Threat actors exploit SharePoint flaws to access internal systems, steal sensitive data, and carry out surveillance, impersonation, and extortion. Read more »
AI-assisted malware named Koske is hidden inside panda images, silently hijacking Linux machines for crypto mining while evading detection. Read more »
A hacker recently injected code into Amazon Q in order to warn users of the platform’s potential security flaws. But the outcome could have been much worse. Read more »
Too many threat intelligence data feeds and not enough skilled analysts top the list of challenges for cybersecurity teams, says a new Google Cloud/Forrester report. Read more »
Unpatched Apple devices remain exposed to Sploitlight, a macOS flaw that allows unauthorized access to private user data despite security measures. Read more »
Defensive strategy best practices are included in Google’s latest cloud security report. Read more »
If you use Microsoft Authenticator, there are important steps you might want to take this month when it comes to password management. Get the details. Read more »
The EU’s General-Purpose AI Code of Practice is intended to guide AI developers in complying with the EU AI Act. Read more »
Prophet Security has raised $30 million to deploy autonomous AI defenders. But experts warn that fully autonomous security operations are a dangerous myth that could leave companies more vulnerable... Read more »
In response to a cyberattack, Minnesota Governor Tim Walz issued an emergency executive order bringing National Guard soldiers to active duty. Read more »
