#cybersecurity

[ follow ]
fromeLearning Industry
2 hours ago

How Gamification Is Enhancing Public Sector Preparedness

Government training has never been more critical or more complex. From active shooter preparedness to cybersecurity readiness, public servants are increasingly called to navigate high-stakes scenarios where decisions can have life-or-death consequences. Traditional training methods like static presentations, dense manuals, or infrequent workshops often fail to engage or prepare participants for the dynamic challenges they face. Enter gamification: the application of game design principles to non-game contexts.
US politics
#remote-work
fromSocial Media Explorer
4 days ago
Information security

The Biggest Challenges for Cyber Security Managers - Social Media Explorer

Remote and hybrid work dramatically increases cyber risk by expanding attack surfaces, requiring proactive, adaptive, and human-centric security beyond traditional defenses.
fromIT Brew
6 days ago
Remote teams

What it was like to be working in IT during the Covid-19 pandemic

IT professionals rapidly shifted to support a massive remote workforce, defending systems, assisting users, and maintaining infrastructure amid heightened cybersecurity and operational strain.
fromFortune
8 hours ago

The search for corporate America's next Fortune 500 CEOs | Fortune

At Fortune, we've spent almost a century studying what separates the good leaders from the great ones; the ones who don't just survive disruption, but shape it. The next wave of corporate chiefs is emerging from a radically different playbook. They're products of an economy defined by technological acceleration, and operate with fluency across disciplines that didn't even exist in the CEO vocabulary a decade ago: data science, AI governance, cybersecurity, social trust, geopolitical volatility, and shifting expectations of what leadership should look like.
Business
Tech industry
fromMail Online
10 hours ago

Warning to Microsoft customers as support for Windows 10 ends TOMORROW

Windows 10 support ends tomorrow, stopping security updates and leaving millions of devices vulnerable unless upgraded to Windows 11 or paid extended updates.
#cisa
Law
fromABA Journal
4 days ago

Hackers gained access to 'small number' of attorney emails at Williams & Connolly, firm confirms

Hackers accessed a small number of Williams & Connolly attorney email accounts via a zero-day attack; no evidence of extraction from other IT systems.
Food & drink
fromwww.bbc.com
2 days ago

How hackers forced brewing giant Asahi back to pen and paper

A cyber-attack forced Asahi to halt most domestic production, causing manual order processing and widespread shortages across Japan's beer and beverage supply chain.
#cybercrime
fromBon Appetit
3 days ago

Japan's Supply of Asahi Beer Almost Ran (Super) Dry

No one is safe from cyber attacks, it seems-a lesson Japan's Asahi Group, maker of the popular Asahi Super Dry beer, learned last week after a significant cybersecurity breach brought its Japanese factories to a standstill. In a statement, the company said there was evidence of "a potential unauthorized transfer of data," and that they'd been the target of a ransomware attack.
Food & drink
#phishing
fromZDNET
1 week ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromZDNET
1 week ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

#data-breach
fromDataBreaches.Net
5 days ago
Information security

Qantas says 'legal protections in place' as ScatteredLAPSUS$Hunters group threatens to release personal data - DataBreaches.Net

fromDataBreaches.Net
5 days ago
Information security

Qantas says 'legal protections in place' as ScatteredLAPSUS$Hunters group threatens to release personal data - DataBreaches.Net

fromVue.js Jobs
3 days ago

Frontend Engineer at Riot Security - VueJobs

We want to instill cybersecurity good practices to employees in a way that's actually effective, and entertaining enough so that employees don't feel like they're working. Think Duolingo but for cybersecurity. We created a platform to easily rollout a cybersecurity awareness program: the platform sends chat-based 4-minutes long courses to teams. Following the courses, the other side of the platform simulates phishing attacks, to prepare employees to face hackers - but in a safe environment.
Careers
#north-korea
fromWIRED
3 days ago
Information security

North Korean Scammers Are Doing Architectural Design Now

fromTechCrunch
6 days ago
Information security

North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say | TechCrunch

fromWIRED
3 days ago
Information security

North Korean Scammers Are Doing Architectural Design Now

fromTechCrunch
6 days ago
Information security

North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say | TechCrunch

fromTechzine Global
3 days ago

More than 100 companies likely affected by Oracle hack

Security researchers at Google say that more than 100 organizations are likely to have fallen victim to a large-scale cyberattack on Oracle E-Business Suite. The hacking campaign, carried out by the notorious CL0P group, targets business-critical systems and has already stolen "mass amounts of customer data." The attack may have started three months ago, according to Google's cybersecurity team. "This level of investment suggests the threat actor(s) responsible for the initial intrusion likely dedicated significant resources to pre-attack research," Google said.
Information security
#ai-risk
fromwww.independent.co.uk
4 days ago
Artificial intelligence

AI will pain whole swathe of UK economy before providing net benefit'

AI will inflict short-term harm on the UK economy and enable models to discover cyber vulnerabilities, while advanced AI risks biological, chemical, and autonomous threats.
fromFortune
4 days ago
Artificial intelligence

A whopping 72% of S&P 500 companies disclosed AI as a 'material risk' on their 10-Ks this year | Fortune

A growing majority of S&P 500 companies list AI as a material risk, citing reputational, cybersecurity, implementation, and regulatory threats.
fromFortune
4 days ago
Artificial intelligence

A whopping 72% of S&P 500 companies disclosed AI as a 'material risk' on their 10-Ks this year | Fortune

World politics
fromwww.aljazeera.com
4 days ago

Will Trump's tariffs push China and India closer?

India and China resume direct flights after five years to strengthen trade ties and compete over manufacturing, supply chains, and economic influence amid shifting tariffs.
#information-sharing
#encryption
fromThe Hacker News
4 days ago
Information security

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Attackers increasingly combine social engineering, AI-driven manipulation, and cloud exploitation, widening attack surfaces across communication platforms, devices, and cloud services.
fromComputerWeekly.com
1 week ago
EU data protection

EU Chat Control plans pose 'existential catastrophic risk' to encryption, says Signal | Computer Weekly

Mandating client-side scanning of encrypted communications would introduce severe security vulnerabilities and pose an existential, catastrophic risk to encryption.
Information security
fromDataBreaches.Net
4 days ago

Shad White's office finds nearly a third of Mississippi's state agencies fail cybersecurity requirements - DataBreaches.Net

One third of Mississippi state agencies failed to complete required third-party cybersecurity assessments, leaving critical government operations exposed to cybercrime risk.
Information security
fromSecurityWeek
4 days ago

Realm.Security Raises $15 Million in Series A Funding

Realm.Security raised $15 million Series A to expand its AI-native Security Data Pipeline platform that streamlines security data, speeds investigations, and reduces SOC costs.
Information security
fromIT Pro
4 days ago

Organizations lag on deepfake protection

Deepfake attacks are increasing across multiple vectors, causing substantial financial losses while organizational defenses, budgets, and training remain insufficiently effective.
fromSecuritymagazine
4 days ago

Cybersecurity Trust Gaps: Why Stakeholders Believe Hackers Before They Believe You

Not long ago, hackers claimed to have stolen nearly 19 million customer records from TalkTalk. Within hours, that number appeared in headlines across the U.K. and beyond. The problem was that it was not true. TalkTalk later pushed back, calling the claim "wholly inaccurate" and "very significantly overstated." But by then, the damage was done. Customers, regulators, and journalists had already absorbed the hacker's story as fact, and TalkTalk's correction barely registered in comparison.
Information security
US news
fromDataBreaches.Net
4 days ago

Policyholder Plot Twist: Cyber Insurer Sues Policyholder's Cyber Pros - DataBreaches.Net

Ace American sued CoWorx's cybersecurity vendors alleging negligence and breach of contract to recover $500,000 paid under its cyber insurance policy.
Information security
fromTechzine Global
4 days ago

Fifty years of security by design: why isn't it working?

Persistent misguided incentives, siloed stakeholders, and a speed-first Silicon Valley culture prevented adoption of security-by-design, leaving modern systems as insecure as decades ago.
fromAbove the Law
5 days ago

Williams & Connolly Hit By Foreign Hackers - Above the Law

Suspected Chinese government-backed hackers have breached computer systems of US law firm Williams & Connolly, which has represented some of America's most powerful politicians, as part of a larger spying campaign against multiple law firms, according to a letter the firm sent clients and a source familiar with the hack....Liu Pengyu, a spokesperson for the embassy, told CNN in response to a separate hacking allegation last month: "China firmly opposes and combats all forms of cyber attacks and cybercrime."
Information security
EU data protection
fromTechzine Global
5 days ago

AgentForce will fix cybersecurity threats and compliance issues automatically

Salesforce expands Agentforce with AI agents that automate threat detection, response, and compliance checks, integrating with CrowdStrike, Okta, Security Center, and Privacy Center.
#cisa-2015
fromAcm
5 days ago

Cyberpsychology's Influence on Modern Computing

Cyberpsychology investigates the psychological processes related to technologically interconnected human behavior, informing disciplines such as human-computer interaction (HCI), computer science, engineering, psychology, and media and communications studies.5 The field explores how digital technologies influence and transform human cognition, emotion, and social interaction, as well as the reciprocal impact these human elements have on technologies. At its core, cyberpsychology seeks to understand the dynamic interplay between humans and technology.
Artificial intelligence
fromwww.aljazeera.com
5 days ago

Will Trump's tariffs push China and India closer?

India and China are resuming direct flights after five years of suspension and say they will strengthen trade ties. Their relationship has long been defined by rivalry, competing ambitions and a disputed border. Now, India and China are resuming direct flights after a five-year suspension. United States President Donald Trump's tariffs and a shifting trade landscape could push them closer together.
World news
US politics
fromAbove the Law
5 days ago

Morning Docket: 10.08.25 - Above the Law

Legal and political developments include official deflection over Epstein ties, law‑firm cyberattacks, OMB removal of furlough back‑pay mention, and major court and regulatory shifts.
Information security
fromIT Pro
5 days ago

Repeated cyber attacks act as a stark reminder this cybersecurity awareness month

Cyberattacks are inflicting severe operational and financial damage on businesses and their supply chains, causing production halts, revenue loss, and supplier failures.
Information security
fromComputerWeekly.com
6 days ago

The Security Interviews: David Bradbury, CSO, Okta | Computer Weekly

Okta suspended development after an October 2023 helpdesk breach and launched a Secure Identity Commitment to improve products, customer practices, industry protection, and corporate hardening.
Information security
fromSecurityWeek
6 days ago

Filigran Raises $58 Million in Series C Funding

Filigran raised $58 million Series C, totaling over $100 million, to expand internationally, hire talent, and accelerate development of XTM suite, OpenGRC, and AI.
Information security
fromSecurityWeek
6 days ago

Security Firm Exposes Role of Beijing Research Institute in China's Cyber Operations

BIETA and its subsidiary CIII operate as front organizations supporting China's Ministry of State Security, researching and supplying technologies for intelligence, counterintelligence, and military operations.
fromIT Pro
6 days ago

IT and business pros call for more tech training

With the tech skills gap showing no signs of closing, very few IT and business professionals believe they're getting enough support for tech learning. A survey of 1,500 tech executives, IT professionals, and business professionals in the US, UK, and India from tech workforce development firm Pluralsight has revealed that while 95% say building a culture of learning is a priority at their organization, the same number believe they need more support to learn tech skills.
Online learning
Information security
fromSecurityWeek
6 days ago

The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn

Time-related rollover bugs like Y2K38 and Y2036 are exploitable today, risking system failures, cybersecurity bypasses, and physical safety impacts in critical infrastructure.
#ransomware
fromIT Pro
1 week ago

Agentic AI poses major challenge for security professionals, says Palo Alto Networks' EMEA CISO

Agentic AI projects are likely to fail at a rate far higher than currently predicted and present a major challenge to cybersecurity operations, according to an information security expert. Haider Pasha, EMEA CISO at Palo Alto Networks, told ITPro that the benefits of would be outweighed by the risks if chief information security officers (CISOs) don't employ strict strategic and technical controls over the technology's deployment.
Information security
Venture
fromAlleywatch
1 week ago

The Weekly Notable Startup Funding Report: 10/6/25

Fourteen startup funding deals raised $2.3B this week, led by Cerebras Systems ($1.1B), CyberCube ($180M), and multiple AI and software startups.
Information security
fromTelecompetitor
1 week ago

Nearly 35B Cybersecurity Threats in 2025: Report

A multi-layered cybersecurity defense combining AI-driven monitoring and human analysts is essential for business resilience amid billions of annual cyber events.
Information security
fromThe Drum
1 week ago

Ad of the Day: Bitdefender turns AI into weapon against scams

Bitdefender uses generative AI to demonstrate how scammers hijack trust and emotions, reframing scams as psychological warfare and reducing victim-blaming.
fromTechCrunch
1 week ago

A breach every month raises doubts about South Korea's digital defenses | TechCrunch

The government's approach to cybersecurity remains largely reactive, treating it as a crisis management issue rather than as critical national infrastructure," Brian Pak, the chief executive of Seoul-based cybersecurity firm Theori, told TechCrunch. Pak, who also serves as an advisor to SK Telecom's parent company's special committee on cybersecurity innovations, told TechCrunch that because government agencies tasked with cybersecurity work in silos, developing digital defenses and training skilled workers often get overlooked.
Information security
fromSecurityWeek
1 week ago

Oneleet Raises $33 Million for Security Compliance Platform

The solution combines attack surface management with code scanning, identifying forgotten assets and exposed services and uncovering vulnerabilities before they enter production. The company also offers penetration testing and helps organizations prepare for audits. Oneleet says its solution works with existing stacks, allowing businesses to connect cloud providers, repositories, identity platforms, and productivity utilities with its scanners and monitoring tools, for automated security.
Venture
Information security
fromIT Pro
1 week ago

Middlesbrough Council boosts cybersecurity spending, strategy in response to repeated cyber attacks

Middlesbrough Council is investing about £25,000 in a 12-month cybersecurity service amid a year-long security overhaul following disruptive DDoS attacks and resilience testing.
fromSecurityWeek
1 week ago

MokN Raises $3 Million for Phish-Back Solution

French cybersecurity startup MokN today announced raising €2.6 million (~$3 million) for its deception-based identity protection solution. The investment round was led by Moonfire, with additional support from OVNI Capital, Kima Ventures, and several angel investors. Founded in 2023, Paris-based MokN was launched last year fully bootstrapped and is already used by over 20 enterprises, including top French businesses.
Information security
fromTechCrunch
1 week ago

Oneleet raises $33M to shake up the world of security compliance | TechCrunch

Bryan Onel's father was a locksmith. As for Onel, he described himself as the digital equivalent. Ethical hacking was Onel's hobby growing up. He studied AI at university and then turned that hacking hobby into a profession. "I spent a decade performing penetration tests for over 150 companies across all sectors," Onel tells TechCrunch, adding that he kept easily breaking into companies that had passed their security checks.
Information security
US politics
fromTheregister
1 week ago

IT modernization plans will stall during government shutdown

US government shutdown halted non-essential IT modernization, stalled infrastructure and cloud projects, left cybersecurity on skeleton crews, and will increase legacy-system costs if prolonged.
US politics
fromAbove the Law
1 week ago

Morning Docket: 10.01.25 - Above the Law

U.S. legal, regulatory, and political landscape faces cybersecurity attacks, legal irregularities, expanded crypto policy, major antitrust scrutiny, high-profile convictions, and rollback of tribal sovereignty guidance.
#critical-infrastructure
fromSecurityWeek
1 week ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

fromSecurityWeek
1 week ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

Artificial intelligence
fromThe Motley Fool
1 week ago

3 of the Best AI Stocks to Buy in October | The Motley Fool

AI adoption is moving from experiments to real deployments, creating strong investment opportunities for companies with government contracts and cybersecurity capabilities.
Information security
fromTechzine Global
1 week ago

Databricks launches Data Intelligence for Cybersecurity

Databricks offers a unified lakehouse-based Data Intelligence for Cybersecurity platform to consolidate fragmented security data and enable AI agents with improved visibility and faster detection.
Education
fromTheregister
1 week ago

Schools are studying cybersecurity yet still flunk recovery

Cyberattacks increasingly delay school network recovery, causing permanent coursework loss despite rising teacher cybersecurity training.
Information security
fromDataBreaches.Net
1 week ago

Georgia Tech Research Corporation Agrees to Pay $875,000 to Resolve Civil Cyber-Fraud Litigation - DataBreaches.Net

Georgia Tech Research Corporation agreed to pay $875,000 over allegations of failing required DoD cybersecurity controls in Air Force and DARPA contracts.
fromNextgov.com
1 week ago

A shutdown will slow tech modernization, experts warn

A potential shutdown could stall modernization efforts if lawmakers and the White House aren't able to reach a deal to avert a funding lapse by Tuesday at midnight, former tech leaders and experts have told Nextgov/FCW. Even planning for a potential shutdown takes time and attention away from normal work in government technology shops, they say. "You have to divert what you were doing on the day-to-day to shut down," one former federal agency CIO, not authorized to speak on the record, told Nextgov/FCW. "Shutdown planning consumes all of your time. It does take a lot to shut the government down."
US politics
fromTechCrunch
1 week ago

A breach every month raises doubts about South Korea's digital defenses | TechCrunch

With no clear government agency acting as 'first responder' following a cyberattack, the country's cyber defenses are struggling to keep pace with its digital ambitions. "The government's approach to cybersecurity remains largely reactive, treating it as a crisis management issue rather than as critical national infrastructure," Brian Pak, the chief executive of Seoul-based cybersecurity firm Theori, told TechCrunch.
Information security
Artificial intelligence
fromZDNET
1 week ago

43% of workers say they've shared sensitive info with AI - including financial and client data

Many people use generative AI daily without employer training, increasing data security and privacy risks including sharing sensitive documents via chatbots.
Information security
fromAbove the Law
1 week ago

When Ransomware Meets AI: The Next Frontier Of Cyber Extortion - Above the Law

Generative AI dramatically lowers the technical barrier to ransomware, creating fast, automated attacks that pose legal, operational, and reputational threats to law firms and clients.
UK politics
fromComputerWeekly.com
1 week ago

MPs press outsourcer TCS over Jaguar cyber attack | Computer Weekly

Tata Consultancy Services is being investigated by UK authorities over alleged links to cyberattacks that disrupted Jaguar Land Rover production and affected other firms.
fromFuturism
1 week ago

Professor Warns Society Is Veering Toward a Digital Apocalypse

Curran's argument is that as we become more and more connected, we increase our collective vulnerability to mass-scale breakdowns and manipulation. While he certainly isn't the first to point out that our increasingly digital lives come at a cost, the scholar warn s that it will take a "systemic digital crisis" before anything changes. As Curran puts it: "there are good reasons to believe that little will be done about these risks until a massive society-wide crisis emerges."
Digital life
Information security
fromSecurityWeek
1 week ago

Call for Presentations Open for 2025 CISO Forum Virtual Summit

SecurityWeek's 2025 CISO Forum Virtual Summit invites vendor-neutral virtual presentation submissions through Oct 10, 2025; presenters must meet technical and neutrality requirements.
Artificial intelligence
fromNextgov.com
1 week ago

Military AI needs guardrails-not to slow it down, but to keep it useful

The military must adapt and embed context-appropriate AI guardrails to prevent external and insider misuse while allowing necessary lethality and rapid R&D.
fromIT Pro
1 week ago

Organizations around the world are unprepared for the threat from bad bots - and UK businesses are some of the worst performers

The UK is one of the world's worst performers when it comes to protecting against bots - though most countries are pretty poor. That's according to DataDome, which states that only 1.8% of large UK domains are fully protected against bots, compared with a Europe-wide average of 2.5% and a global average of 2.8%. Bigger organizations are no better than smaller ones, with only 2% of domains with more than 30 million monthly visits fully protected.
Information security
Information security
fromSecurityWeek
1 week ago

CISO Conversations: John 'Four' Flynn, VP of Security at Google DeepMind

John Flynn's early computer obsession and experiences growing up in violent locations directed him toward cybersecurity and led to a master's in computer science.
Artificial intelligence
fromBusiness Matters
1 week ago

Artificial Intelligence, real change: How small businesses can harness AI for growth

UK SMEs are increasingly adopting AI through existing software subscriptions, boosting productivity and cybersecurity while requiring human oversight and internal audits.
fromwww.bbc.com
1 week ago

Why burnout is a growing problem in cybersecurity

"Many of us in cyber, we put our hearts into our job. There's a lot of passion involved." He had found it progressively harder to sleep, and to go into the office. Tony, who did not want his real name used, recalls the Wannacry ransomware attack in 2017. "It was a Friday and something came up on BBC News." The security team got on a call that evening and the decision was taken to remove every single device from the network.
Information security
fromNextgov.com
1 week ago

'Widespread' breach let hackers steal employee data from FEMA and CBP

A "widespread cybersecurity incident" at the Federal Emergency Management Agency allowed hackers to make off with employee data from both the disaster management office and U.S. Customs and Border Protection, according to a screenshot of an incident overview presentation obtained by Nextgov/FCW. The hack is also suspected to have later triggered the dismissal of two dozen Federal Emergency Management Agency technology employees announced late last month, according to internal meeting notes and a person familiar with the matter.
Information security
Business
from24/7 Wall St.
2 weeks ago

This Could Be Jim Cramer's Biggest Winner Yet (And It's Not Nvidia)!

CrowdStrike could potentially deliver greater long-term returns than Nvidia due to strong cybersecurity demand and recent significant stock momentum.
Artificial intelligence
fromBusiness Insider
2 weeks ago

Anthropic unveils latest AI model, aiming to extend its lead in coding intelligence

Claude Sonnet 4.5 advances AI coding with state-of-the-art software engineering performance, prolonged autonomous operation, and tools for building context-aware, production-ready agents.
Digital life
fromLondon On The Inside
2 weeks ago

Everyday Security Threats in the Changing Face of Online Life

Growing online connectivity increases convenience while expanding evolving cyber threats that demand greater awareness, smarter defensive strategies, and informed choices by users and communities.
Information security
fromFortune
2 weeks ago

Cybersecurity professionals under pressure turn to AI amid rising threats | Fortune

Cybersecurity teams face rising stress, understaffing, and eroding incident-response confidence as increasingly complex, frequent cyberattacks drive attrition and underreporting concerns.
UK politics
fromSecurityWeek
2 weeks ago

Cyberattack on JLR Prompts 1.5 Billion UK Government Intervention

The UK government provided a £1.5 billion loan guarantee to Jaguar Land Rover to protect its supply chain after a disruptive cyberattack.
Careers
fromComputerWeekly.com
2 weeks ago

Technology professionals may be finding it harder to move jobs but there are still opportunities o | Computer Weekly

Tech recruitment tightened, but specialists—especially in software development, big data, cybersecurity, and AI—remain in demand; candidates should specialise, demonstrate longevity, and tailor applications.
fromSecurityWeek
2 weeks ago

SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding

Monsegur is well known as the reformed blackhat hacker called Sabu, who originally helped develop, and was the de facto leader of, the hacker group LulzSec - before becoming an informant and helping the FBI dismantle it. LulzSec famously targeted major organizations including Sony, the FBI affiliate InfraGard, and various government websites. The FBI operation resulted in several arrests in both the US and UK.
Fundraising
fromSecurityWeek
2 weeks ago

Dutch Teens Arrested for Allegedly Helping Russian Hackers

Two teenage boys were arrested in the Netherlands over suspicions of spying for pro-Russian hackers, Dutch authorities announced. The two 17-year-old boys were allegedly approached by the hackers on Telegram, a messaging application popular among cybercriminals and state-sponsored threat actors. According to local media, one of the boys was allegedly seen walking by Europol and Eurojust headquarters, and the Canadian embassy, while carrying a Wi-Fi sniffer, which is used to map Wi-Fi networks and intercept data.
Miscellaneous
[ Load more ]