Cybersecurity and other IT news aggregator

LATEST FEEDS

  • UK space sector ‘lacks strategic direction,’ Lords warn

    UK space sector ‘lacks strategic direction,’ Lords warn 2025-11-06 at 11:51 By Richard Speed Parliamentary report calls for sovereign launch capability and reduced dependence on US services The UK’s House of Lords UK Engagement with Space Committee has published a scathing report, “The Space Economy: Act Now or Lose Out,” declaring that the 2021 National…


  • 1touch.io Kontxtual provides LLM-driven control over sensitive data

    1touch.io Kontxtual provides LLM-driven control over sensitive data 2025-11-06 at 11:10 By Industry News 1touch.io unveils Kontxtual, an AI-driven data platform engineered for the AI era. Built to accelerate enterprise innovation without compromising control, Kontxtual harnesses the power of AI and LLMs to deliver real-time data, identity, usage, and risk insights, assuring sovereignty and security…


  • Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows

    Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows 2025-11-06 at 11:10 By Industry News Aptori announced Code-Q (Code Quick Fix), a new agent in its AI-powered security platform that automatically generates, validates and applies code-level remediations for confirmed vulnerabilities. Building on Aptori’s AI Triage, which delivers deterministic vulnerability validation, Code-Q extends that…


  • MajorKey IDProof+ combats AI-driven fraud

    MajorKey IDProof+ combats AI-driven fraud 2025-11-06 at 11:10 By Industry News MajorKey Technologies announced IDProof+, a high-assurance identity verification solution leveraging biometric technology. Developed in collaboration with identity verification innovator authID, IDProof+ is designed to help enterprises combat AI-driven fraud and streamline remote workforce onboarding. Key benefits of IDProof+ include: Integration with Microsoft Entra Biometric…


  • Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data

    Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data 2025-11-06 at 10:28 By Sinisa Markovic Hypori announced the expansion of its platform with the launch of the Hypori Secure Workspace Ecosystem, a suite of next-generation products designed to give organizations flexibility, scalability, and control over secure mobile access. The new portfolio introduces Hypori Mobile…


  • Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode

    Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode 2025-11-06 at 10:28 By Industry News Binarly released the Binarly Transparency Platform 3.5 with Java ecosystem support, enterprise-grade YARA integration, and operational upgrades. With this update, Binarly’s cryptographic algorithm identification engine now supports Java archives (JARs) and JVM bytecode, scanning both standalone and embedded…


  • OpenGuardrails: A new open-source model aims to make AI safer for real-world use

    OpenGuardrails: A new open-source model aims to make AI safer for real-world use 2025-11-06 at 10:28 By Mirko Zorz When you ask a large language model to summarize a policy or write code, you probably assume it will behave safely. But what happens when someone tries to trick it into leaking data or generating harmful…


  • Bitdefender GravityZone Security Data Lake unifies telemetry from multiple tools

    Bitdefender GravityZone Security Data Lake unifies telemetry from multiple tools 2025-11-06 at 10:28 By Industry News Bitdefender announced Bitdefender GravityZone Security Data Lake and Data Lake for Managed Detection and Response (MDR), solutions that help organizations cut through alert overload and complexity by unifying security telemetry from multiple tools into a single, intelligent platform. The…


  • Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

    Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection 2025-11-06 at 10:28 By The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the…


  • China uses Mars orbiter to snap interstellar comet 3I/ATLAS

    China uses Mars orbiter to snap interstellar comet 3I/ATLAS 2025-11-06 at 08:37 By Simon Sharwood Middle Kingdom also postpones astronaut return mission after something hit its spaceship China has matched the European Space Agency’s feat of taking a snapshot of interstellar comet 3I/ATLAS from a Mars orbiter.… This article is an excerpt from The Register…


  • Prismatic gives AI agents the guardrails and structure they need to operate reliably in production

    Prismatic gives AI agents the guardrails and structure they need to operate reliably in production 2025-11-06 at 08:37 By Industry News Prismatic announced its MCP flow server for production-ready AI integrations. The new offering enables companies to transform fragile AI toolchains into reliable, deterministic workflows that can securely power mission-critical applications. AI agents are now…


  • Enterprises are losing track of the devices inside their networks

    Enterprises are losing track of the devices inside their networks 2025-11-06 at 08:37 By Sinisa Markovic Security teams are often surprised when they discover the range and number of devices connected to their networks. The total goes far beyond what appears in agent-based telemetry or old manual asset inventories. Enterprise networks face broader exposure from…


  • The Silent Insider Threat: When Employees Undermine Cybersecurity Messaging

    The Silent Insider Threat: When Employees Undermine Cybersecurity Messaging 2025-11-06 at 08:37 By One of the most damaging vulnerabilities often sits inside the organization: inconsistent communication from employees. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:


  • Humans built the problem, AI just scaled it

    Humans built the problem, AI just scaled it 2025-11-06 at 08:04 By Anamarija Pogorelec Information moves across cloud platforms, personal devices, and AI tools, often faster than security teams can track it. Proofpoint’s 2025 Data Security Landscape report shows that most organizations faced data loss last year, usually caused by their own people. With AI…


  • SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

    SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach 2025-11-06 at 08:04 By SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. “The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access…


  • What shadow AI means for your company’s security

    What shadow AI means for your company’s security 2025-11-06 at 07:45 By Help Net Security In this Help Net Security video, Peled Eldan‏, Head of Research at XM Cyber, explains the hidden risks of shadow AI. He describes how employees often use unapproved AI tools at work to save time or solve problems, even when…


  • Retailers are learning to say no to ransom demands

    Retailers are learning to say no to ransom demands 2025-11-06 at 07:45 By Anamarija Pogorelec Ransomware remains one of the biggest operational risks for retailers, but the latest data shows a shift in how these attacks unfold. Fewer incidents now lead to data encryption, recovery costs have dropped, and businesses are bouncing back faster. Yet…


  • Qualcomm bets on inferencing in the cloud, which Arm says can’t run it all it forever

    Qualcomm bets on inferencing in the cloud, which Arm says can’t run it all it forever 2025-11-06 at 06:32 By Simon Sharwood Awkward, seeing as they’re close partners Qualcomm and Arm have offered differing predictions regarding the market for inferencing silicon.… This article is an excerpt from The Register View Original Source React to this…


  • Zohran Mamdani taps Big Tech antagonist Lina Khan as co-chair of mayoral transition team

    Zohran Mamdani taps Big Tech antagonist Lina Khan as co-chair of mayoral transition team 2025-11-06 at 03:23 By Thomas Barrabi Mayor-elect Zohran Mamdani has picked former Federal Trade Commission chair Lina Khan to serve as co-chair of his transition team. This article is an excerpt from Latest Technology News | New York Post View Original…


  • Sony rolls out a standard way to measure bias in how AI describes what it ‘sees’

    Sony rolls out a standard way to measure bias in how AI describes what it ‘sees’ 2025-11-06 at 03:23 By Thomas Claburn Images in the test dataset were all sourced with consent AI models are filled to the brim with bias, whether that’s showing you a certain race of person when you ask for a…


  • Gorge on Microsoft Store apps with 16-at-once installer

    Gorge on Microsoft Store apps with 16-at-once installer 2025-11-06 at 03:23 By Avram Piltch For now it works only with the web version of the Microsoft Store hands on  Normally, when you install an application in Windows, it comes either from a direct download or as a single choice from the Microsoft Store. But what…


  • Microsoft apologizes for not explaining cheaper no-AI M365 plans, and all it took was a government lawsuit

    Microsoft apologizes for not explaining cheaper no-AI M365 plans, and all it took was a government lawsuit 2025-11-06 at 02:51 By Simon Sharwood Even offers refunds if users sign up for AI they don’t want Microsoft Australia has apologized to users of its M365 suite after regulators accused it of steering them towards pricey bundles…


  • Perplexity shows how to run monster AI models more efficiently on aging GPUs, AWS networks

    Perplexity shows how to run monster AI models more efficiently on aging GPUs, AWS networks 2025-11-06 at 01:47 By Tobias Mann Some clever networking hacks open the door AI search provider Perplexity’s research wing has developed a new set of software optimizations that allows for trillion parameter or large models to run efficiently across older,…


  • Azure stumbles in Western Europe, Microsoft blames ‘thermal event’

    Azure stumbles in Western Europe, Microsoft blames ‘thermal event’ 2025-11-06 at 01:09 By Simon Sharwood Degraded performance and possible dependency problems across AZs Microsoft has warned of a “thermal event” impacting Azure users in its West Europe region, and perhaps elsewhere.… This article is an excerpt from The Register View Original Source React to this…


  • ‘Tutors’ at Musk startup xAI had to give up rights to faces, voices to train sexy AI bots: report

    ‘Tutors’ at Musk startup xAI had to give up rights to faces, voices to train sexy AI bots: report 2025-11-06 at 00:53 By Ariel Zilber Most of those affected were so-called “AI tutors,” staff who refine the large language models that power xAI’s flagship chatbot, Grok. This article is an excerpt from Latest Technology News…


  • NYC tech workers celebrate Mamdani’s mayoral win — but their bosses are worried

    NYC tech workers celebrate Mamdani’s mayoral win — but their bosses are worried 2025-11-06 at 00:08 By Thomas Barrabi Zohran Mamdani won over New York City’s tech industry workers with his disruptive style on the campaign trail – but their bosses are worried about what the mayor-elect’s far-left policies will mean for their businesses. This…


  • Uncle Sam lets Google take Wiz for $32B

    Uncle Sam lets Google take Wiz for $32B 2025-11-05 at 20:54 By Brandon Vigliarolo Second time’s the charm for after Wiz rejected Google’s $23B offer last year Google’s second attempt to acquire cloud security firm Wiz is going a lot better than the first, with the Department of Justice clearing the $32 billion deal, which…


  • Google uncovers malware using LLMs to operate and evade detection

    Google uncovers malware using LLMs to operate and evade detection 2025-11-05 at 20:53 By Zeljka Zorz PromptLock, the AI-powered proof-of-concept ransomware developed by researchers at NYU Tandon and initially mistaken for an active threat by ESET, is no longer an isolated example: Google’s latest report shows attackers are now creating and deploying other malware that…


  • Oak Ridge lab bags $125M to bolt quantum onto supercomputers

    Oak Ridge lab bags $125M to bolt quantum onto supercomputers 2025-11-05 at 19:48 By Dan Robinson The DoE’s planned funding runs through 2030 America’s Oak Ridge National Laboratory will receive up to $125 million through 2030 to develop hybrid computing systems that link quantum and supercomputing technologies.… This article is an excerpt from The Register…


  • When Debian won’t do, Devuan 6 ‘Excalibur’ Linux makes the grade

    When Debian won’t do, Devuan 6 ‘Excalibur’ Linux makes the grade 2025-11-05 at 18:53 By Liam Proven Debian 13 base, minus systemd and RISC-V build Old school enough to favor Debian, but averse to systemd? Good news: Devuan 6 “Excalibur” is here, and all you need to do is draw it from the stone master…


  • AMD taking AI fight to Nvidia with Helios rack-scale system

    AMD taking AI fight to Nvidia with Helios rack-scale system 2025-11-05 at 18:53 By Dan Robinson CEO Lisa Su says next-gen MI400 GPUs and architecture gaining traction with hyperscalers AMD plans to launch its Helios rack-scale architecture in 2026 as a direct challenge to Nvidia in the AI infrastructure market, pending successful integration of its…


  • Two-fifths of SAP Americas users yet to ditch legacy ERP

    Two-fifths of SAP Americas users yet to ditch legacy ERP 2025-11-05 at 18:53 By Lindsay Clark S/4HANA migration? Many still worried about business process change Around two fifths of North America’s SAP users have yet to begin migrating to S/4HANA with just two years until mainstream support ends for legacy systems.… This article is an…


  • Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

    Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly 2025-11-05 at 18:52 By Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for…


  • M&S pegs cyberattack cleanup costs at £136M as profits slump

    M&S pegs cyberattack cleanup costs at £136M as profits slump 2025-11-05 at 17:47 By Connor Jones Retailer’s tech systems aren’t down anymore, but the same can’t be said for its rocky financials Marks & Spencer says its April cyberattack will cost around £136 million ($177.2 million) in total.… This article is an excerpt from The…


  • Securing the Open Android Ecosystem with Samsung Knox

    Securing the Open Android Ecosystem with Samsung Knox 2025-11-05 at 17:46 By Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical. However, outdated concerns can…


  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

    Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions 2025-11-05 at 17:46 By A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. “UNK_SmudgedSerpent leveraged domestic political…


  • U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud

    U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud 2025-11-05 at 17:46 By The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea’s global financial network for laundering money for various illicit schemes, including cybercrime and information technology (IT) worker fraud. “North Korean…


  • Why SOC Burnout Can Be Avoided: Practical Steps

    Why SOC Burnout Can Be Avoided: Practical Steps 2025-11-05 at 17:46 By Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that many SOCs face burnout before they face their next breach. But this doesn’t have to…


  • Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns

    Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns 2025-11-05 at 17:25 By Eduard Kovacs Google has released a report describing the novel ways in which malware has been using AI to adapt and evade detection. The post Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns…


  • AMD red-faced over random-number bug that kills cryptographic security

    AMD red-faced over random-number bug that kills cryptographic security 2025-11-05 at 17:01 By Connor Jones Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.… This article…


  • Komodor’s self-healing capabilities remediate issues with or without a human in the loop

    Komodor’s self-healing capabilities remediate issues with or without a human in the loop 2025-11-05 at 16:59 By Industry News Komodor released autonomous self-healing and cost optimization capabilities that simplify operations for SRE, DevOps, and Platform teams managing large-scale Kubernetes environments. Powered by Klaudia, purpose-built agentic AI, the Komodor platform can automatically detect, investigate, and remediate…


  • Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end

    Fortinet launches Secure AI Data Center to protect AI infrastructures end-to-end 2025-11-05 at 16:46 By Industry News Fortinet announced the Secure AI Data Center solution, an end-to-end framework purpose-built to protect AI infrastructures. Designed to secure the entire AI stack, from data center infrastructure to applications and LLMs, the solution delivers advanced AI threat defense…


  • Barracuda Assistant accelerates security operations

    Barracuda Assistant accelerates security operations 2025-11-05 at 16:19 By Industry News Barracuda Networks launched Barracuda Assistant, powered by Barracuda AI. Integrated into the BarracudaONE cybersecurity platform, Barracuda Assistant accelerates security operations to help organizations strengthen cyber resilience and drive productivity and ROI. “Cyberattacks are growing more sophisticated and relentless, and security teams are under immense…


  • Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders

    Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders 2025-11-05 at 16:07 By SecurityWeek News Get practical strategies to help minimize your risk exposure, including the need for identity threat detection and mitigation. The post Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders appeared first on SecurityWeek. This article is…


  • CleanStart SBOM Analyzer strengthens software supply chain security

    CleanStart SBOM Analyzer strengthens software supply chain security 2025-11-05 at 16:06 By Industry News CleanStart has released its SBOM Analyzer, an add-on tool that generates complete, CISA-compliant Software Bills of Materials (SBOMs) for container images. The tool deepens visibility into software components and dependencies, helping organizations secure their supply chains before deployment. Integrated directly into…


  • Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

    Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data 2025-11-05 at 16:04 By Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories and chat histories without their knowledge. The seven vulnerabilities…


  • Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes

    Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes 2025-11-05 at 16:00 By Jessica Lyons Meanwhile, others tried to social-engineer the chatbot itself Nation-state goons and cybercrime rings are experimenting with Gemini to develop a “Thinking Robot” malware module that can rewrite its own code to avoid detection,…


  • Flare Raises $30 Million for Threat Exposure Management Platform

    Flare Raises $30 Million for Threat Exposure Management Platform 2025-11-05 at 15:35 By Ionut Arghire The company plans to advance its identity exposure management capabilities and pursue M&A opportunities. The post Flare Raises $30 Million for Threat Exposure Management Platform appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React…


  • Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation

    Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation 2025-11-05 at 15:23 By Eduard Kovacs Armis recently surpassed $300 million in annual recurring revenue as it prepares for an IPO. The post Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation appeared first on SecurityWeek. This article is an…


  • Rust Foundation tries to stop maintainers corroding

    Rust Foundation tries to stop maintainers corroding 2025-11-05 at 15:20 By Richard Speed Memory safety costs money: Maintainers Fund to directly pay developers for their work The Rust Foundation has launched a Maintainers Fund to support developers sustaining the language, addressing a long-standing challenge in open source software.… This article is an excerpt from The…


Browse older archives

Scroll to Top