Kerberos Overhaul Will Disable RC4 by Default in Windows Microsoft will disable RC4 by default in Windows Kerberos, pushing organizations to uncover and eliminate longstanding cryptographic weaknesses hidden in legacy authentication systems - particularly within large domains where fallback to RC4 has quietly persisted for decades.
Cybercrime Gang Rhysida Still Lists the Practice on Its Leak Site Among Its Victims A Kansas medical group will pay $1.2 million to settle proposed class action litigation involving an attack that compromised the sensitive data of nearly 256,000 individuals. The Rhysida ransomware operation claimed responsibility and said it stole 3 terabytes.
AI Is Now the Top Focus for Modernization to Relieve Budget, Staffing Pressures According to the National Association of State CIOs, this year AI tech - including generative and agentic AI - is the top strategic initiative for state CIOs - marking an "unprecedented" shift in IT priorities, said NASCIO Executive Director Doug Robinson. In fact, AI first appeared on the organization's annual survey of state and territory CIOs just three years ago.
Secure-by-Design Startup Uses AI Agents to Safeguard Containers, VMs and Libraries Cloud security startup Echo has closed a $35 million Series A funding round to boost development of its AI-native OS. The platform starts with secure container images and aims to extend to VMs and libraries, helping enterprises minimize risk from open-source software.
A vulnerability was found in WebKitGTK and WPE WebKit up to 2.50.3 and classified as problematic. The impacted element is an unknown function of the component Web Handler. Executing manipulation can lead to type confusion.
This vulnerability is registered as CVE-2025-43541. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in WebKitGTK and WPE WebKit up to 2.50.3 and classified as critical. The affected element is an unknown function of the component Web Handler. Performing manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-43536. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.