× News Alerts AI News CyberSec News Let's Talk Local AI Bank Tech News Cyber Advisories Contact

Search Results for: "Cybersecurity"

UK Red Teams Remain Deeply Skeptical of AI Security

20:51

UK Red Teams Remain Deeply Skeptical of AI Security

A UK government-commissioned study reveals that elite cybersecurity red teams are "deeply sceptical" of AI's impact on defence. Concerns include overstated capabilities, high costs, data privacy risks, and the immaturity of current AI tools, leading them to rely on human expertise over automation.

Palo Alto Networks to Acquire CyberArk for $25 Billion

19:54

Palo Alto Networks to Acquire CyberArk for $25 Billion

Palo Alto Networks has agreed to acquire identity security firm CyberArk for approximately $25 billion. The deal, which is Palo Alto Networks' largest acquisition to date, aims to bolster its security platform with advanced identity security capabilities in the age of artificial intelligence.

New Gunra Ransomware Targets Windows Devices

17:01

New Gunra Ransomware Targets Windows Devices

A new ransomware strain named Gunra is targeting Windows devices globally using double-extortion tactics. It encrypts files, steals sensitive data, and demands ransom payments via the Tor network, impacting sectors like healthcare, pharmaceuticals, and manufacturing.

Chaos Ransomware Group Emerges and Launches Attacks

15:51

Chaos Ransomware Group Emerges and Launches Attacks

A new ransomware-as-a-service (RaaS) group named Chaos has emerged, targeting a wide variety of business verticals with double-extortion attacks. The group, believed to have ties to the former BlackSuit/Royal gang, employs sophisticated techniques to maximize impact and hinder recovery.

Most EU Banks Still Not Ready for DORA Six Months In, Survey Finds

08:01

Most EU Banks Still Not Ready for DORA Six Months In, Survey Finds

Six months after the EU's DORA regulation took effect, a new Censuswide survey reveals that 96% of financial institutions do not feel fully prepared. Key challenges include third-party risk management, increased pressure on IT teams, and securing adequate budgets for compliance.

IT Giant Ingram Micro Confirms Ransomware Attack After Outage

12:00

IT Giant Ingram Micro Confirms Ransomware Attack After Outage

Ingram Micro, a major IT service provider, has confirmed a ransomware attack on its internal systems, leading to a global outage. The company has taken systems offline, launched an investigation with cybersecurity experts, and notified law enforcement.

Hunters International Ransomware: Not Shutting Down, but Rebranding Hive

15:51

Hunters International Ransomware: Not Shutting Down, but Rebranding Hive

The Hunters International ransomware group is not a new threat but a strategic rebranding of the notorious Hive operation following its takedown by the FBI. Researchers reveal the group continues its activities with similar tactics, evolving its methods towards data exfiltration and extortion.

How Businesses Can Align Cyber Defenses With Real Threats

08:51

How Businesses Can Align Cyber Defenses With Real Threats

To effectively guard against modern cyber threats, businesses must adopt a risk-based approach, focusing on the most critical dangers. This involves leveraging threat intelligence, conducting regular risk assessments, and building a strong cybersecurity culture throughout the organization to align defenses with real-world threats.

Gartner: Exposure Management Can Halve Cyberattacks by 2028

08:52

Gartner: Exposure Management Can Halve Cyberattacks by 2028

According to Gartner, organizations that enrich their Security Operations Center (SOC) data with exposure management insights can reduce cyberattacks by 50% by 2028. This proactive approach, known as Continuous Threat Exposure Management (CTEM), helps prioritize real-world risks over theoretical vulnerabilities, leading to more effective cyber defense.

NSA and CISA Urge Adoption of Memory-Safe Programming Languages

20:04

NSA and CISA Urge Adoption of Memory-Safe Programming Languages

The NSA, CISA, and international cybersecurity partners have issued joint guidance urging developers to adopt memory-safe programming languages. This move aims to eliminate entire classes of vulnerabilities, enhancing overall software security and national security by shifting the burden of safety from developers to the language itself.

Subscribe for AI & Cybersecurity news and insights