From Mission-Centric to People-Centric: Competitive Leadership in Cyber – Dark Reading
Making a case for empathy in cyber-leadership roles as a strategic business advantage. – Read More
Making a case for empathy in cyber-leadership roles as a strategic business advantage. – Read More
Barbara Grofe, space asset security architect at Spartan Corp, discussed the realities of hacking in space, and the outlook is not pie-in-the-sky. – Read More
Kali Linux administrators who haven’t manually updated the signing key for the operating system’s repository are going to find that they can’t get updates. This comes after the overseers of…
Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner. “Private Processing will allow users to leverage…
Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content. The first of the…
How does a company defend itself from cyberattacks by a foreign adversary? A collection of experts gathered at this year’s RSAC Conference to explain how the US can help. –…
Zero-day vulnerabilities may have declined in 2024, but the number of flaws in enterprise products that didn’t have a patch at the time of exploitation is increasing, highlighting the increased…
Cybersecurity outfit Huntress, known for its threat detection solutions, has announced expanding identity-specific offerings–including protection from credential theft and business email compromise (BEC)–on its existing managed identity threat detection and…
Palo Alto Networks Monday announced plans to acquire AI security platform vendor Protect AI in a deal that will strengthen its Prisma AIRS security platform, which includes AI agent capabilities.…
The current offline/open source model boom is unstoppable. Its impact depends on how well the risks are managed today. – Read More
A spear-phishing campaign sent Trojanized versions of legitimate word-processing software to members of the World Uyghur Congress as part of China’s continued cyber-espionage activity against the ethnic minority. – Read…
Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. “We first became aware of this…
Over 40 leading cybersecurity professionals and infosec experts have signed an open letter condemning the political persecution of former CISA Director Christopher Krebs. They have urged the Trump administration to…
NVIDIA’s DOCA Argus prevents attacks before they compromise AI architectures. – Read More
A high severity flaw affecting Broadcom’s Brocade Fabric OS (FOS) has allowed attackers to run arbitrary code on affected environments with full root-level privileges. The flaw, tracked as CVE-2025-1976, is…