DataBreachToday.com
F5 Buys Startup Fletch to Automate Security With Agentic AI
1 month 1 week ago
Context-Driven Insights, Automation Fuel Faster, Clearer Decisions for Cyber Teams
With its acquisition of San Francisco-based startup Fletch, F5 is embedding agentic AI into its security platform to automate threat detection and response. The technology provides real-time context, filters irrelevant alerts and helps security teams prioritize urgent risks and mitigation tasks.
With its acquisition of San Francisco-based startup Fletch, F5 is embedding agentic AI into its security platform to automate threat detection and response. The technology provides real-time context, filters irrelevant alerts and helps security teams prioritize urgent risks and mitigation tasks.
Dutch Minister Warns of Heightened Chinese Espionage Threats
1 month 1 week ago
Dutch Semiconductor Sector Among Chinese Targets
Chinese nation state groups ramped up espionage campaigns against Dutch critical infrastructure in recent months, said a state official who added that discussions are underway in the European Union on how to minimize Chinese threats.
Chinese nation state groups ramped up espionage campaigns against Dutch critical infrastructure in recent months, said a state official who added that discussions are underway in the European Union on how to minimize Chinese threats.
Flaw in Cisco Wireless LAN Controller Raises Exploit Fears
1 month 1 week ago
Researchers in Proof of Concept Show Exploit Potential for Widely Used Software
Technical details for a recently patched maximum-severity vulnerability in Cisco IOS XE reveal how hackers can enable remote code execution if the flaw is exploited. The vulnerability is an arbitrary file upload triggered by a hardcoded JSON Web Token.
Technical details for a recently patched maximum-severity vulnerability in Cisco IOS XE reveal how hackers can enable remote code execution if the flaw is exploited. The vulnerability is an arbitrary file upload triggered by a hardcoded JSON Web Token.
Trump Homeland Security Budget Guts CISA Staff, Key Programs
1 month 1 week ago
DHS Budget Proposal Reduces CISA’s Operational Core Amid Growing Global Threats
The Trump administration’s 2026 Homeland Security Department budget would cut $500 million from the Cybersecurity and Infrastructure Security Agency, eliminating over a third of its staff and gutting key programs central to federal cybersecurity and private sector engagement efforts.
The Trump administration’s 2026 Homeland Security Department budget would cut $500 million from the Cybersecurity and Infrastructure Security Agency, eliminating over a third of its staff and gutting key programs central to federal cybersecurity and private sector engagement efforts.
Preview: Hot Sessions at Infosecurity Europe 2025 in London
1 month 1 week ago
Ransomware, Quantum Computing, Geopolitics, Gen AI and More on the Agenda
Infosecurity Europe is set to return June 3 to London. Hot topics at this year's event include everything from quantum computing, geopolitics and artificial intelligence, to supply chain attacks, insider threats and the cybercrime juggernaut that continues to be ransomware.
Infosecurity Europe is set to return June 3 to London. Hot topics at this year's event include everything from quantum computing, geopolitics and artificial intelligence, to supply chain attacks, insider threats and the cybercrime juggernaut that continues to be ransomware.
Genetic Data: Emerging Cyberthreats and Privacy Concerns
1 month 1 week ago
It's only a matter of time before cybercriminals begin to use artificial intelligence-enabled tools, open-source software and other technologies to launch attacks to exploit sensitive genetic data, said Nicholas Morris, a practice manager at security firm Optiv.
Linux Crash Dump Flaws Expose Passwords, Encryption Keys
1 month 1 week ago
Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data
Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, warn researchers. The flaw lies in the way certain Linux distributions, including Ubuntu, Red Hat, and Fedora, handle application crashes.
Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, warn researchers. The flaw lies in the way certain Linux distributions, including Ubuntu, Red Hat, and Fedora, handle application crashes.
DeepSeek Upgrade Edges Model Closer to AI's Frontline
1 month 1 week ago
New Open-Source Model Rivals OpenAI, While Treading Beijing's Red Line
Artificial intelligence startup DeepSeek released Thursday an updated version of its flagship reasoning model months after its Chinese origin sent shockwaves through industry. The model is a glimpse into high-performance systems being trained and deployed under norms governed by Beijing.
Artificial intelligence startup DeepSeek released Thursday an updated version of its flagship reasoning model months after its Chinese origin sent shockwaves through industry. The model is a glimpse into high-performance systems being trained and deployed under norms governed by Beijing.
US Sanctions Romance Bait Scam Digital Infrastructure Host
1 month 1 week ago
Funnull Technology Is Content Delivery Network for Criminals, Says US Treasury
The U.S. government sanctioned a Philippine firm linked to romance bait scam websites. The Department of Treasury cut off Funnull Technology from the U.S.-dominated international monetary system for acting as a content delivery network for scam platforms.
The U.S. government sanctioned a Philippine firm linked to romance bait scam websites. The Department of Treasury cut off Funnull Technology from the U.S.-dominated international monetary system for acting as a content delivery network for scam platforms.
Zscaler, Netskope, Palo Alto Top SSE Gartner Magic Quadrant
1 month 1 week ago
Gartner: Security Service Edge Market Is Experiencing Evolution, Not Revolution
Pure-play security service edge specialists Zscaler and Netskope were once again joined by platform behemoth Palo Alto Networks atop Gartner's rankings of SSE vendors. The SSE market is experiencing evolution rather than revolution, with commoditization prevalent in legacy security technologies.
Pure-play security service edge specialists Zscaler and Netskope were once again joined by platform behemoth Palo Alto Networks atop Gartner's rankings of SSE vendors. The SSE market is experiencing evolution rather than revolution, with commoditization prevalent in legacy security technologies.
Webinar | Rethinking Workforce Access: Aligning Passwordless Innovation with Real-World Needs
1 month 1 week ago
Cybersecurity Firm SentinelOne Suffers Major Outage
1 month 1 week ago
After Hours-Long Disruption, XDR Vendor Promises Full Root Cause Analysis of Outage
Cybersecurity vendor SentinelOne suffered a major, global outage for about six hours on Thursday that disrupted its monitoring of managed response service customers' endpoints and networks, interrupted software updates and kept administrators from accessing consoles for troubleshooting purposes.
Cybersecurity vendor SentinelOne suffered a major, global outage for about six hours on Thursday that disrupted its monitoring of managed response service customers' endpoints and networks, interrupted software updates and kept administrators from accessing consoles for troubleshooting purposes.
Autonomous Payment or Anarchy? AI Gets Purchasing Power
1 month 1 week ago
As Visa and Mastercard Deploy AI Agents, Experts Ask: Who Holds the Receipt?
When AI assistants order groceries or book flights, who's responsible when something goes wrong? That question is no longer hypothetical. As Visa and Mastercard enable AI agents to perform transactions on behalf of cardholders, experts weigh the legal, security and privacy stakes.
When AI assistants order groceries or book flights, who's responsible when something goes wrong? That question is no longer hypothetical. As Visa and Mastercard enable AI agents to perform transactions on behalf of cardholders, experts weigh the legal, security and privacy stakes.
ISMG Editors: Are We Less Secure Despite the AI Buzz?
1 month 1 week ago
Also: Deepfake Dangers with Veo 3; Claude Opus 4's Manipulative Edge
In this week's update, Information Security Media Group editors questioned whether we’re less secure today despite agentic AI and platformization, examined Veo 3’s alarming leap in deepfake realism, and dug into Anthropic’s powerful yet problematic Claude Opus 4.
In this week's update, Information Security Media Group editors questioned whether we’re less secure today despite agentic AI and platformization, examined Veo 3’s alarming leap in deepfake realism, and dug into Anthropic’s powerful yet problematic Claude Opus 4.
CISA's New SIEM Guidance Tackles Visibility and Blind Spots
1 month 1 week ago
US, Australian Cyber Agencies Say Visibility Gaps Threaten Detection and Response
The Cybersecurity and Infrastructure Security Agency issued new guidance urging organizations to streamline Security Information and Event Management platform integration by prioritizing impactful log data and reducing blind spots that continue to plague even mature security operations centers.
The Cybersecurity and Infrastructure Security Agency issued new guidance urging organizations to streamline Security Information and Event Management platform integration by prioritizing impactful log data and reducing blind spots that continue to plague even mature security operations centers.
Tenable Bolsters AI Controls With Apex Security Acquisition
1 month 1 week ago
Apex Security Detection Tools Help Tenable Spot Accidental and Malicious AI Misuse
Tenable is acquiring Israeli startup Apex Security to extend AI security features that go beyond asset discovery. With user-level controls and risk mitigation for AI usage, Tenable aims to accelerate its exposure management roadmap by integrating Apex into Tenable One later this year.
Tenable is acquiring Israeli startup Apex Security to extend AI security features that go beyond asset discovery. With user-level controls and risk mitigation for AI usage, Tenable aims to accelerate its exposure management roadmap by integrating Apex into Tenable One later this year.
Tiffany, Dior Suffer South Korean Customer Data Breaches
1 month 1 week ago
Retailers Report a Spurt in Breaches
Jewelry retailer Tiffany & Co. said hackers stole South Korean customers' data from a third-party vendor's platform, a disclosure that came shortly after sister brand Dior announced a similar breach. Hackers stole the personal information of South Korean shoppers.
Jewelry retailer Tiffany & Co. said hackers stole South Korean customers' data from a third-party vendor's platform, a disclosure that came shortly after sister brand Dior announced a similar breach. Hackers stole the personal information of South Korean shoppers.
Webinar | How to Build a Platform-Based Defense Against Evolving Cyber Threats
1 month 1 week ago
Palo Alto Networks on How to Construct a Defense for Modern Threats
The rapid evolution of cyber threats, amplified by the integration of AI into adversarial tactics, calls for a shift in defensive strategies. Traditional approaches are no longer sufficient to address the sophistication, scale, and speed of modern attacks.
The rapid evolution of cyber threats, amplified by the integration of AI into adversarial tactics, calls for a shift in defensive strategies. Traditional approaches are no longer sufficient to address the sophistication, scale, and speed of modern attacks.
Building a Security Portfolio Even When You're a Blue Teamer
1 month 1 week ago
Things to Include on Your CV When Your Job Focuses on Keeping Systems Running
If you're a junior SOC analyst, a GRC specialist or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It's not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that - whether your job touches logs or legal frameworks.
If you're a junior SOC analyst, a GRC specialist or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It's not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that - whether your job touches logs or legal frameworks.
Checked
24 minutes 28 seconds ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed