#cybersecurity

[ follow ]
#health-data
#data-breach
fromSecurityWeek
1 day ago
Information security

West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach

fromIT Pro
5 days ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

fromDataBreaches.Net
1 week ago
Business

Qantas CEO, top executives lose $522,000 in pay for major cyber breach - DataBreaches.Net

Qantas docked A$800,000 from CEO and executives after a Salesforce cyberattack exposed over 5.7 million customers' data.
fromTheregister
2 weeks ago
Information security

SK Telecom walloped with $97M fine after schoolkid security

SK Telecom left its network unsecured, enabling hackers to steal USIM data of about 23 million subscribers and prompting a record ₩134.5 billion fine.
fromSecurityWeek
1 day ago
Information security

West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach

fromIT Pro
5 days ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

#ai
fromTechzine Global
1 week ago
Information security

Varonis acquires SlashNext for email security

SlashNext's multi-channel phishing detection combined with Varonis' AI-driven data security enables earlier detection and prevention of AI-powered social-engineering attacks before data breaches occur.
fromNextgov.com
2 weeks ago
Artificial intelligence

Is artificial intelligence a friend, foe or frenemy? NIST wants to find out

AI's dual-use nature accelerates both cybersecurity defenses and adversary attacks, creating urgent need for resilience and guidance from standards bodies like NIST.
Information security
fromBusiness Insider
19 hours ago

A new Israeli cybersecurity startup just emerged from stealth and is already valued at $400 million.

Vega raised $65 million at a $400 million valuation to compete in cybersecurity, backed by Accel and other VCs, led by Unit 8200 founders.
fromIT Pro
1 day ago

Hackers behind Jaguar Land Rover announce their 'retirement' - should we believe them?

The Scattered Lapsus$ Hunters hacking group, recently linked to the attack on Jaguar Land Rover that has devastated the company, has announced that it plans to shut down.
Information security
Cars
fromwww.theguardian.com
1 day ago

Jaguar Land Rover extends production shutdown after cyber-attack

Jaguar Land Rover has halted vehicle production until at least 24 September while investigating a cyber-attack that has disrupted global operations, suppliers, and data.
#microsoft
fromIT Pro
5 days ago
Information security

US Senator calls for Microsoft FTC probe over 'gross cybersecurity negligence' - Ron Wyden claims the tech giant has provided 'dangerous, insecure software' to the US government

fromIT Pro
5 days ago
Information security

US Senator calls for Microsoft FTC probe over 'gross cybersecurity negligence' - Ron Wyden claims the tech giant has provided 'dangerous, insecure software' to the US government

#zero-trust
Privacy professionals
fromwww.theguardian.com
1 day ago

Hackers steal private data of Gucci, Balenciaga and McQueen customers

Luxury fashion group Kering suffered a June data breach exposing names, phone numbers, and emails of potentially millions of customers; no financial data was reported stolen.
#whatsapp
fromDataBreaches.Net
1 day ago
Information security

Ex-WhatsApp cybersecurity executive says Meta endangered billions of users in new suit - DataBreaches.Net

fromDataBreaches.Net
1 day ago
Information security

Ex-WhatsApp cybersecurity executive says Meta endangered billions of users in new suit - DataBreaches.Net

Information security
fromSecurityWeek
1 day ago

Terra Security Raises $30 Million for AI Penetration Testing Platform

Terra Security raised $30 million to scale its agentic-AI continuous penetration testing platform, expand offensive security capabilities, and accelerate hiring and customer growth.
#incident-response
fromBusiness Insider
1 day ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

fromBusiness Insider
1 day ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

Information security
fromSecuritymagazine
2 days ago

In an Age of Cyber Risk, Digital Transformation is No Longer Optional

Legacy systems in financial services increase cyber risk; firms must invest in modernization and cybersecurity to enhance resilience.
#ransomware
fromIT Pro
2 weeks ago
Information security

Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities

fromDataBreaches.Net
2 weeks ago
Privacy technologies

Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier - DataBreaches.Net

fromIT Pro
2 weeks ago
Information security

Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities

fromDataBreaches.Net
2 weeks ago
Privacy technologies

Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier - DataBreaches.Net

UK politics
fromTheregister
4 days ago

Google lands 400M MoD contract for secure UK cloud services

UK Ministry of Defence signed a £400 million contract with Google sovereign cloud to host AI, analytics, and cybersecurity workloads in UK sovereign datacenters.
UK politics
fromBusiness Matters
4 days ago

Octopus Energy's Chinese turbine deal sparks national security concerns

Octopus Energy's deal with Ming Yang to deploy Chinese-built turbines in the UK raises national security concerns about Chinese involvement in critical energy infrastructure.
Artificial intelligence
fromChannelPro
4 days ago

Kaseya targets new growth with double C-suite appointment

Kaseya appointed Anthony Anzevino as CRO and Pratik Wadher as CTO to accelerate growth and AI-driven IT management and cybersecurity solutions for SMBs.
fromTelecompetitor
5 days ago

Enterprise Leaders Issue Industry Manifesto to Mandate Mplify SASE Certification

Mplify (formerly MEF), a global alliance of network, cloud, cybersecurity, and enterprise organizations working together to accelerate the AI-powered digital economy, today warned that the $10.5 trillion cybercrime economy (according to Cybersecurity Ventures), weaponized AI, and escalating global conflicts are creating unprecedented risks to IT systems and critical infrastructure. In response, its Enterprise Leadership Council (ELC) has issued a manifesto calling for mandatory SASE certification across all products, services, and solutions under the Mplify framework.
East Bay (California)
fromThe Oaklandside
5 days ago

Yet another data-breach letter? Here's what to do

Data breaches are increasingly common, exposing personal information and undermining trust in banks while requiring individuals and institutions to adopt stronger cybersecurity and response measures.
Apple
fromTechCrunch
5 days ago

France says Apple notified victims of new spyware attacks | TechCrunch

Apple notified multiple individuals on September 3 that devices linked to their iCloud accounts were targeted and potentially compromised by a spyware campaign.
Information security
fromForbes
5 days ago

Why Human Error Is Cybersecurity's Top Threat

Human error and insecure user devices now represent the primary cybersecurity risk as remote work and cloud services expand the attack surface.
fromBusiness Insider
5 days ago

A white-hat hacking gambit spawned $48 million in venture funding for cybersecurity startup Koi. Read its pitch deck.

Koi closed a $10 million seed round in December and a $38 million Series A in August. Picture Capital and NFX led the seed, while Battery Ventures and Team8 led the Series A. Cerca Partners participated in both rounds. The Washington, DC-headquartered startup was cofounded last year by Assaraf and two other former Israel Defense Forces members who served in intelligence Unit 8200: CTO Idan Dardikman and CPO Itay Kruk. Both Dardikman and Kruk previously worked together at cybersecurity company Sygnia.
Information security
fromThe Cipher Brief
6 days ago

Beyond Defense: Building a Strategic U.S.-Japan Cyber Partnership

As the U.S.-Japan alliance confronts an era where digital threats increasingly target economic stability and national security, integrating cyber strategy into the relationship is essential. The longstanding pillars of military, trade, and diplomacy have supported peace and prosperity. Still, the rise of cyberspace as a borderless, high-stakes domain demands that both nations make cybersecurity a foundational element of their partnership in the Indo-Pacific and beyond.
World politics
fromFortune
6 days ago

'We've never had a fundraising deck': Here's where venture capital stands now and where it's going next | Fortune

If you want a pulse check on where the venture capital industry is at, consider the software supply chain security startup Chainguard, which has raised $500 million across two rounds in less than a year. "We've never had a fundraising deck," Ryan Carlson, president of Chainguard, said yesterday on the Future of Venture Capital insight exchange at Fortune's Brainstorm Tech conference in Park City, Utah. He added later: "We're not going to create a deck next time either."
Venture
fromThe Hacker News
6 days ago

The Time-Saving Guide for Service Providers: Automating vCISO and Compliance Services

Managed service providers (MSPs) and managed security service providers (MSSPs) are under increasing pressure to deliver strong cybersecurity outcomes in a landscape marked by rising threats and evolving compliance requirements. At the same time, clients want better protection without managing cybersecurity themselves. Service providers must balance these growing demands with the need to work efficiently, deliver consistent results, and scale their offerings.
Information security
fromSecuritymagazine
1 week ago

Why It's Time to Move on From Legacy Access Control Systems

The modern workplace or campus looks very different from even a decade ago - and older access control systems struggle to keep up. They weren't built to handle the fast pace of change we see today. Employees no longer work from the same building every day. Flexible working hours, telecommuting, and increased reliance on contractors introduce more complexity in scheduling and cardholder management.
Privacy technologies
fromNextgov.com
1 week ago

White House cyber office calls for 'whole of nation' effort to deter nation-state hackers

"The United States cannot expect this behavior to change," he said, adding the nation "must send a message this behavior is unacceptable" and should come with a cost to foreign rivals. "I'm committed to marshalling a unified, whole of nation approach on this, working in lockstep with our allies who share our commitment to democratic values, privacy and liberty," Cairncross said.
US politics
fromEntrepreneur
1 week ago

Passwords Won't Secure Your Identity. Here's What Will. | Entrepreneur

Our lives have migrated to a virtual world to the point where our emails have become an entry point to our identity. Medical records, employment history, education, world views and all that comes to mind, which pertains to who we are as people, likely have some form of digital footprint that can be traced back to us. While this can translate to seamless convenience, whether personalized recommendations or quick product deliveries, there remains a risk of exposure that threat actors constantly exploit.
Information security
US politics
fromAbove the Law
1 week ago

Morning Docket: 09.09.25 - Above the Law

Supreme Court allows Latino profiling, judges confirmed favoring Trump, law firms take Trump Media work, federal cuts threaten cybersecurity, and key legal rulings affirmed.
Startup companies
fromFast Company
1 week ago

Best Workplaces for Innovators 2025: Innovation Team of the Year

Badge's cryptography team cut biometric authentication latency to 22 milliseconds with an Identity Without Secrets system, securing patents and enterprise adoption.
Information security
fromChannelPro
1 week ago

Cyber attacks: Can the channel save the day?

IT channel partners provide proactive, layered cybersecurity and incident response services that protect small and medium businesses lacking in-house resources.
fromTechCrunch
1 week ago

Netskope follows Rubrik as a rare cybersecurity IPO, both backed Lightspeed | TechCrunch

Next week, the sector is expected to add one more public company: the cloud cybersecurity platform Netskope. The 13-year-old startup also shares its earliest and largest investor with Rubrik: Lightspeed Venture Partners. The large Silicon Valley firm had a 23.9% ownership of Rubrik when it went public at $6.6 billion last year. In the case of Netskope, Lightspeed owns 19.3% of the company that aims to achieve a valuation of as much as $6.5 billion, according to the updated S1 filing.
Startup companies
Real estate
fromwww.housingwire.com
1 week ago

First American adds Intellicheck ID verification to fraud prevention tools

First American Title adds Intellicheck-powered identity verification to AgentNet, enhancing early identity checks and expanding existing fraud prevention tools to combat rising real estate fraud.
Startup companies
fromTechzine Global
1 week ago

Netskope aims for IPO with a valuation of $6.5 billion

Netskope plans a US IPO to raise up to $813 million with valuation up to $6.5 billion amid rising SASE market and cyber threat demand.
fromFortune
1 week ago

I'm chief legal officer at a $4 billion IT unicorn and I've got Gen Z advice for leaders looking to reimagine entry-level work in the age of AI

LinkedIn's chief economic opportunity officer recently warned that AI is "breaking" entry-level jobs that have historically served as stepping stones for young workers. As Aneesh Raman wrote in The New York Times, "Breaking first is the bottom rung of the career ladder." AI tools are performing simple coding and debugging tasks that junior software developers once did to gain experience, along with work that young employees in the legal and retail sectors traditionally handled.
Artificial intelligence
Miscellaneous
fromFortune
1 week ago

I built NATO's incident response capabilities before becoming a cyber CEO. My business is becoming the new defense sector

Warfare has become decentralized and technology-driven, requiring governments to defend critical infrastructure everywhere and prioritize cybersecurity, defense innovation, and higher defense spending.
Artificial intelligence
fromEntrepreneur
1 week ago

Google Report: This Is How Leaders Are Using AI at Work | Entrepreneur

Generative AI is driving marketing, cybersecurity, and customer-experience improvements, boosting employee productivity, though only 40% report direct revenue growth.
fromComputerWeekly.com
1 week ago

US politicians ponder Wimwig cyber intel sharing law | Computer Weekly

"Stakeholders from across industry sectors have endorsed this legislation because it preserves the essential privacy and liability protections in the Cybersecurity Information Sharing Act of 2015, clarifies the law's language to better address the evolving threat landscape, and ensures private-sector insight is properly captured," said representative Andrew Garbarino, chairman of the House Homeland Security Committee.
Information security
fromSecuritymagazine
1 week ago

Public and Private Collaboration Can Help Bolster our Cyber-Posture

The escalating and constant digital threats from state-sponsored adversaries like China, Iran, North Korea, and Russia coincide with a fractured global governance and a shifting domestic policy landscape. This moment presents a unique opportunity for the administration to continue to set the tone as a global leader in cyber threat deterrence. Public and private collaboration can help with this effort.
Information security
fromwww.scientificamerican.com
1 week ago

The New Frontier of AI HackingCould Online Images Hijack Your Computer?

If a typical chatbot (say, ChatGPT) is the bubbly friend who explains how to change a tire, an AI agent is the neighbor who shows up with a jack and actually does it. In 2025 these agentspersonal assistants that carry out routine computer tasksare shaping up as the next wave of the AI revolution. What distinguishes an AI an agent from a chatbot is that it doesn't just talkit acts, opening tabs, filling forms, clicking buttons and making reservations.
Artificial intelligence
fromIT Pro
1 week ago

Gen Z has a cyber hygiene problem

Despite their reputation as digital natives, Gen Z is pretty poor when it comes to cybersecurity practices. Analysis from consumer insights platform GWI found that while many in this demographic have grown up online, only three-in-ten have made a habit of regularly changing their passwords compared to 42% of Baby Boomers. They're also the generation least likely to keep software and devices up to date, with only 43% bothering. Gen Z was found lacking in other basic cyber hygiene practices, the study noted.
Information security
#cisa
Information security
fromTheregister
1 week ago

Here's how ransomware crims are abusing AI tools

AI-powered ransomware and LLM-assisted extortion lower barriers, enabling automated reconnaissance, exploitation, and malware creation, increasing risk to organizations.
Information security
fromDataBreaches.Net
1 week ago

Jaguar Land Rover production impacted by cyberattack; Scattered Spider/ShinyHunters claims responsibility - DataBreaches.Net

A cyber-attack severely disrupted Jaguar Land Rover's UK production and retail operations while there is currently no evidence that customer data was stolen.
US politics
fromNextgov.com
1 week ago

House panel advances bill to extend bedrock cyber info-sharing law

House committee approved a ten-year renewal of the 2015 cybersecurity information-sharing law (WIMWIG), preserving liability protections and sending it to the full House.
Information security
fromTechCrunch
1 week ago

Venezuela's president thinks American spies can't hack Huawei phones | TechCrunch

Huawei Mate X6 has security vulnerabilities despite claims it cannot be hacked; HarmonyOS has had numerous bugs and recent high-severity patches.
Information security
fromTechzine Global
1 week ago

Former IBM executive Jetter now chairman of SCION Association

Martin Jetter becomes chairman of the SCION Association, accelerating SCION's transition from research project to market standard for secure, sovereign internet architecture.
Information security
fromTechRadar
2 weeks ago

I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech

Human-focused social engineering exploited IT help desks and passwords, enabling ransomware and data loss; strengthening human defenses and password practices is essential.
Information security
fromSecuritymagazine
2 weeks ago

Chaim Mazal - Growing into a Security Career

Childhood self-taught coding and hacker-community exploration propelled Chaim Mazal into cybersecurity leadership, culminating as Chief Security Officer overseeing global security and product security.
fromTheregister
2 weeks ago

DDoSing is big and getting bigger - let's kill it off

Distributed Denial of Service (DDoS) is a profoundly unsexy cybercrime, and that's a big problem. Headlines are full of ransomware, data breaches, or the latest exploit. DDoS, where a site or service is poleaxed by a packet tsunami, is just background noise. Now and again, security agencies put out a press release because they've taken down one of the botnets that propagate DDoS attacks, but that's been going on for decades without much effect.
Information security
Cars
fromSustainable Bus
2 weeks ago

Technotrans to present cybersecurity-ready BTMS at Busworld - Sustainable Bus

Technotrans' zeta.trax BTMS is cybersecurity-ready and supports direct 500–850 V high-voltage DC connection, reducing complexity, space and costs while offering scalable, low-GWP cooling.
Information security
fromNextgov.com
2 weeks ago

Noem terminates 24 FEMA workers for failing to address cyber vulnerabilities

Homeland Security Secretary Kristi Noem fired FEMA's CIO, CISO, and 22 IT staff after a cybersecurity review found severe security lapses that allowed potential network breaches.
#deepfakes
fromTechzine Global
2 weeks ago

AI drives record revenues for Dell, Elastic, and SentinelOne

Dell Technologies reported record revenue of $29.8 billion in the second quarter of fiscal 2026, up 19 percent from a year earlier. Earnings per share rose 38 percent to $1.70, while adjusted earnings were $2.32. Revenue from servers and networks grew 69 percent to $12.9 billion, driven by strong demand for AI systems. COO Jeff Clarke said Dell shipped more AI solutions in the first half of the year than it did in all of 2025
Artificial intelligence
fromTheregister
2 weeks ago

FBI cyber cop: Salt Typhoon pwned 'nearly every American'

"There's a good chance this espionage campaign has stolen information from nearly every American," Michael Machtinger, deputy assistant director for the FBI's cyber division, told The Register.
World news
Artificial intelligence
fromNextgov.com
2 weeks ago

Advocacy groups ask OMB to axe Grok AI procurement

Consumer advocacy groups urge the OMB to ban federal use of Grok due to ideological bias, unreliable outputs, operational inconsistencies, and cybersecurity vulnerabilities.
Artificial intelligence
fromwww.theguardian.com
2 weeks ago

ChatGPT offered bomb recipes and hacking tips during safety tests

Advanced AI models produced actionable instructions for violent, biological, and drug crimes during cross-company safety testing, revealing misuse risks and cyberattack facilitation.
fromForbes
2 weeks ago

20 Courses & Certificates To Learn High-Income Skills In 2 Hours

And yet, between several meetings, projects, and your personal priorities (including, of course, the binge-watching), professional development and career growth often sinks to the bottom of your to-do list. But you cannot afford to let your upskilling endeavors suffer. In 2025, high-income skills are the very currency of your career success. You could afford to switch off the TV for just a couple hours a week.
Information security
fromFortune
2 weeks ago

George Kurtz on CrowdStrike's $290 million Onum acquisition and cybersecurity M&A

"There are some companies that are obviously richly-valued," Kurtz told Fortune. "I think some of these companies don't realize that they are starting to move into zombieland: You look at their last round valuation, and it might be great for them, but it's expensive and it's necessarily actionable for a lot of companies, even ours." To be sure, there have been a couple of notable big-ticket acquisitions in cyber lately: Palo Alto Networks' $25 billion acquisition of CyberArk and Google's proposed $32 billion acquisition of Wiz.
Information security
Business
fromTechzine Global
2 weeks ago

Nvidia and Snowflake figures good, HP stable, CrowdStrike poor

Major US tech companies reported mixed quarterly results: Nvidia and Snowflake outperformed and raised forecasts, HP posted steady growth, and CrowdStrike faced operational challenges.
fromFortune
2 weeks ago

Exclusive: Crowdstrike CEO George Kurtz on $290 million acquisition of startup Onum and security in the AI age

"When you look at some of these other acquisitions, like CyberArk, you're talking about a 20-year-old technology company with a lot of integration risk. These are big companies, and I've seen the movie before. When I was at McAfee, we acquired 21 companies, and never quite got them integrated... So, when it comes down to it, we're maniacally focused on the customer experience, on making sure we're disciplined enough to get this stuff integrated. We have a great track record of doing that."
Information security
Information security
fromBusiness Matters
3 weeks ago

Douglas Lemott Jr. On A Journey from Marine Corps to Cybersecurity Leadership

Douglas Lemott Jr. leads cybersecurity at ARC, applying over three decades of experience and Marine Corps discipline to balance innovation, security, and compliance.
Artificial intelligence
fromEntrepreneur
2 weeks ago

Cybercriminals Are Using AI to Hack Companies | Entrepreneur

Hackers exploited Anthropic's Claude AI to create tailored malware, organize stolen data, and run extortion schemes targeting at least 17 companies.
fromTechzine Global
2 weeks ago

Commvault launches HyperScale Edge and Flex for better cyber resilience

With HyperScale Edge, Commvault is specifically targeting remote locations and smaller businesses where space and IT resources are limited. Think of retail stores, branches, and distribution centers. These environments often have different needs than large data centers. The solution works with validated hardware from Dell, HPE, and Lenovo. Like the other HyperScale products, it is delivered as a software image that is easy to install. This makes implementation faster and more predictable.
Information security
Privacy technologies
fromTechzine Global
2 weeks ago

Canon launches Subscription Security Services for print security

Canon offers Subscription Security Services with two tiers, automated firmware updates, and integrated cloud tools to protect printers and unify security governance across print infrastructure.
Artificial intelligence
fromTechzine Global
2 weeks ago

Anthropic blocks misuse of Claude for cybercrime

Anthropic blocked attempts to misuse Claude for phishing, malware development, filter circumvention, and influence campaigns, banning accounts and tightening filters to mitigate risks.
fromIT Pro
2 weeks ago

AI means cyber teams are rethinking their approach to insider threats

Nearly two-thirds of European cybersecurity professionals see insider threats as their biggest security risk - and AI is making things worse. A from Exabeam shows 64% now view insiders, whether malicious or compromised, as a bigger risk than external threat actors. Notably, a key factor behind this shift in focus is the use of generative AI among cyber criminals, the study found, which is making attacks faster, stealthier, and more difficult to detect. "Insiders aren't just people anymore," said Steve Wilson, chief AI and product officer at Exabeam. "They're AI agents logging in with valid credentials, spoofing trusted voices, and making moves at machine speed."
Information security
fromMedCity News
3 weeks ago

Without Clear Strategy, CMS' $50B Rural Hospital Fund Risks Falling Short - MedCity News

"Money is not the only answer," said Jason Griffin, managing director at consulting firm Nordic Global.
Healthcare
fromGadget Flow
3 weeks ago

Digital Nomad Tech Essentials: 2025 Gear Guide

The digital nomad lifestyle may look chaotic from the outside, but it really comes down to mastering two things: planning ahead and having the right tools. From a versatile backpack and reliable power bank to a VPN, noise-cancelling headphones, portable displays, and external storage, these essentials make it possible to stay productive anywhere while keeping work secure, comfortable, and stress-free.
Digital life
#federal-judiciary
fromIT Pro
3 weeks ago

Is remote work really insecure?

"While remote work is more widespread and socially accepted now, that hasn't meant the industry has fully adapted its security practices to match," he explains. "If anything, the risks have grown because more people are working from home, often on networks that aren't secure. "Many questions remain. Where are your employees working? What networks are they joining? Are their devices locked securely?
Information security
US politics
fromArs Technica
3 weeks ago

Senator castigates federal judiciary for ignoring "basic cybersecurity"

Federal electronic court filing systems were breached, exposing sealed documents and creating a severe national security risk due to neglected cybersecurity practices.
Information security
fromSecuritymagazine
3 weeks ago

CISA Issues Software Bill of Materials Draft, Encourages Public Comments

Updated minimum elements for SBOMs guide standardized, machine-readable SBOM generation and sharing to improve software supply chain transparency and risk-informed cybersecurity decisions.
[ Load more ]