#cybersecurity

[ follow ]
#data-breach
fromDataBreaches.Net
5 days ago
Information security

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

fromTechCrunch
1 week ago
Information security

Data breach at fintech giant Figure affects close to a million customers | TechCrunch

fromDataBreaches.Net
5 days ago
Information security

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

fromTechCrunch
1 week ago
Information security

Data breach at fintech giant Figure affects close to a million customers | TechCrunch

fromTechCrunch
7 hours ago

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

Peter Williams, a former executive at U.S. defense contractor L3Harris, was sentenced on Tuesday to 87 months in prison for leaking his former company's trade secrets in exchange for $1.3 million in crypto between 2022 and 2025. Williams sold the exploits to Operation Zero, which the U.S. government calls 'one of the world's most nefarious exploit brokers.'
Information security
Information security
from24/7 Wall St.
8 hours ago

Fortinet Is Down 28% YTD, But Its Free Cash Flow Just Hit a Record $2.21 Billion

Fortinet demonstrates strong financial fundamentals with record free cash flow of $2.21 billion and 16% billings growth, while Sovereign SASE technology positions the company for significant market expansion despite recent stock decline.
#agentic-ai
fromSecurityWeek
2 weeks ago
Artificial intelligence

Airrived Emerges From Stealth With $6.1 Million in Funding

Airrived built an Agentic OS that unifies cybersecurity, IT, and business operations using agentic AI to enable autonomous reasoning, orchestration, and enterprise-scale governance.
fromBusiness Matters
3 weeks ago
Artificial intelligence

House of Lords AI summit urges agentic AI to 'rejuvenate' UK economy

Wider use of agentic AI can boost UK economic growth and SME productivity if paired with skills development and strong cybersecurity safeguards.
fromNieman Lab
11 hours ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
Information security
fromFortune
12 hours ago

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

Only 34% of organizations know where their data resides, creating critical security vulnerabilities as AI systems gain broad access to enterprise networks without adequate controls.
from24/7 Wall St.
17 hours ago

PANW Is Down 19% But Its AI Security Bet May Change That

Headline numbers were solid: revenue grew 15% year-over-year to $2.59 billion, adjusted EPS of $1.03 beat expectations, and next-generation security ARR jumped 33% to $6.33 billion. But management trimmed its full-year profit outlook due to acquisition costs, and Q3 EPS guidance missed expectations, sending shares down 5-7% in after-hours trading.
Information security
Information security
fromThe Hacker News
18 hours ago

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

An L3Harris defense contractor employee sold eight zero-day exploits to Russian broker Operation Zero for millions in cryptocurrency, receiving a seven-year prison sentence for theft of trade secrets.
fromFuturism
3 days ago

AI Is Destroying Grocery Supply Chains

Whole Foods shelves sit empty after a data breach shut down its wholesale distributor. Meat packers working for JBS Foods are paralyzed as an $11 million ransomware attack takes out their processing facilities. Some 2.2 million workers at Stop & Shop and Hannaford have their personal data exposed as the result of a cyberattack on parent company Ahold Delhaize USA. These scenarios, straight from a William Gibson novel, are becoming increasingly common in supply chains across the world.
Food & drink
Information security
fromDataBreaches.Net
4 days ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
Information security
fromSecurityWeek
5 days ago

Chip Testing Giant Advantest Hit by Ransomware

Advantest detected a February 15 ransomware intrusion that may have affected parts of its network; investigation is ongoing and potential data impact is under review.
US politics
fromTheregister
6 days ago

GAO urges NSF CIO to fix cloud SLAs, tighten IT oversight

NSF must improve IT planning, cloud procurement and SLAs, complete annual IT portfolio reviews, overhaul cloud contracts, and address open cybersecurity recommendations.
#tp-link
Artificial intelligence
fromFortune
6 days ago

'I'm deeply uncomfortable': Anthropic CEO warns that a cadre of AI leaders, including himself, should not be in charge of the technology's future | Fortune

Anthropic's CEO advocates stronger AI regulation, transparency, and broader oversight rather than leaving safety decisions to a few tech leaders.
fromBusiness Matters
1 week ago

The Digital Balancing Act: How Growing Businesses Can Move Faster Without Sacrificing Security

Because of this massive shift, the pressure on business owners has never been higher. Consumers today have zero patience. If your mobile application is slow, or if your website lacks the features they want, they will instantly move to a competitor. To survive and grow, a modern business must be able to create and update its digital tools incredibly fast. However, rushing to build technology introduces a terrible risk: you might accidentally leave your digital doors wide open to criminals.
Software development
Information security
fromFast Company
6 days ago

Google's threat intel chief explains why AI is now both the weapon and the target

Generative AI systems are becoming core infrastructure and simultaneously increasing cyber risk as models become high-value targets susceptible to model-extraction and AI-enabled attacks.
Information security
fromDataBreaches.Net
6 days ago

Data Protection Failures on Moldovan Portals Leave Citizens at Risk - DataBreaches.Net

Moldova's government job portal exposed thousands of applicants' personal records for years through an unauthenticated, URL-indexed repository requiring only simple URL manipulation.
#ddos-attack
fromNextgov.com
1 week ago

FAA launches competition to modernize aging IT portfolio

In an effort to transform this portfolio, the agency is launching a challenge to gather ideas from industry on how to move these old systems to cloud-native architectures and reduce its technical debt. According to a Tuesday notice on Sam.gov, the agency is forgoing a traditional acquisition in favor of a challenge-based approach. The multi-phase competition will allow the FAA to watch vendors perform, not just pitch.
Science
#substack
Information security
from24/7 Wall St.
1 week ago

Why Palo Alto Networks (PANW) Is Really Down 6.5% This Morning

Palo Alto Networks reported solid Q2 results, but weak Q3 profit guidance and acquisition-related integration costs triggered a sharp share price decline.
fromTheregister
1 week ago

German train line back on track after DDoS yanks the brakes

"Deutsche Bahn has been and continues to be subject to attacks on its IT systems," the company said in an update posted hours after the initial service restoration. "The current attack is specifically targeted at DB and has occurred in waves. "The scale of the attack is considerable. Our defense mechanisms are working. We will not comment on speculation regarding the background of the attack."
Germany news
Information security
fromThe Local Germany
1 week ago

Deutsche Bahn's app and website hit by 'considerable' cyberattack

A sustained DDoS cyberattack is disrupting Deutsche Bahn's ticketing systems and timetable services, intermittently affecting bookings and customer access.
fromAol
1 week ago

10 Work-From-Home Jobs That Pay at Least $110,000 a Year

Data scientists pore over data to tease out key insights. For example, they may gather data from a survey or by scraping the internet. They then develop algorithms and models to analyze data, helping their organizations craft effective business strategies. A bachelor's degree in mathematics, statistics or computer science is often required for this role. As with many tech jobs, data scientists can work from almost anywhere, including home.
Careers
Information security
fromTechzine Global
1 week ago

Palo Alto lowers profit forecast after CyberArk deal

Palo Alto Networks has acquired multiple security firms and is integrating them, increasing costs and lowering profit guidance despite higher revenue forecasts.
Information security
fromThe Hacker News
1 week ago

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

Cybersecurity must be structural reinforcement ensuring operational continuity, visibility, and controlled adaptation amid continuous AI-driven threats, regulatory constraints, and geopolitical pressure.
Miscellaneous
fromLondon Business News | Londonlovesbusiness.com
1 week ago

UK security services are hunting Russian agents on home soil - London Business News | Londonlovesbusiness.com

Britain's intelligence agencies actively dismantle Russian spy networks, intercept communications, disrupt cyberattacks, expel operatives, and protect dissidents through coordinated counterintelligence operations.
#ai
fromZDNET
1 week ago
Artificial intelligence

What Aristotle and Socrates can teach us about using generative AI

fromZDNET
1 week ago
Artificial intelligence

What Aristotle and Socrates can teach us about using generative AI

#openclaw
fromWIRED
1 week ago
Artificial intelligence

Meta and Other Tech Companies Ban OpenClaw Over Cybersecurity Concerns

fromAxios
3 weeks ago
Information security

Moltbook shows rapid demand for AI agents. The security world isn't ready.

fromWIRED
1 week ago
Artificial intelligence

Meta and Other Tech Companies Ban OpenClaw Over Cybersecurity Concerns

fromAxios
3 weeks ago
Information security

Moltbook shows rapid demand for AI agents. The security world isn't ready.

#quantum-computing
UK news
fromComputerWeekly.com
1 week ago

Businesses may be caught by government proposals to restrict VPN use | Computer Weekly

Limiting VPN use to under-16s risks disrupting legitimate business operations and weakening privacy and cybersecurity protections without clear carve-outs or implementation details.
Information security
fromBusiness Matters
1 week ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
fromDataBreaches.Net
1 week ago

Montana hospital restores phones as cyber-related network disruptions persist - DataBreaches.Net

Livingston HealthCare in Livingston, Montana, says its phone system has been restored after a cybersecurity incident disrupted communications and led the hospital to take some systems offline, but network disruptions continue as restoration work proceeds. The nonprofit hospital said Feb. 13 that a "potential cybersecurity incident" disrupted its phone systems and network and that it temporarily took certain systems offline "out of an abundance of caution" while it assessed the situation and worked with outside experts.
Healthcare
EU data protection
fromThe Hacker News
1 week ago

Safe and Inclusive ESociety: How Lithuania Is Bracing for AIDriven Cyber Fraud

Lithuania strengthens cyber resilience through a government-funded initiative coordinating universities and companies to deploy secure, market-ready digital solutions protecting citizens and critical infrastructure.
fromSecuritymagazine
1 week ago

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Organizations traditionally approach security risk through a narrow lens, often equating "security" primarily with cybersecurity. While cybersecurity is critically important, it represents only one subset of a much broader security landscape. Cybersecurity focuses on the protection of technologies that collect, store, process and transmit data. By contrast, security-related risk encompasses all forms of loss arising from the failure to protect organizational assets.
Information security
Privacy professionals
fromDataBreaches.Net
1 week ago

Nevada unveils new statewide data classification policy months after cyberattack - DataBreaches.Net

Nevada implemented a four-tier data classification policy requiring agencies to categorize data as public, sensitive, confidential, or restricted, defaulting to the stricter classification if unclear.
fromTNW | Eu
1 week ago

Munich 2026: A security conference where tech isn't an afterthought

The 62nd Munich Security Conference opened on 13 February 2026 in Munich, Germany, and this year's gathering feels different from past editions. For decades, Munich was about jets, troops, and treaties. Today, cyber and AI are no longer peripheral; they are part of the architecture of security itself. Cyber risks, digital infrastructure, and emerging technologies like AI now sit alongside tanks and treaties on the agenda as European leaders try to make sense of a world where digital threats and geopolitical tensions are deeply intertwined.
Miscellaneous
fromNextgov.com
1 week ago

CISA to furlough most of its workforce under impending DHS shutdown

A likely partial government shutdown after Friday would impair the Cybersecurity and Infrastructure Security Agency's operations, leading to diminished capabilities in critical areas including cyber response, security assessments, stakeholder engagements, training exercises and special event planning, a top official said this week. CISA would furlough a majority of its workforce and just one-third would remain on the job under shutdown conditions, agency acting director Madhu Gottumukkala told House appropriators on Wednesday.
US politics
Software development
fromwww.bbc.com
1 week ago

AI coding platform's flaws allow BBC reporter to be hacked

Orchids, a popular AI coding platform, has a significant unpatched vulnerability that allowed remote code modification and access to users' computers.
fromTheregister
1 week ago

Google: China's APT31 used Gemini to plan US cyberattacks

A Chinese government hacking group that has been sanctioned for targeting America's critical infrastructure used Google's AI chatbot, Gemini, to auto-analyze vulnerabilities and plan cyberattacks against US organizations, the company says. While there's no indication that any of these attacks were successful, "APT groups like this continue to experiment with adopting AI to support semi-autonomous offensive operations," Google Threat Intelligence Group chief analyst John Hultquist told The Register. "We anticipate that China-based actors in particular will continue to build agentic approaches for cyber offensive scale."
Information security
Information security
fromSecurityWeek
2 weeks ago

Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack

Nevada implemented a four-tier data classification policy—public, sensitive, confidential, restricted—to standardize state data privacy and assign agencies responsibility for classification and compliance.
Information security
fromTechCrunch
2 weeks ago

DOJ says Trenchant boss sold exploits to Russian broker capable of accessing 'millions of computers and devices' | TechCrunch

A former Trenchant executive stole and sold eight hacking tools enabling potential global surveillance and cyberattacks, pleaded guilty, and faces prison, fines, and restitution.
Information security
from24/7 Wall St.
2 weeks ago

Surviving the SaaS-pocalypse: JPMorgan's 3 Top Cyber Stocks Ready to Surge

AI-enabled plug-ins triggered a near-$1 trillion SaaS sell-off before fears eased, while CrowdStrike’s AI-native Falcon platform positions it for sustained growth.
fromDigiday
2 weeks ago

In Graphic Detail: AI licensing deals, protection measures aren't slowing web scraping

New data is reinforcing a structural shift in how AI systems access publisher content: AI models are increasingly scraping publisher content, regardless of bot-blocking measures or content licensing deals meant to control usage, improve attribution or drive referral traffic. New research from analytics firms and bot-tracking companies shows AI tools are increasingly crawling publisher sites as inputs for AI-generated summaries and training, while sending back only limited referral traffic.
Artificial intelligence
World news
fromThe Hacker News
2 weeks ago

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

North Korean operatives use stolen LinkedIn identities and verified workplace credentials to secure remote jobs for espionage, revenue generation, and data theft.
Venture
fromSecurityWeek
2 weeks ago

Vega Raises $120M in Series B Funding to Grow Security Analytics Platform

Vega raised $120 million Series B (total $185M), offering an AI-driven alternative to SIEM that reduces data centralization and secures large enterprise contracts.
Artificial intelligence
fromHarvard Gazette
2 weeks ago

Worried about how AI may affect foreign policy? You should be. - Harvard Gazette

Governments adopting AI face significant cybersecurity vulnerabilities and require oversight, regulation, and international cooperation to balance benefits and prevent misuse.
UK news
fromwww.independent.co.uk
2 weeks ago

Afghan data breach was wake-up call' for government's data security

Government data handling changed significantly after an Afghan breach exposed thousands' details, and a national news outlet stresses free, on-the-ground journalism funded by donations.
Information security
fromSecurityWeek
2 weeks ago

RSAC Releases Quantickle Open Source Threat Intelligence Visualization Tool

Quantickle is an open-source, browser-based network graph visualization tool for manual threat analysis, offering customizable visualizations, imports/exports, and REST API integrations.
Business
fromBusiness Insider
2 weeks ago

Salesforce is replacing 5 high-profile leaders who have left since December with 6 new execs

Salesforce appointed six new leaders and promoted internal executives to fill departing roles, reallocating responsibilities across security, marketing, architecture, Slack, and AI services.
Information security
fromComputerWeekly.com
2 weeks ago

Russia's cyber attacks on Polish utilities draws NCSC alert | Computer Weekly

Russian state cyber actors attacked Poland's electricity grid, prompting NCSC to warn UK utilities to strengthen cyber defenses and resilience.
New York City
fromAlleywatch
2 weeks ago

#NYCtech Week in Review: 2/1/26 - 2/7/26

Multiple NYC startups raised significant funding this week, including Osmo $70M, Alaffia Health $55M, ORION Security $32M, Orchard $30M, and Daytona $24M.
Information security
fromSecurityWeek
2 weeks ago

Outtake Raises $40 Million to Bolster Digital Trust Against AI-Driven Threats

Outtake raised $40M to build a unified, agentic-AI platform for maintaining digital trust and defending against AI-driven phishing, impersonation, and other modern threats.
Information security
fromBusiness Insider
2 weeks ago

Lema, founded by former members of Israel's elite 8200 intelligence unit, is coming out of stealth

Lema focuses on reducing third-party vendor risk to company systems and raised a $24 million Series A led by Team8.
Information security
fromThe Cipher Brief
2 weeks ago

The Former Head of NSA on the Future of U.S. Cybersecurity

General Nakasone continues leading cybersecurity initiatives at Vanderbilt, advises tech companies, and stresses persistent engagement and election security to prevent foreign influence.
Information security
fromSecuritymagazine
2 weeks ago

Product Spotlight on Analytics

Taelor Sutherland is Associate Editor at Security magazine covering enterprise security, coordinating digital content, and holding a BA in English Literature from Agnes Scott College.
UK news
fromwww.theguardian.com
2 weeks ago

I fell into it': ex-criminal hackers urge Manchester pupils to use web skills for good

Former hackers warn that cybercrime is petty, dangerous, and destructive, and urge talented teenagers to apply gaming and coding skills to lawful cybersecurity work.
Artificial intelligence
fromsfist.com
2 weeks ago

Some Waymo Robotaxis Get Assistance from Remote Workers in the Philippines When Stuck

Waymo uses remote workers, including in the Philippines, to provide guidance to robotaxis during difficult situations, raising safety, cybersecurity, and job-displacement concerns.
Artificial intelligence
fromFuturism
2 weeks ago

It Turns Out Waymos Are Being Controlled by Workers in the Philippines

Waymo uses overseas human operators (including in the Philippines) to provide guidance to self-driving vehicles, raising safety and cybersecurity concerns after a recent robotaxi incident.
Artificial intelligence
fromTNW | Events
2 weeks ago

TechEx Global returns to London with enterprise technology and AI execution

AI is shifting from providing answers to executing tasks autonomously in enterprises, with practical deployments, governance focus, and integration alongside cybersecurity and edge computing.
Information security
fromSecuritymagazine
3 weeks ago

How to Protect Organizations During the Winter Olympics, According to CISOs

Cybercriminals will exploit the Winter Olympics via phishing, impersonation, API misuse, compromised credentials, and trusted-access abuse while security teams prioritize availability.
Miscellaneous
fromSecurityWeek
2 weeks ago

Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says

Italy foiled Russian-origin cyberattacks against foreign ministry sites, Winter Olympics websites, and Cortina hotels while deploying 6,000 security officers for the Games.
World news
fromTheregister
2 weeks ago

'Russian origin' cyberattacks target Italy's Winter Olympics

Italy prevented Russian-origin cyberattacks targeting government foreign offices and Milano Cortina Winter Olympics sites, including hotels in Cortina.
Information security
fromZDNET
2 weeks ago

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Kali Linux and Parrot OS are free, Debian-based distributions focused on penetration testing; Parrot OS also offers a general-purpose edition.
fromBusiness Matters
3 weeks ago

Bobby Acri: What Threat Detection Looks Like in a Large Organisation

Born on 17 May 1991 at Evanston Hospital, Bobby grew up on Chicago's North Shore. He attended Hubbard Woods Elementary, Washburne Middle School, and New Trier Township High School. Early on, he gravitated towards how systems behave under pressure, not just how they look when everything is running smoothly. He built that mindset through computer science coursework, networking classes, and hands-on tech support for school events.
Information security
#microsoft
fromBusiness Insider
3 weeks ago
Tech industry

Microsoft hired a Google exec to replace security boss Charlie Bell, who is moving to a new IC role, internal memo shows

fromBusiness Insider
3 weeks ago
Tech industry

Microsoft hired a Google exec to replace security boss Charlie Bell, who is moving to a new IC role, internal memo shows

Miscellaneous
fromTheregister
3 weeks ago

Estonia tests Euro alternatives amid Microsoft rollout

Estonia trials European software alternatives while continuing Microsoft cloud migration to reduce dependence and prepare for possible EU restrictions or costs.
Venture
fromAlleywatch
3 weeks ago

The AlleyWatch Startup Daily Funding Report: 2/3/2026

Several NYC startups secured new funding: Alaffia Health $55M Series B, ORION Security $32M Series A, and Arbor $6.3M Seed.
fromTelecompetitor
3 weeks ago

AI adoption among telcos may taper off in 2026: Report

STL Partners predicts one AI-related growth area among telcos but warns of a slower adoption or pullbacks in three others. First, the AI optimism: Telcos will increasingly adopt voice-based AI, analysts believe. Already, some of the biggest global telcos are using embedded voice assistance in AI channels for enterprise customers. In 2026, telcos are likely to adopt voice technologies for customer calls as well. Immediate benefits could include live translation and integration of digital assistance services.
Artificial intelligence
Brooklyn
fromBrooklyn Eagle
3 weeks ago

Phone pickpockets hit Brooklyn concerts as cities worldwide report surge in phone thefts

Phone thefts at Brooklyn concert venues have surged, with stolen devices often resold internationally—especially to China—creating high financial value and severe security risks.
Artificial intelligence
fromArs Technica
3 weeks ago

The rise of Moltbook suggests viral AI prompts may be the next big security threat

Self-replicating prompts ("prompt worms") can propagate across networks of AI agents by exploiting their instruction-following behavior, risking rapid, widespread disruption similar to historical worms.
Information security
fromSecuritymagazine
3 weeks ago

How Banks Can Protect Their Most Valuable Asset: Customers

Banks must secure money, property, data, and reputation because incidents—crime, insider misuse, fraud, or IT failures—threaten safety, customer trust, regulatory standing, and brand.
Artificial intelligence
fromFortune
3 weeks ago

Meet Matt Schlicht, the man behind AI's latest Pandora's Box moment-a social network where AI agents talk to each other | Fortune

A public, chatbot-only platform called Moltbook exposed thousands of open-source AI agents, revealing capabilities, openness, and significant cyber-risk concerns.
Gadgets
fromwww.theguardian.com
3 weeks ago

Sure enough, it's gone': Brooklyn venues targeted for mass phone thefts during concerts

Phone thefts at concerts in New York have increased, targeting attendees (especially at metal and EDM shows) because U.S. iPhones fetch high prices abroad.
#ai-adoption
fromTNW | Eu
3 weeks ago

Europe's not-so-dry January: Unicorns and a new tech identity

Every January, millions take on Dry January , a ritual of restraint and resetting after the holiday season. If that's the benchmark for kicking off the year with moderation, Europe's startup ecosystem clearly didn't get the memo. In the opening weeks of 2026, the region saw five startups join the unicorn club, crossing the $1 billion valuation mark across sectors as varied as cybersecurity, cloud optimisation, defence tech, ESG software, and education technology.
Startup companies
fromSecurityWeek
3 weeks ago

Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China's Influence Grows

Japan and Britain agreed Saturday to accelerate cooperation on cybersecurity and the supply of critical minerals, as China's influence grows in the region. British Prime Minister Keir Starmer said his visit to Japan comes at a time "when geopolitical, economic and technological shocks are literally shaking the world." Starmer's overnight Tokyo visit comes on the heels of his trip to Beijing, where he and Chinese President Xi Jinping agreed to seek a long-term, stable "strategic partnership."
World news
[ Load more ]