Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
Notorious crooks broke into a company network in 48 minutes. Here's how.Attackers are moving faster than ever, and so must defenders to prevent data breaches.
AI vs AI: In the age of AI-driven attacks, only AI can keep upGenerative AI is transforming cybersecurity by enabling sophisticated attacks that SOC teams must counter with their own AI tools.
Palo Alto confirms exploitation of critical vulnerabilityCVE-2025-0108 is a critical authentication bypass flaw in PAN-OS that needs urgent attention.Active exploitation attempts for CVE-2025-0108 were detected shortly after its announcement.
AI's dual role remains a security concernAI is transforming security by enhancing threat detection but also equipping cybercriminals with advanced tools.
Over 90% of phishing campaigns lead victims to malwarePhishing remains the primary method for attackers, requiring improved anti-phishing technologies and user education.
Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
Notorious crooks broke into a company network in 48 minutes. Here's how.Attackers are moving faster than ever, and so must defenders to prevent data breaches.
AI vs AI: In the age of AI-driven attacks, only AI can keep upGenerative AI is transforming cybersecurity by enabling sophisticated attacks that SOC teams must counter with their own AI tools.
Palo Alto confirms exploitation of critical vulnerabilityCVE-2025-0108 is a critical authentication bypass flaw in PAN-OS that needs urgent attention.Active exploitation attempts for CVE-2025-0108 were detected shortly after its announcement.
AI's dual role remains a security concernAI is transforming security by enhancing threat detection but also equipping cybercriminals with advanced tools.
Over 90% of phishing campaigns lead victims to malwarePhishing remains the primary method for attackers, requiring improved anti-phishing technologies and user education.
Army experimenting with AI to supplement physical securityThe US Army's Scylla AI can identify threats from a mile away with over 96% accuracy, transforming security operations.
Product spotlight on video surveillanceAdvancements in video surveillance integrate AI technology for enhanced threat detection and security management across various sectors.
Army experimenting with AI to supplement physical securityThe US Army's Scylla AI can identify threats from a mile away with over 96% accuracy, transforming security operations.
Product spotlight on video surveillanceAdvancements in video surveillance integrate AI technology for enhanced threat detection and security management across various sectors.
Exabeam promises a revolution for SOC automationExabeam's New-Scale SOC platform updates enhance threat detection and integration through Open API support and New-Scale Analytics.
Stat(s) Of The Week: AI Can Perpetuate And Prevent ScamsAI-powered deepfake technology poses an existential threat to businesses, yet its application can lead to lower cyber insurance costs.
Using artificial intelligence (AI) to track and analyze cyber risksAI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.
AI security: Safeguarding schools beyond surveillanceSchools rely on surveillance cameras (91%) but struggle to keep pace with evolving security threats. AI systems enhance proactive threat detection capabilities.
Using artificial intelligence (AI) to track and analyze cyber risksAI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.
AI security: Safeguarding schools beyond surveillanceSchools rely on surveillance cameras (91%) but struggle to keep pace with evolving security threats. AI systems enhance proactive threat detection capabilities.
Rubrik and Mandiant plan to transform incident response with new dealRubrik partners with Mandiant for faster threat detection and recovery times.
API and data security remain top threatsFinancial institutions face challenges in compliance and understanding API activity, making them vulnerable to threats and breaches.
Game-changing data security in secondsLepide Data Security Platform offers streamlined data protection with real-time visibility and threat detection.
API and data security remain top threatsFinancial institutions face challenges in compliance and understanding API activity, making them vulnerable to threats and breaches.
Game-changing data security in secondsLepide Data Security Platform offers streamlined data protection with real-time visibility and threat detection.
The Urgent Need To Protect AIAI in cybersecurity brings both enhanced defense capabilities and heightened risks that demand urgent attention.
How AI is Used in Proactive Cybersecurity OperationsAI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
The Urgent Need To Protect AIAI in cybersecurity brings both enhanced defense capabilities and heightened risks that demand urgent attention.
How AI is Used in Proactive Cybersecurity OperationsAI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
How DHS is hustling to leverage-and contain-generative AIThe Department of Homeland Security utilizes AI to analyze threat data for various purposes, from preventing attacks to generating images for investigations.
Sonatype exposes malicious PyPI package 'pytoileur'Sonatype discovered a malicious PyPI package 'pytoileur' within a larger campaign, showcasing the importance of robust security measures in the coding community.
How DHS is hustling to leverage-and contain-generative AIThe Department of Homeland Security utilizes AI to analyze threat data for various purposes, from preventing attacks to generating images for investigations.
Sonatype exposes malicious PyPI package 'pytoileur'Sonatype discovered a malicious PyPI package 'pytoileur' within a larger campaign, showcasing the importance of robust security measures in the coding community.
Westcon-Comstor and Vector AI expand European distribution agreementWestcon-Comstor expands partnership with AI security provider Vector AI into UK, Ireland, and Nordic markets.
CrowdStrike CEO: Embrace AI or be crushed by cyber crooksThose who fail to embrace AI in security operations will be vulnerable to modern cyber threats.
Versa Networks adds AI capabilities to SASE platform | Computer WeeklyVersa Networks enhances AI/ML capabilities in SASE platform to improve threat detection and data protection.
Lowering potential impact of zero-day vulnerabilities with New RelicZero-day vulnerabilities are dangerous as they allow attackers to exploit unknown flaws before developers can patch them.Traditional security measures like signature-based detection systems are often ineffective against zero-day threats, highlighting the need for advanced monitoring tools.
Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies | TechRepublicCyber threat hunting aims to detect malicious activities and enhance an organization's resilience against attacks.Hypothesis-driven hunting involves forming assumptions based on threat intelligence to uncover potential security breaches.
Falco, Cloud-Native Security Tool for Kubernetes, Graduates from CNCFFalco graduated from CNCF after meeting rigorous requirements including security audit and licensing approvals.Falco provides real-time threat detection for containers, Kubernetes, and hosts, integrating with 50+ third-party systems.
Viavi enhances sensing for fibre-enabled critical infrastructure | Computer WeeklyViavi Solutions launches Nitro Fiber Sensing for real-time asset monitoring and threat detection in various industries.
78% of organizations are tracking AI risks78% of organizations track AI as an emerging risk while utilizing it for efficiency and digital risk improvement.