BankInfoSecurity.com
5 Cybersecurity Moves Every SMB Should Make
5 months ago
Practical Steps That Effectively Strengthen Security and Resilience
Cyberattackers know SMBs think they're "too small to be a target" - and they're acting on it. Learn why small businesses are increasingly targeted and the five foundational steps that can significantly reduce cyber risk.
Cyberattackers know SMBs think they're "too small to be a target" - and they're acting on it. Learn why small businesses are increasingly targeted and the five foundational steps that can significantly reduce cyber risk.
Chinese Hackers Hijack European Networks for Espionage
5 months ago
Ink Dragon Compromised IIS Networks to Relay ShadowPad Malware
A Chinese hacking group is using compromised European government networks as relay nodes to route commands and support other hacking operations. Security firm Check Point attributed the campaign to a Chinese espionage group it tracks as "Ink Dragon."
A Chinese hacking group is using compromised European government networks as relay nodes to route commands and support other hacking operations. Security firm Check Point attributed the campaign to a Chinese espionage group it tracks as "Ink Dragon."
AI Poised to Outrun Cyber Defenders, Congress Hears
5 months ago
Experts Say AI Is Already Enabling Faster and Harder-to-Detect Attack Campaigns
Artificial intelligence-fueled malware and automated cyber tools are enabling faster, more adaptive attacks at scale, with experts warning Congress that adversaries are now leveraging AI and quantum advances to outpace defenders and bypass outdated security architectures.
Artificial intelligence-fueled malware and automated cyber tools are enabling faster, more adaptive attacks at scale, with experts warning Congress that adversaries are now leveraging AI and quantum advances to outpace defenders and bypass outdated security architectures.
Senator Presses EHR Vendors on Patient Privacy Controls
5 months ago
Push Comes as HHS Steps Up Enforcement of Data-Sharing and Record Access Regs
A privacy-minded senator is pressuring U.S. health tech companies to give patients more control over where their patient data goes, framing the matter as a matter of national security as well as privacy. Regulators have ramped up enforcement of rules that promote the interoperability.
A privacy-minded senator is pressuring U.S. health tech companies to give patients more control over where their patient data goes, framing the matter as a matter of national security as well as privacy. Regulators have ramped up enforcement of rules that promote the interoperability.
Webinar | The Platform Myth—Escaping the "Stitched-Together" Security Stack
5 months ago
Microsoft to Kill RC4 in Kerberos by 2026
5 months ago
Kerberos Overhaul Will Disable RC4 by Default in Windows
Microsoft will disable RC4 by default in Windows Kerberos, pushing organizations to uncover and eliminate longstanding cryptographic weaknesses hidden in legacy authentication systems - particularly within large domains where fallback to RC4 has quietly persisted for decades.
Microsoft will disable RC4 by default in Windows Kerberos, pushing organizations to uncover and eliminate longstanding cryptographic weaknesses hidden in legacy authentication systems - particularly within large domains where fallback to RC4 has quietly persisted for decades.
Medical Group Will Pay $1.2M to Settle Data Theft Lawsuit
5 months ago
Cybercrime Gang Rhysida Still Lists the Practice on Its Leak Site Among Its Victims
A Kansas medical group will pay $1.2 million to settle proposed class action litigation involving an attack that compromised the sensitive data of nearly 256,000 individuals. The Rhysida ransomware operation claimed responsibility and said it stole 3 terabytes.
A Kansas medical group will pay $1.2 million to settle proposed class action litigation involving an attack that compromised the sensitive data of nearly 256,000 individuals. The Rhysida ransomware operation claimed responsibility and said it stole 3 terabytes.
Why State CIOs Are Betting on AI
5 months ago
AI Is Now the Top Focus for Modernization to Relieve Budget, Staffing Pressures
According to the National Association of State CIOs, this year AI tech - including generative and agentic AI - is the top strategic initiative for state CIOs - marking an "unprecedented" shift in IT priorities, said NASCIO Executive Director Doug Robinson. In fact, AI first appeared on the organization's annual survey of state and territory CIOs just three years ago.
According to the National Association of State CIOs, this year AI tech - including generative and agentic AI - is the top strategic initiative for state CIOs - marking an "unprecedented" shift in IT priorities, said NASCIO Executive Director Doug Robinson. In fact, AI first appeared on the organization's annual survey of state and territory CIOs just three years ago.
Echo Secures $35M to Tackle Cloud Vulnerabilities With AI
5 months ago
Secure-by-Design Startup Uses AI Agents to Safeguard Containers, VMs and Libraries
Cloud security startup Echo has closed a $35 million Series A funding round to boost development of its AI-native OS. The platform starts with secure container images and aims to extend to VMs and libraries, helping enterprises minimize risk from open-source software.
Cloud security startup Echo has closed a $35 million Series A funding round to boost development of its AI-native OS. The platform starts with secure container images and aims to extend to VMs and libraries, helping enterprises minimize risk from open-source software.
Why ServiceNow Is Eyeing a $7B Buy of Venture-Backed Armis
5 months 1 week ago
Deal Would Move ServiceNow's Cybersecurity Ambitions From the Shadow to Spotlight
ServiceNow's security business has long been a sleeping giant inside the workflow orchestration behemoth's portfolio that in recent months appears to have awoken. With the buy of Armis possibly imminent, ServiceNow's security ambitions appear to be moving from the shadows to the spotlight.
ServiceNow's security business has long been a sleeping giant inside the workflow orchestration behemoth's portfolio that in recent months appears to have awoken. With the buy of Armis possibly imminent, ServiceNow's security ambitions appear to be moving from the shadows to the spotlight.
Webinar | Bridging the Gap: How CISOs Can Fold Privacy into Everyday Risk Operations
5 months 1 week ago
Webinar I CISO to CISO: Measuring and Managing Human Risk
5 months 1 week ago
Nation-State and Cybercrime Exploits Tied to React2Shell
5 months 1 week ago
2 More Vulnerabilities Need Patching in React Server Components, Warns Vercel
Mass exploitation of the "React2Shell" - CVE-2025-55182 - vulnerability remains underway by nation-state hackers tied to China, North Korea and Iran, as well as financially motivated cybercriminals running everything from cryptomining malware to DDoS services, security experts warn.
Mass exploitation of the "React2Shell" - CVE-2025-55182 - vulnerability remains underway by nation-state hackers tied to China, North Korea and Iran, as well as financially motivated cybercriminals running everything from cryptomining malware to DDoS services, security experts warn.
AI Governance Unlocks Speed, Not Bureaucracy
5 months 1 week ago
ServiceNow's Neeraj Jain on Risk Mitigation and Real-Time Data Access for AI Agents
Enterprises that embed governance from intake to deployment scale AI faster than those that bolt it on afterward. Clear frameworks mitigate risk, ensure compliance and increase operational efficiency, says Neeraj Jain, director of product management, hyperscalers and multi-cloud at ServiceNow.
Enterprises that embed governance from intake to deployment scale AI faster than those that bolt it on afterward. Clear frameworks mitigate risk, ensure compliance and increase operational efficiency, says Neeraj Jain, director of product management, hyperscalers and multi-cloud at ServiceNow.
Youth Sports, NCAA Insurance Claims Potentially Hacked
5 months 1 week ago
National Accident Health Says Breach Exposed Medical Info of 181,000 People
A Maine-based third-party administrator that handles healthcare claims involving day care centers, youth sports and NCAA athlete accidents is notifying more than 181,000 individuals that their medical information and personal identifiers may have been accessed or stolen in a hacking incident.
A Maine-based third-party administrator that handles healthcare claims involving day care centers, youth sports and NCAA athlete accidents is notifying more than 181,000 individuals that their medical information and personal identifiers may have been accessed or stolen in a hacking incident.
Cyderes Bets on Lucidum to Drive AI-Backed Identity Security
5 months 1 week ago
Cyderes Aims to Fuse Identity, AI and Risk Signals in One Platform With Lucidum Buy
Cyderes has acquired Lucidum to expand its identity threat detection capabilities. Lucidum’s unique tagging and data integration will strengthen Cyderes' AI engine, enabling earlier detection of threats and human risk-based response by unifying off-SIEM telemetry with identity data.
Cyderes has acquired Lucidum to expand its identity threat detection capabilities. Lucidum’s unique tagging and data integration will strengthen Cyderes' AI engine, enabling earlier detection of threats and human risk-based response by unifying off-SIEM telemetry with identity data.
How the Hacking World Has Changed: 'All Tech is Political'
5 months 1 week ago
Black Hat's Jeff Moss: 'We're in a Political Situation, Whether You Like It or Not'
Technology doesn't exist in a vacuum, and by extension neither does cybersecurity. But in recent years, Black Hat founder Jeff Moss said he's been "struggling" with the "uncomfortable truth" that unlike the largely risk-free early days of hacking, today "all tech is political."
Technology doesn't exist in a vacuum, and by extension neither does cybersecurity. But in recent years, Black Hat founder Jeff Moss said he's been "struggling" with the "uncomfortable truth" that unlike the largely risk-free early days of hacking, today "all tech is political."
US Military Cyber Budget Jumps to $15B in 2026 NDAA
5 months 1 week ago
Defense Bill Expands Cyber Authorities, Tech Adoption and Talent Pipeline
Congress advanced a $15.1 billion military cyber budget in the fiscal year 2026 National Defense Authorization Act, boosting core operations, workforce recruitment and tech modernization as civilian cyber teams face sharp staffing losses and budget constraints.
Congress advanced a $15.1 billion military cyber budget in the fiscal year 2026 National Defense Authorization Act, boosting core operations, workforce recruitment and tech modernization as civilian cyber teams face sharp staffing losses and budget constraints.
Fieldtex, TriZetto Reveal New Healthcare Breaches
5 months 1 week ago
Companies Are Among the Latest HIPAA Business Associates Revealing Recent Hacks
New York-based medical supply fulfillment company Fieldtex is notifying its clients and more than 274,000 people about an August hack. Meanwhile, revenue cycle software firm TriZetto is also contacting its customer and patients about its own hacking incident.
New York-based medical supply fulfillment company Fieldtex is notifying its clients and more than 274,000 people about an August hack. Meanwhile, revenue cycle software firm TriZetto is also contacting its customer and patients about its own hacking incident.
Checked
8 hours 33 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed