for cybersecurity roles, deceiving experienced professionals and exploiting hiring platforms like LinkedIn.
Miscellaneous
fromTechCrunch
1 week ago

Meet the new European unicorns of 2026 | TechCrunch

Five European-rooted tech startups reached valuations above $1 billion in January, signaling strong VC appetite despite valuations not equaling commercial success.
Social media marketing
fromBusiness Insider
1 week ago

Misleading TikTok posts are going viral and driving backlash against brands. They're part of a gift card scheme.

A viral TikTok falsely claimed Sephora fired an employee; the account appears tied to a gift-card scheme harvesting personal data.
fromTechCrunch
1 week ago

Informant told FBI that Jeffrey Epstein had a 'personal hacker' | TechCrunch

A confidential informant told the FBI in 2017 that Jeffrey Epstein had a "personal hacker," according to a document released by the Department of Justice on Friday. The document, which was released as part of the Justice Department's legally required effort to publish documents related to its investigation into the late sex offender, does not identify who the alleged hacker was, but does include several details about them.
Information security
#cisa
#remote-jobs
Remote teams
fromAol
2 weeks ago

10 Work-From-Home Jobs That Pay at Least $36 an Hour

Remote high-paying jobs like software development, information security, and data science provide significant financial savings and flexibility while paying at least $36 per hour.
Miscellaneous
fromwww.aljazeera.com
2 weeks ago

Italy's Winter Olympics security plan keeps ICE in advisory role

Italy will lead all Olympic security operations with about 6,000 officers, drones, and a 24-hour cyber control room while ICE presence is limited to US diplomatic offices.
World news
fromEmptywheel
2 weeks ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
fromEmptywheel
2 weeks ago

The FBI: Now, with 48% More Domestic Surveillance ... but No Banksters

The FBI produced a self-congratulatory report of the changes they've made since 9/11. It describes the FBI's new intelligence focus. It boasts that it has a functional computer system (which for the FBI is an accomplishment) and 10,200 SCI work stations. Oh, and it proclaims with joy that the FBI has had a 48% growth in surveillance teams and capacity since 9/11. Let us rejoice in the proliferation of domestic spying!
Information security
fromEmptywheel
2 weeks ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
fromTechCrunch
2 weeks ago

AI security startup Outtake raises $40M from Iconiq, Satya Nadella, Bill Ackman and other big names | TechCrunch

Outtake, founded in 2023 by a former Palantir engineer, Alex Dhillon, has found a way to automate what has largely been the manual problem of spotting and taking down digital identity posers: impersonation accounts, malicious domains posing as the company's, rogue apps, fraudulent ads, and more. This problem has grown even more difficult because AI has enabled attackers to be more convincing and faster in their efforts.
Artificial intelligence
fromwww.computer.org
2 weeks ago

Build Future-Ready Software Teams with Modern Frameworks

The recently updated SWEBOK Guide v4.0a represents a needful industry standard, following a thorough peer review and a consensus-based approach. With the rise of AI, a significant skills gap in IT and cybersecurity is emerging alongside changes in the global workforce. There has never been a greater need for a consensus-based framework. This guide, created and thoroughly reviewed by industry professionals, serves as a dynamic and evolving resource.
Software development
Canada news
fromwww.cbc.ca
2 weeks ago

More criminals are using AI for ransomware attacks, cybersecurity centre warns | CBC News

Ransomware attacks in Canada are increasing and evolving rapidly, with criminals using AI to identify vulnerabilities, create malware, and automate extortion.
Privacy technologies
fromEngadget
5 months ago

The best VPN deals: Up to 87 percent off ProtonVPN, Surfshark, ExpressVPN, NordVPN and more

Long-term VPN plans often offer steep discounts, making annual or multi-year subscriptions substantially cheaper while adding privacy and extra security features.
EU data protection
fromThe Local Germany
2 weeks ago

What are the most commonly leaked passwords in Germany?

Many Germans still use simple, commonly leaked passwords—numeric sequences, English words, and reused combinations—creating significant cybersecurity risks.
Information security
fromAbove the Law
2 weeks ago

Think You Are Covered? Better Read Your Cybersecurity Policy - Carefully - Above the Law

Cyber insurance often fails to fully protect organizations due to exclusions, leaving law firms particularly vulnerable without proper cybersecurity and coverage review.
fromSilicon Canals
2 weeks ago

Andersen Consulting Strengthens Cybersecurity Capabilities with Addition of RedLegg - Silicon Canals

Founded in 2008 and headquartered in the U.S., RedLegg delivers tailored cybersecurity solutions with a focus on risk mitigation, managed security services, and penetration testing. Its offerings include managed detection and response (MDR), incident response, policy development, and virtual CISO advisory. Serving mid-market clients across finance, insurance, legal, and healthcare, RedLegg combines automation, threat intelligence, and a dedicated Security Operations Center (SOC) to help organizations streamline cybersecurity operations and build long-term resilience.
Information security
fromTechRepublic
1 month ago

Coupang CEO Quits After Breach Hits 33.7M South Koreans - TechRepublic

The e-commerce giant's data breach exposed 33.7 million customers-nearly two-thirds of the entire country's population-after hackers operated undetected for five months through overseas servers. Police have identified a former Chinese employee as the primary suspect, who exploited stolen encryption keys and authentication vulnerabilities to access customer names, phone numbers, email addresses, and delivery information. The suspect fled the country before authorities could make an arrest.
World news
World news
fromwww.theguardian.com
2 weeks ago

Starmer's fraught visit to China will tell us what he really thinks of the UK's place in the world | Peter Frankopan

UK-China relations require balancing growing security and espionage concerns with deep economic interdependence and mutual global leverage.
Information security
fromIndependent
2 weeks ago

Ireland faces disinformation and hacking threats from 'hostile actors' ahead of EU presidency

Ireland faces disinformation and cyber disruption threats from hostile states ahead of its EU presidency.
Information security
fromVue.js Jobs
2 weeks ago

Engineering Manager / Delivery Lead at ffive - VueJobs

Lead a multidisciplinary engineering team to deliver scalable, secure AI security features across Guardrails and Red Team products, ensuring performance, quality, and team growth.
Information security
fromSecuritymagazine
2 weeks ago

Grid Protection in Severe Weather: What Security Leaders Need to Know

A major winter storm severely strained U.S. power systems, creating disruptions that cybercriminals exploited by targeting existing infrastructure weaknesses.
fromwww.dw.com
2 weeks ago

Germany news: Majority see Trump as threat to nation

A new nationwide opinion poll finds a majority of Germans feel threatened by the actions of the US, a country that helped liberate and rebuild Germany and one that has been its most important ally for more than 80 years Germany's interior minister has promised a new, aggressive approach to cybersecurity, vowing to 'strike back' at bad actors The president of Germany's Bundesbank said his institution defends itself against 5,000 attempted cyberattacks every minute
Germany news
from24/7 Wall St.
2 weeks ago

CrowdStrike (NASDAQ: CRWD) Stock Price Prediction and Forecast 2025-2030 (Feb 2025)

A U.S. judge recently dismissed a shareholder lawsuit that accused cybersecurity company CrowdStrike Holdings Inc. ( NASDAQ: CRWD) of making false statements about its software testing before the 2024 global outage. Also, it has announced its intent to acquire Seraphic and SGNL, as well as new strategic partnership with Nord Security. The share price is 6.3% lower than a month ago and down 3.9% from six months ago, underperforming the Nasdaq in both time frames.
Information security
Information security
fromSecurityWeek
2 weeks ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
fromTechCrunch
2 weeks ago

Researchers say Russian government hackers were behind attempted Poland power outage | TechCrunch

A failed December effort to bring down parts of Poland's energy grid was the work of Russian government hackers known for causing past energy disruptions, according to a security research firm that investigated the incident. Last week, Polish Energy Minister Milosz Motyka told reporters that the attempted cyberattack on December 29 and 30 saw hackers targeting two heat and power plants, as well as trying to disrupt the communication links between renewable installations, such as wind turbines and power distribution operators.
Miscellaneous
Information security
fromChannelPro
2 weeks ago

Mid-market firms bring cybersecurity in-house as vendor trust wanes

Mid-market UK organizations are increasingly bringing cybersecurity in-house, with 65% managing security internally amid declining confidence in external vendors.
Artificial intelligence
fromInfoWorld
3 weeks ago

JetBrains IDEs integrate OpenAI Codex

GPT-5.2-Codex is integrated into JetBrains IDEs, enabling developers to plan, write, test, review, and deploy code from within supported JetBrains editors.
fromAlleywatch
3 weeks ago

The AlleyWatch Startup Daily Funding Report: 1/22/2026

Claroty - $150M Series F CYBERSECURITY Claroty, an end-to-end cybersecurity platform for industrial applications, has raised $150M in Series F funding led by Golub Growth. Founded by Amir Zilberstein, Benny Porat, and Galina Antova in 2015, Claroty has now raised a total of $890M in reported equity funding. Cubby Storage - $63M Series A Cubby Storage, a property management platform for storage operators, has raised $63M in Series A funding led by Goldman Sachs Alternatives. Cubby Storage was founded by Adam Fleming in 2021.
NYC startup
Information security
fromThe Verge
3 weeks ago

The TikTok deal is done, finally

USDS Joint Venture will secure U.S. user data, apps, and algorithm in Oracle's U.S. cloud with audited cybersecurity, software assurance, and trust-and-safety controls.
Information security
fromArs Technica
3 weeks ago

Hacker who stole 120,000 bitcoins wants a second chance-and a security job

Former black hat hacker Lichtenstein reformed in prison and seeks to use adversary skills in cybersecurity while working to regain community trust.
US politics
fromWIRED
3 weeks ago

Legislators Push to Make Companies Tell Customers When Their Products Will Die

Massachusetts bills would require companies to disclose when software support for connected devices will end to improve cybersecurity and consumer protection.
Law
fromAbove the Law
3 weeks ago

Alienating Our Affections - Above the Law

Sullivan & Cromwell adopted an income-partner model, accelerating the decline of single-tier law firm partnerships across Biglaw.
fromenglish.elpais.com
3 weeks ago

Israel blocks Spain's judicial investigation into Pegasus spyware scandal

Judge Jose Luis Calama, of the Audiencia Nacional high court, stated that Israel has blocked the investigation into a spying case against several members of Prime Minister Pedro Sanchez's government using a spyware called Pegasus, marketed and developed by an Israeli company. The probe found preliminary evidence of crimes involving the disclosure of secrets, which jeopardized the security of the Spanish State.
Miscellaneous
[ Load more ]