Cybersecurity and other IT news aggregator
LATEST FEEDS
-
China uses Mars orbiter to snap interstellar comet 3I/ATLAS
China uses Mars orbiter to snap interstellar comet 3I/ATLAS 2025-11-06 at 08:37 By Simon Sharwood Middle Kingdom also postpones astronaut return mission after something hit its spaceship China has matched the European Space Agency’s feat of taking a snapshot of interstellar comet 3I/ATLAS from a Mars orbiter.… This article is an excerpt from The Register…
-
Prismatic gives AI agents the guardrails and structure they need to operate reliably in production
Prismatic gives AI agents the guardrails and structure they need to operate reliably in production 2025-11-06 at 08:37 By Industry News Prismatic announced its MCP flow server for production-ready AI integrations. The new offering enables companies to transform fragile AI toolchains into reliable, deterministic workflows that can securely power mission-critical applications. AI agents are now…
-
The Silent Insider Threat: When Employees Undermine Cybersecurity Messaging
The Silent Insider Threat: When Employees Undermine Cybersecurity Messaging 2025-11-06 at 08:37 By One of the most damaging vulnerabilities often sits inside the organization: inconsistent communication from employees. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:
-
Humans built the problem, AI just scaled it
Humans built the problem, AI just scaled it 2025-11-06 at 08:04 By Anamarija Pogorelec Information moves across cloud platforms, personal devices, and AI tools, often faster than security teams can track it. Proofpoint’s 2025 Data Security Landscape report shows that most organizations faced data loss last year, usually caused by their own people. With AI…
-
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach 2025-11-06 at 08:04 By SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. “The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access…
-
What shadow AI means for your company’s security
What shadow AI means for your company’s security 2025-11-06 at 07:45 By Help Net Security In this Help Net Security video, Peled Eldan, Head of Research at XM Cyber, explains the hidden risks of shadow AI. He describes how employees often use unapproved AI tools at work to save time or solve problems, even when…
-
Retailers are learning to say no to ransom demands
Retailers are learning to say no to ransom demands 2025-11-06 at 07:45 By Anamarija Pogorelec Ransomware remains one of the biggest operational risks for retailers, but the latest data shows a shift in how these attacks unfold. Fewer incidents now lead to data encryption, recovery costs have dropped, and businesses are bouncing back faster. Yet…
-
Qualcomm bets on inferencing in the cloud, which Arm says can’t run it all it forever
Qualcomm bets on inferencing in the cloud, which Arm says can’t run it all it forever 2025-11-06 at 06:32 By Simon Sharwood Awkward, seeing as they’re close partners Qualcomm and Arm have offered differing predictions regarding the market for inferencing silicon.… This article is an excerpt from The Register View Original Source React to this…
-
Zohran Mamdani taps Big Tech antagonist Lina Khan as co-chair of mayoral transition team
Zohran Mamdani taps Big Tech antagonist Lina Khan as co-chair of mayoral transition team 2025-11-06 at 03:23 By Thomas Barrabi Mayor-elect Zohran Mamdani has picked former Federal Trade Commission chair Lina Khan to serve as co-chair of his transition team. This article is an excerpt from Latest Technology News | New York Post View Original…
-
Sony rolls out a standard way to measure bias in how AI describes what it ‘sees’
Sony rolls out a standard way to measure bias in how AI describes what it ‘sees’ 2025-11-06 at 03:23 By Thomas Claburn Images in the test dataset were all sourced with consent AI models are filled to the brim with bias, whether that’s showing you a certain race of person when you ask for a…
-
Gorge on Microsoft Store apps with 16-at-once installer
Gorge on Microsoft Store apps with 16-at-once installer 2025-11-06 at 03:23 By Avram Piltch For now it works only with the web version of the Microsoft Store hands on Normally, when you install an application in Windows, it comes either from a direct download or as a single choice from the Microsoft Store. But what…
-
Microsoft apologizes for not explaining cheaper no-AI M365 plans, and all it took was a government lawsuit
Microsoft apologizes for not explaining cheaper no-AI M365 plans, and all it took was a government lawsuit 2025-11-06 at 02:51 By Simon Sharwood Even offers refunds if users sign up for AI they don’t want Microsoft Australia has apologized to users of its M365 suite after regulators accused it of steering them towards pricey bundles…
-
Perplexity shows how to run monster AI models more efficiently on aging GPUs, AWS networks
Perplexity shows how to run monster AI models more efficiently on aging GPUs, AWS networks 2025-11-06 at 01:47 By Tobias Mann Some clever networking hacks open the door AI search provider Perplexity’s research wing has developed a new set of software optimizations that allows for trillion parameter or large models to run efficiently across older,…
-
Azure stumbles in Western Europe, Microsoft blames ‘thermal event’
Azure stumbles in Western Europe, Microsoft blames ‘thermal event’ 2025-11-06 at 01:09 By Simon Sharwood Degraded performance and possible dependency problems across AZs Microsoft has warned of a “thermal event” impacting Azure users in its West Europe region, and perhaps elsewhere.… This article is an excerpt from The Register View Original Source React to this…
-
‘Tutors’ at Musk startup xAI had to give up rights to faces, voices to train sexy AI bots: report
‘Tutors’ at Musk startup xAI had to give up rights to faces, voices to train sexy AI bots: report 2025-11-06 at 00:53 By Ariel Zilber Most of those affected were so-called “AI tutors,” staff who refine the large language models that power xAI’s flagship chatbot, Grok. This article is an excerpt from Latest Technology News…
-
NYC tech workers celebrate Mamdani’s mayoral win — but their bosses are worried
NYC tech workers celebrate Mamdani’s mayoral win — but their bosses are worried 2025-11-06 at 00:08 By Thomas Barrabi Zohran Mamdani won over New York City’s tech industry workers with his disruptive style on the campaign trail – but their bosses are worried about what the mayor-elect’s far-left policies will mean for their businesses. This…
-
Uncle Sam lets Google take Wiz for $32B
Uncle Sam lets Google take Wiz for $32B 2025-11-05 at 20:54 By Brandon Vigliarolo Second time’s the charm for after Wiz rejected Google’s $23B offer last year Google’s second attempt to acquire cloud security firm Wiz is going a lot better than the first, with the Department of Justice clearing the $32 billion deal, which…
-
Google uncovers malware using LLMs to operate and evade detection
Google uncovers malware using LLMs to operate and evade detection 2025-11-05 at 20:53 By Zeljka Zorz PromptLock, the AI-powered proof-of-concept ransomware developed by researchers at NYU Tandon and initially mistaken for an active threat by ESET, is no longer an isolated example: Google’s latest report shows attackers are now creating and deploying other malware that…
-
Oak Ridge lab bags $125M to bolt quantum onto supercomputers
Oak Ridge lab bags $125M to bolt quantum onto supercomputers 2025-11-05 at 19:48 By Dan Robinson The DoE’s planned funding runs through 2030 America’s Oak Ridge National Laboratory will receive up to $125 million through 2030 to develop hybrid computing systems that link quantum and supercomputing technologies.… This article is an excerpt from The Register…
-
When Debian won’t do, Devuan 6 ‘Excalibur’ Linux makes the grade
When Debian won’t do, Devuan 6 ‘Excalibur’ Linux makes the grade 2025-11-05 at 18:53 By Liam Proven Debian 13 base, minus systemd and RISC-V build Old school enough to favor Debian, but averse to systemd? Good news: Devuan 6 “Excalibur” is here, and all you need to do is draw it from the stone master…
-
AMD taking AI fight to Nvidia with Helios rack-scale system
AMD taking AI fight to Nvidia with Helios rack-scale system 2025-11-05 at 18:53 By Dan Robinson CEO Lisa Su says next-gen MI400 GPUs and architecture gaining traction with hyperscalers AMD plans to launch its Helios rack-scale architecture in 2026 as a direct challenge to Nvidia in the AI infrastructure market, pending successful integration of its…
-
Two-fifths of SAP Americas users yet to ditch legacy ERP
Two-fifths of SAP Americas users yet to ditch legacy ERP 2025-11-05 at 18:53 By Lindsay Clark S/4HANA migration? Many still worried about business process change Around two fifths of North America’s SAP users have yet to begin migrating to S/4HANA with just two years until mainstream support ends for legacy systems.… This article is an…
-
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly 2025-11-05 at 18:52 By Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for…
-
M&S pegs cyberattack cleanup costs at £136M as profits slump
M&S pegs cyberattack cleanup costs at £136M as profits slump 2025-11-05 at 17:47 By Connor Jones Retailer’s tech systems aren’t down anymore, but the same can’t be said for its rocky financials Marks & Spencer says its April cyberattack will cost around £136 million ($177.2 million) in total.… This article is an excerpt from The…
-
Securing the Open Android Ecosystem with Samsung Knox
Securing the Open Android Ecosystem with Samsung Knox 2025-11-05 at 17:46 By Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical. However, outdated concerns can…
-
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions 2025-11-05 at 17:46 By A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. “UNK_SmudgedSerpent leveraged domestic political…
-
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud 2025-11-05 at 17:46 By The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea’s global financial network for laundering money for various illicit schemes, including cybercrime and information technology (IT) worker fraud. “North Korean…
-
Why SOC Burnout Can Be Avoided: Practical Steps
Why SOC Burnout Can Be Avoided: Practical Steps 2025-11-05 at 17:46 By Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that many SOCs face burnout before they face their next breach. But this doesn’t have to…
-
Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns 2025-11-05 at 17:25 By Eduard Kovacs Google has released a report describing the novel ways in which malware has been using AI to adapt and evade detection. The post Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns…
-
AMD red-faced over random-number bug that kills cryptographic security
AMD red-faced over random-number bug that kills cryptographic security 2025-11-05 at 17:01 By Connor Jones Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.… This article…
-
Komodor’s self-healing capabilities remediate issues with or without a human in the loop
Komodor’s self-healing capabilities remediate issues with or without a human in the loop 2025-11-05 at 16:59 By Industry News Komodor released autonomous self-healing and cost optimization capabilities that simplify operations for SRE, DevOps, and Platform teams managing large-scale Kubernetes environments. Powered by Klaudia, purpose-built agentic AI, the Komodor platform can automatically detect, investigate, and remediate…
-
Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end
Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end 2025-11-05 at 16:46 By Industry News Fortinet announced the Secure AI Data Center solution, an end-to-end framework purpose-built to protect AI infrastructures. Designed to secure the entire AI stack, from data center infrastructure to applications and LLMs, the solution delivers advanced AI threat defense…
-
Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders
Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders 2025-11-05 at 16:07 By SecurityWeek News Get practical strategies to help minimize your risk exposure, including the need for identity threat detection and mitigation. The post Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders appeared first on SecurityWeek. This article is…
-
CleanStart SBOM Analyzer strengthens software supply chain security
CleanStart SBOM Analyzer strengthens software supply chain security 2025-11-05 at 16:06 By Industry News CleanStart has released its SBOM Analyzer, an add-on tool that generates complete, CISA-compliant Software Bills of Materials (SBOMs) for container images. The tool deepens visibility into software components and dependencies, helping organizations secure their supply chains before deployment. Integrated directly into…
-
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data 2025-11-05 at 16:04 By Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories and chat histories without their knowledge. The seven vulnerabilities…
-
Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes
Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes 2025-11-05 at 16:00 By Jessica Lyons Meanwhile, others tried to social-engineer the chatbot itself Nation-state goons and cybercrime rings are experimenting with Gemini to develop a “Thinking Robot” malware module that can rewrite its own code to avoid detection,…
-
Flare Raises $30 Million for Threat Exposure Management Platform
Flare Raises $30 Million for Threat Exposure Management Platform 2025-11-05 at 15:35 By Ionut Arghire The company plans to advance its identity exposure management capabilities and pursue M&A opportunities. The post Flare Raises $30 Million for Threat Exposure Management Platform appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React…
-
Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation
Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation 2025-11-05 at 15:23 By Eduard Kovacs Armis recently surpassed $300 million in annual recurring revenue as it prepares for an IPO. The post Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation appeared first on SecurityWeek. This article is an…
-
Rust Foundation tries to stop maintainers corroding
Rust Foundation tries to stop maintainers corroding 2025-11-05 at 15:20 By Richard Speed Memory safety costs money: Maintainers Fund to directly pay developers for their work The Rust Foundation has launched a Maintainers Fund to support developers sustaining the language, addressing a long-standing challenge in open source software.… This article is an excerpt from The…
-
Inside SECURITY 500: Reinventing Security Leadership
Inside SECURITY 500: Reinventing Security Leadership 2025-11-05 at 15:00 By In this episode of Lock It Down with SecurityMagazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference. This article is an excerpt from Subscribe…
-
Malanta Emerges from Stealth With $10 Million Seed Funding
Malanta Emerges from Stealth With $10 Million Seed Funding 2025-11-05 at 15:00 By Kevin Townsend Malanta collects and analyzes digital breadcrumbs that attackers leave behind and then forecasts how and when they will be weaponized. The post Malanta Emerges from Stealth With $10 Million Seed Funding appeared first on SecurityWeek. This article is an excerpt…
-
Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703) 2025-11-05 at 14:59 By Zeljka Zorz On Tuesday, CISA added two vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2025-11371, which affects Gladinet’s CentreStack and Triofox file-sharing and remote access platforms, and CVE-2025-48703, a vulnerability in Control Web Panel (CWP), a web hosting control panel designed for…
-
Snowflake goes all out to woo PostgreSQL developers with lakehouse extensions
Snowflake goes all out to woo PostgreSQL developers with lakehouse extensions 2025-11-05 at 14:13 By Lindsay Clark Buyers still struggling to differentiate data platforms in era of AI Cloud data platform vendor Snowflake has made its set of PostgreSQL extensions open source in a bid to help developers and data engineers integrate the popular open…
-
Bitcoin is infrastructure, not digital gold
Bitcoin is infrastructure, not digital gold 2025-11-05 at 12:11 By Cointelegraph by Thomas Chen Bitcoin’s true potential lies in its infrastructure role as productive capital, not just a digital store of value like gold. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:
-
Are you a freelancer? North Korean spies may be using you
Are you a freelancer? North Korean spies may be using you 2025-11-05 at 12:11 By Cointelegraph by Yohan Yun North Korea is recruiting freelancers as identity proxies to score remote contracts and bank accounts, according to new cyber intelligence research. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:
-
Famed software engineer DJB tries Fil-C… and likes what he sees
Famed software engineer DJB tries Fil-C… and likes what he sees 2025-11-05 at 12:11 By Liam Proven A ‘three-letter person’ experiments with the new type-safe C, and is impressed Famed mathematician, cryptographer and coder Daniel J. Bernstein has tried out the new type-safe C/C++ compiler, and he’s given it a favorable report.… This article is…
-
UK agri dept spent hundreds of millions upgrading to Windows 10 – just in time for end of support
UK agri dept spent hundreds of millions upgrading to Windows 10 – just in time for end of support 2025-11-05 at 12:11 By Carly Page After a £312M upgrade to the retiring OS, Defra still has 24,000 devices to replace The UK’s Department for Environment, Food & Rural Affairs (Defra) has spent £312 million (c…
-
US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency 2025-11-05 at 12:11 By Associated Press The United States on Tuesday imposed sanctions on a group of bankers, financial institutions and others accused of laundering money from cyber crime schemes — money the Treasury Department says helps pay for North Korea’s nuclear weapons program. Over…
Browse older archives
- November 2025
- October 2025
- September 2025
- August 2025
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023