Cybersecurity and other IT news aggregator

LATEST FEEDS

  • Zohran Mamdani taps Big Tech antagonist Lina Khan as co-chair of mayoral transition team

    Zohran Mamdani taps Big Tech antagonist Lina Khan as co-chair of mayoral transition team 2025-11-06 at 03:23 By Thomas Barrabi Mayor-elect Zohran Mamdani has picked former Federal Trade Commission chair Lina Khan to serve as co-chair of his transition team. This article is an excerpt from Latest Technology News | New York Post View Original…


  • Sony rolls out a standard way to measure bias in how AI describes what it ‘sees’

    Sony rolls out a standard way to measure bias in how AI describes what it ‘sees’ 2025-11-06 at 03:23 By Thomas Claburn Images in the test dataset were all sourced with consent AI models are filled to the brim with bias, whether that’s showing you a certain race of person when you ask for a…


  • Gorge on Microsoft Store apps with 16-at-once installer

    Gorge on Microsoft Store apps with 16-at-once installer 2025-11-06 at 03:23 By Avram Piltch For now it works only with the web version of the Microsoft Store hands on  Normally, when you install an application in Windows, it comes either from a direct download or as a single choice from the Microsoft Store. But what…


  • Microsoft apologizes for not explaining cheaper no-AI M365 plans, and all it took was a government lawsuit

    Microsoft apologizes for not explaining cheaper no-AI M365 plans, and all it took was a government lawsuit 2025-11-06 at 02:51 By Simon Sharwood Even offers refunds if users sign up for AI they don’t want Microsoft Australia has apologized to users of its M365 suite after regulators accused it of steering them towards pricey bundles…


  • Perplexity shows how to run monster AI models more efficiently on aging GPUs, AWS networks

    Perplexity shows how to run monster AI models more efficiently on aging GPUs, AWS networks 2025-11-06 at 01:47 By Tobias Mann Some clever networking hacks open the door AI search provider Perplexity’s research wing has developed a new set of software optimizations that allows for trillion parameter or large models to run efficiently across older,…


  • Azure stumbles in Western Europe, Microsoft blames ‘thermal event’

    Azure stumbles in Western Europe, Microsoft blames ‘thermal event’ 2025-11-06 at 01:09 By Simon Sharwood Degraded performance and possible dependency problems across AZs Microsoft has warned of a “thermal event” impacting Azure users in its West Europe region, and perhaps elsewhere.… This article is an excerpt from The Register View Original Source React to this…


  • ‘Tutors’ at Musk startup xAI had to give up rights to faces, voices to train sexy AI bots: report

    ‘Tutors’ at Musk startup xAI had to give up rights to faces, voices to train sexy AI bots: report 2025-11-06 at 00:53 By Ariel Zilber Most of those affected were so-called “AI tutors,” staff who refine the large language models that power xAI’s flagship chatbot, Grok. This article is an excerpt from Latest Technology News…


  • NYC tech workers celebrate Mamdani’s mayoral win — but their bosses are worried

    NYC tech workers celebrate Mamdani’s mayoral win — but their bosses are worried 2025-11-06 at 00:08 By Thomas Barrabi Zohran Mamdani won over New York City’s tech industry workers with his disruptive style on the campaign trail – but their bosses are worried about what the mayor-elect’s far-left policies will mean for their businesses. This…


  • Uncle Sam lets Google take Wiz for $32B

    Uncle Sam lets Google take Wiz for $32B 2025-11-05 at 20:54 By Brandon Vigliarolo Second time’s the charm for after Wiz rejected Google’s $23B offer last year Google’s second attempt to acquire cloud security firm Wiz is going a lot better than the first, with the Department of Justice clearing the $32 billion deal, which…


  • Google uncovers malware using LLMs to operate and evade detection

    Google uncovers malware using LLMs to operate and evade detection 2025-11-05 at 20:53 By Zeljka Zorz PromptLock, the AI-powered proof-of-concept ransomware developed by researchers at NYU Tandon and initially mistaken for an active threat by ESET, is no longer an isolated example: Google’s latest report shows attackers are now creating and deploying other malware that…


  • Oak Ridge lab bags $125M to bolt quantum onto supercomputers

    Oak Ridge lab bags $125M to bolt quantum onto supercomputers 2025-11-05 at 19:48 By Dan Robinson The DoE’s planned funding runs through 2030 America’s Oak Ridge National Laboratory will receive up to $125 million through 2030 to develop hybrid computing systems that link quantum and supercomputing technologies.… This article is an excerpt from The Register…


  • When Debian won’t do, Devuan 6 ‘Excalibur’ Linux makes the grade

    When Debian won’t do, Devuan 6 ‘Excalibur’ Linux makes the grade 2025-11-05 at 18:53 By Liam Proven Debian 13 base, minus systemd and RISC-V build Old school enough to favor Debian, but averse to systemd? Good news: Devuan 6 “Excalibur” is here, and all you need to do is draw it from the stone master…


  • AMD taking AI fight to Nvidia with Helios rack-scale system

    AMD taking AI fight to Nvidia with Helios rack-scale system 2025-11-05 at 18:53 By Dan Robinson CEO Lisa Su says next-gen MI400 GPUs and architecture gaining traction with hyperscalers AMD plans to launch its Helios rack-scale architecture in 2026 as a direct challenge to Nvidia in the AI infrastructure market, pending successful integration of its…


  • Two-fifths of SAP Americas users yet to ditch legacy ERP

    Two-fifths of SAP Americas users yet to ditch legacy ERP 2025-11-05 at 18:53 By Lindsay Clark S/4HANA migration? Many still worried about business process change Around two fifths of North America’s SAP users have yet to begin migrating to S/4HANA with just two years until mainstream support ends for legacy systems.… This article is an…


  • Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

    Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly 2025-11-05 at 18:52 By Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for…


  • M&S pegs cyberattack cleanup costs at £136M as profits slump

    M&S pegs cyberattack cleanup costs at £136M as profits slump 2025-11-05 at 17:47 By Connor Jones Retailer’s tech systems aren’t down anymore, but the same can’t be said for its rocky financials Marks & Spencer says its April cyberattack will cost around £136 million ($177.2 million) in total.… This article is an excerpt from The…


  • Securing the Open Android Ecosystem with Samsung Knox

    Securing the Open Android Ecosystem with Samsung Knox 2025-11-05 at 17:46 By Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical. However, outdated concerns can…


  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

    Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions 2025-11-05 at 17:46 By A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. “UNK_SmudgedSerpent leveraged domestic political…


  • U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud

    U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud 2025-11-05 at 17:46 By The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea’s global financial network for laundering money for various illicit schemes, including cybercrime and information technology (IT) worker fraud. “North Korean…


  • Why SOC Burnout Can Be Avoided: Practical Steps

    Why SOC Burnout Can Be Avoided: Practical Steps 2025-11-05 at 17:46 By Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that many SOCs face burnout before they face their next breach. But this doesn’t have to…


  • Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns

    Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns 2025-11-05 at 17:25 By Eduard Kovacs Google has released a report describing the novel ways in which malware has been using AI to adapt and evade detection. The post Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns…


  • AMD red-faced over random-number bug that kills cryptographic security

    AMD red-faced over random-number bug that kills cryptographic security 2025-11-05 at 17:01 By Connor Jones Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.… This article…


  • Komodor’s self-healing capabilities remediate issues with or without a human in the loop

    Komodor’s self-healing capabilities remediate issues with or without a human in the loop 2025-11-05 at 16:59 By Industry News Komodor released autonomous self-healing and cost optimization capabilities that simplify operations for SRE, DevOps, and Platform teams managing large-scale Kubernetes environments. Powered by Klaudia, purpose-built agentic AI, the Komodor platform can automatically detect, investigate, and remediate…


  • Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end

    Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end 2025-11-05 at 16:46 By Industry News Fortinet announced the Secure AI Data Center solution, an end-to-end framework purpose-built to protect AI infrastructures. Designed to secure the entire AI stack, from data center infrastructure to applications and LLMs, the solution delivers advanced AI threat defense…


  • Barracuda Assistant accelerates security operations

    Barracuda Assistant accelerates security operations 2025-11-05 at 16:19 By Industry News Barracuda Networks launched Barracuda Assistant, powered by Barracuda AI. Integrated into the BarracudaONE cybersecurity platform, Barracuda Assistant accelerates security operations to help organizations strengthen cyber resilience and drive productivity and ROI. “Cyberattacks are growing more sophisticated and relentless, and security teams are under immense…


  • Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders

    Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders 2025-11-05 at 16:07 By SecurityWeek News Get practical strategies to help minimize your risk exposure, including the need for identity threat detection and mitigation. The post Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders appeared first on SecurityWeek. This article is…


  • CleanStart SBOM Analyzer strengthens software supply chain security

    CleanStart SBOM Analyzer strengthens software supply chain security 2025-11-05 at 16:06 By Industry News CleanStart has released its SBOM Analyzer, an add-on tool that generates complete, CISA-compliant Software Bills of Materials (SBOMs) for container images. The tool deepens visibility into software components and dependencies, helping organizations secure their supply chains before deployment. Integrated directly into…


  • Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

    Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data 2025-11-05 at 16:04 By Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories and chat histories without their knowledge. The seven vulnerabilities…


  • Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes

    Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes 2025-11-05 at 16:00 By Jessica Lyons Meanwhile, others tried to social-engineer the chatbot itself Nation-state goons and cybercrime rings are experimenting with Gemini to develop a “Thinking Robot” malware module that can rewrite its own code to avoid detection,…


  • Flare Raises $30 Million for Threat Exposure Management Platform

    Flare Raises $30 Million for Threat Exposure Management Platform 2025-11-05 at 15:35 By Ionut Arghire The company plans to advance its identity exposure management capabilities and pursue M&A opportunities. The post Flare Raises $30 Million for Threat Exposure Management Platform appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React…


  • Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation

    Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation 2025-11-05 at 15:23 By Eduard Kovacs Armis recently surpassed $300 million in annual recurring revenue as it prepares for an IPO. The post Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation appeared first on SecurityWeek. This article is an…


  • Rust Foundation tries to stop maintainers corroding

    Rust Foundation tries to stop maintainers corroding 2025-11-05 at 15:20 By Richard Speed Memory safety costs money: Maintainers Fund to directly pay developers for their work The Rust Foundation has launched a Maintainers Fund to support developers sustaining the language, addressing a long-standing challenge in open source software.… This article is an excerpt from The…


  • Inside SECURITY 500: Reinventing Security Leadership

    Inside SECURITY 500: Reinventing Security Leadership 2025-11-05 at 15:00 By In this episode of Lock It Down with SecurityMagazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference. This article is an excerpt from Subscribe…


  • Malanta Emerges from Stealth With $10 Million Seed Funding

    Malanta Emerges from Stealth With $10 Million Seed Funding 2025-11-05 at 15:00 By Kevin Townsend Malanta collects and analyzes digital breadcrumbs that attackers leave behind and then forecasts how and when they will be weaponized. The post Malanta Emerges from Stealth With $10 Million Seed Funding appeared first on SecurityWeek. This article is an excerpt…


  • Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)

    Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703) 2025-11-05 at 14:59 By Zeljka Zorz On Tuesday, CISA added two vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2025-11371, which affects Gladinet’s CentreStack and Triofox file-sharing and remote access platforms, and CVE-2025-48703, a vulnerability in Control Web Panel (CWP), a web hosting control panel designed for…


  • Snowflake goes all out to woo PostgreSQL developers with lakehouse extensions

    Snowflake goes all out to woo PostgreSQL developers with lakehouse extensions 2025-11-05 at 14:13 By Lindsay Clark Buyers still struggling to differentiate data platforms in era of AI Cloud data platform vendor Snowflake has made its set of PostgreSQL extensions open source in a bid to help developers and data engineers integrate the popular open…


  • Bitcoin is infrastructure, not digital gold

    Bitcoin is infrastructure, not digital gold 2025-11-05 at 12:11 By Cointelegraph by Thomas Chen Bitcoin’s true potential lies in its infrastructure role as productive capital, not just a digital store of value like gold. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:


  • Are you a freelancer? North Korean spies may be using you

    Are you a freelancer? North Korean spies may be using you 2025-11-05 at 12:11 By Cointelegraph by Yohan Yun North Korea is recruiting freelancers as identity proxies to score remote contracts and bank accounts, according to new cyber intelligence research. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:


  • Famed software engineer DJB tries Fil-C… and likes what he sees

    Famed software engineer DJB tries Fil-C… and likes what he sees 2025-11-05 at 12:11 By Liam Proven A ‘three-letter person’ experiments with the new type-safe C, and is impressed Famed mathematician, cryptographer and coder Daniel J. Bernstein has tried out the new type-safe C/C++ compiler, and he’s given it a favorable report.… This article is…


  • UK agri dept spent hundreds of millions upgrading to Windows 10 – just in time for end of support

    UK agri dept spent hundreds of millions upgrading to Windows 10 – just in time for end of support 2025-11-05 at 12:11 By Carly Page After a £312M upgrade to the retiring OS, Defra still has 24,000 devices to replace The UK’s Department for Environment, Food & Rural Affairs (Defra) has spent £312 million (c…


  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency

    US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency 2025-11-05 at 12:11 By Associated Press The United States on Tuesday imposed sanctions on a group of bankers, financial institutions and others accused of laundering money from cyber crime schemes — money the Treasury Department says helps pay for North Korea’s nuclear weapons program. Over…


  • New ExtraHop capabilities target malicious PowerShell use across enterprise environments

    New ExtraHop capabilities target malicious PowerShell use across enterprise environments 2025-11-05 at 10:19 By Industry News ExtraHop has announced new capabilities to detect the malicious use of PowerShell. These enhancements provide the visibility needed to disrupt the attack kill chain and deliver insight to stop lateral movement in its tracks. Remote management tools like PowerShell…


  • Deepwatch NEXA platform transforms MDR collaboration with agentic AI

    Deepwatch NEXA platform transforms MDR collaboration with agentic AI 2025-11-05 at 10:19 By Industry News Deepwatch has released Deepwatch NEXA, a collaborative agentic AI ecosystem that delivers outcome-focused agents to transform how MDR providers and customers work together. NEXA combines natural language interaction with agentic AI to provide real-time visibility, context, and actionable insights across…


  • Bitcoin and Ether ETFs bleed as Solana quietly pulls in ‘curious capital’

    Bitcoin and Ether ETFs bleed as Solana quietly pulls in ‘curious capital’ 2025-11-05 at 10:08 By Cointelegraph by Amin Haqshanas Solana ETFs extended their winning streak to six days, attracting fresh inflows and “curious capital” even as Bitcoin and Ether funds faced heavy redemptions totaling nearly $800 million. This article is an excerpt from Cointelegraph.com…


  • How are you managing cloud risk?

    How are you managing cloud risk? 2025-11-05 at 10:08 By Learn why managing cloud risk demands unified visibility, continuous risk assessment, and efficient security operations. Discover how a full-featured CNAPP like Trend Vision One™ Cloud Security enables organizations to move from reactive to proactive cloud protection. This article is an excerpt from Trend Micro Research,…


  • CISA Warns of CWP Vulnerability Exploited in the Wild

    CISA Warns of CWP Vulnerability Exploited in the Wild 2025-11-05 at 10:08 By Eduard Kovacs A critical vulnerability in Control Web Panel (CWP), tracked as CVE-2025-48703, allows remote, unauthenticated command execution. The post CISA Warns of CWP Vulnerability Exploited in the Wild appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original…


  • ZEDEDA introduces Edge Kubernetes App Flows to automate edge application lifecycle

    ZEDEDA introduces Edge Kubernetes App Flows to automate edge application lifecycle 2025-11-05 at 09:21 By Industry News ZEDEDA has released a full-stack edge Kubernetes-as-a-Service solution that extends a cloud-native deployment experience to distributed edge environments. ZEDEDA Edge Kubernetes App Flows automates the edge application lifecycle, from packaging and configuration to delivery and observability, eliminating the…


  • Veeam App for Microsoft Sentinel brings backup intelligence directly into the SOC

    Veeam App for Microsoft Sentinel brings backup intelligence directly into the SOC 2025-11-05 at 09:21 By Industry News Veeam Software launched its new Veeam App for Microsoft Sentinel. The solution provides advanced integration with Veeam Data Platform and empowers organizations to detect, investigate, and respond to cyber threats and backup anomalies, delivering data resilience and…


  • Veza Access AuthZ automates identity governance

    Veza Access AuthZ automates identity governance 2025-11-05 at 09:21 By Industry News Veza announced Access AuthZ, a new product that automates how organizations grant and revoke access across enterprise systems to address the “last mile” of identity governance. Built on the power of Veza Access Graph and Access Profiles, Access AuthZ unifies access control and…


  • Crypto treasury companies accelerating market drop, professor argues

    Crypto treasury companies accelerating market drop, professor argues 2025-11-05 at 09:07 By Cointelegraph by Stephen Katte Columbia Business School adjunct professor Omid Malekan claimed there are a few crypto buying companies that tried to “create sustainable value. But I can count them on one hand.” This article is an excerpt from Cointelegraph.com News View Original…


Browse older archives

Buy Me A Coffee
Thank you for visiting!