Can AI make threat intelligence easier? One platform thinks so
When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t...
Read more →When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t...
Read more →AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security...
Read more →A threat group Google tracks as UNC6395 has pilfered troves of data from Salesforce corporate instances, in search of credentials...
Read more →A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. The findings...
Read more →Over 300,000 internet-facing Plex Media Server instances are still vulnerable to attack via CVE-2025-34158, a critical vulnerability for which Plex...
Read more →This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Buttercup: Open-source...
Read more →A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours....
Read more →AI is moving faster than regulation, and that creates opportunities and risks for compliance teams. While governments work on new...
Read more →Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool...
Read more →Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some...
Read more →Three new vulnerabilities affecting (Citrix) NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of which...
Read more →CVE-2025-48384, a recently patched vulnerability in the popular distributed revision control system Git, is being exploited by attackers. Details about...
Read more →