Data Security Firm Cyera Raises $400M, Hits $9B Valuation

This represents a 50% jump from its $6 billion valuation achieved seven months ago, signaling investor confidence in AI security solutions. The post Data Security Firm Cyera Raises $400M,... Read more »

China-linked UAT-7290 spies on telco in South Asia and Europe using modular malware

China-linked UAT-7290 has targeted South Asia and Southeastern Europe since 2022, conducting espionage and deploying RushDrop, DriveSwitch, and SilentRaid. China-linked threat actor UAT-7290 has conducted espionage attacks since at... Read more »

From promise to proof: making AI security adoption tangible

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth... Read more »

January 2026 Patch Tuesday forecast: And so it continues

Welcome to a new year of my Patch Tuesday forecast blog where I provide a summary of Microsoft and other vendor’s security patch activity (and reported issues) for the... Read more »

How AI agents are turning security inside-out

AppSec teams have spent the last decade hardening externally facing applications, API security, software supply chain risk, CI/CD controls, and cloud-native attack paths. But a growing class of security... Read more »

Computer Misuse Act reform is overdue – not all anniversaries should be celebrated

Let’s not have any further anniversaries for the UK’s outdated cyber security laws – the government has dragged its heels for too long and reform is urgently needed Read more »

Product showcase: TrackerControl lets Android users see who’s tracking them

TrackerControl is an open-source Android application designed to give users visibility into and control over the hidden data within mobile apps. Many apps routinely communicate with third-party services that... Read more »

Security teams are paying more attention to the energy cost of detection

Security teams spend a lot of time explaining why detection systems need more compute. Cloud bills rise, models retrain more often, and new analytics pipelines get added to existing... Read more »

Wi-Fi evolution tightens focus on access control

Wi-Fi networks are taking on heavier workloads, more devices, and higher expectations from users who assume constant access everywhere. A new Wireless Broadband Alliance industry study shows that this... Read more »

Chinese-speaking hackers exploited ESXi zero-days long before disclosure

Chinese-speaking attackers used a hacked SonicWall VPN to deploy ESXi zero-days that were likely exploited over a year before public disclosure. Chinese-speaking attackers were seen abusing a hacked SonicWall... Read more »
Subscribe to our Newsletter