Searchlight Cyber unveils AI Agent to automate dark web threat actor summaries
06
Aug
2025

Searchlight Cyber unveils AI Agent to automate dark web threat actor summaries

Searchlight Cyber has released a new AI capability that summarizes the activity of a threat actor in its dark web…

AI Is Transforming Cybersecurity Adversarial Testing
06
Aug
2025

AI Is Transforming Cybersecurity Adversarial Testing

When Technology Resets the Playing Field In 2015 I founded a cybersecurity testing software company with the belief that automated…

Cyber Attacks Against AI Infrastructure Are in The Rise With Key Vulnerabilities Uncovered
06
Aug
2025

Cyber Attacks Against AI Infrastructure Are in The Rise With Key Vulnerabilities Uncovered

Cyber-criminals have gradually shifted their focus toward the high-value infrastructure that trains, tunes and serves modern artificial-intelligence models. Over the…

MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands
06
Aug
2025

MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands

Cybersecurity researchers have uncovered a critical vulnerability in Cursor IDE that allows attackers to execute arbitrary system commands through a…

Ransomware is up, zero-days are booming, and your IP camera might be next
06
Aug
2025

Ransomware is up, zero-days are booming, and your IP camera might be next

Cyber attackers are finding new ways in through the overlooked and unconventional network corners. Forescout’s 2025H1 Threat Review reveals a…

Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for 'ManageEngine OpManager'
06
Aug
2025

Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’

Cybersecurity researchers have uncovered a sophisticated search engine optimization (SEO) poisoning campaign that exploited Bing search results to distribute Bumblebee…

CISOs say they're prepared, their data says otherwise
06
Aug
2025

CISOs say they’re prepared, their data says otherwise

Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they…

06
Aug
2025

Why Marcus Is Wrong About AI

My friend Marcus Hutchins put out a long, well-written, and entertaining piece about all the reasons he thinks AI is…

Microsoft Zero Day Quest Hacking Contest
06
Aug
2025

Microsoft Zero Day Quest Hacking Contest

Microsoft has announced the return of its groundbreaking Zero Day Quest, the largest public hacking event in history, offering unprecedented…

Why 90% of cyber leaders are feeling the heat
06
Aug
2025

Why 90% of cyber leaders are feeling the heat

90% of cyber leaders find managing cyber risks harder today than five years ago, mainly due to the explosion of…

"ReVault" firmware flaws allow persistent access in Dell laptops
06
Aug
2025

“ReVault” firmware flaws allow persistent access in Dell laptops

Researchers at Cisco’s Talos Intelligence have uncovered a vulnerability chain in security hardware used by IT maker Dell, which can…

Critical Firmware Vulnerabilities Exposes Millions of Dell Laptops to Device Takeover and Malware Attacks
06
Aug
2025

Critical Firmware Vulnerabilities Exposes Millions of Dell Laptops to Device Takeover and Malware Attacks

A wide range of vulnerabilities affects millions of Dell laptops used by government agencies, cybersecurity professionals, and enterprises worldwide. The…