Bedrock Data expands platform with AI governance and natural-language policy enforcement
20
Nov
2025

Bedrock Data expands platform with AI governance and natural-language policy enforcement

Bedrock Data announced Bedrock Data ArgusAI and Natural Language Policy. ArgusAI is a new product that expands the company’s capabilities…

NSA Issues Guidance for ISPs and Network Defenders to Combat Malicious Activity
20
Nov
2025

NSA Issues Guidance for ISPs and Network Defenders to Combat Malicious Activity

The National Security Agency (NSA), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and multiple international…

The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals
20
Nov
2025

The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals

Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to…

ID-Pal upgrades ID-Detect, delivering protection against deepfakes and synthetic IDs
20
Nov
2025

ID-Pal upgrades ID-Detect, delivering protection against deepfakes and synthetic IDs

ID-Pal has announced a major enhancement to its document-fraud detection feature, ID-Detect, delivering even more powerful defences against AI-generated digital…

CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks
20
Nov
2025

CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a zero-day vulnerability in Google Chrome,…

Critical Twonky Server Flaws Let Hackers Bypass Login Protection
20
Nov
2025

Critical Twonky Server Flaws Let Hackers Bypass Login Protection

Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to steal administrator credentials and take…

Minimus debuts Image Creator for building secure, hardened container images
20
Nov
2025

Minimus debuts Image Creator for building secure, hardened container images

Minimus announced the general availability of Image Creator, a new feature that empowers customers to build their own hardened container…

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
20
Nov
2025

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Nov 20, 2025Ravie LakshmananCyber Warfare / Threat Intelligence Threat actors with ties to Iran engaged in cyber warfare as part…

Improve your program scope visibility
20
Nov
2025

Improve your program scope visibility

We’re excited to introduce Asset Groups, our latest feature designed to help structure mismanaged and broad program scopes for improved…

pi GPT Tool Turns Your Raspberry Pi into A ChatGPT Powered AI-managed device
20
Nov
2025

pi GPT Tool Turns Your Raspberry Pi into A ChatGPT Powered AI-managed device

pi GPT, a custom integration for OpenAI’s ChatGPT that transforms everyday Raspberry Pi devices into fully managed AI-powered workstations. Announced…

The confidence trap holding security back
20
Nov
2025

The confidence trap holding security back

Security leaders often feel prepared for a major cyber incident, but performance data shows a different reality. Teams continue to…

BlueCodeAgent helps developers secure AI-generated code
20
Nov
2025

BlueCodeAgent helps developers secure AI-generated code

When AI models generate code, they deliver power and risk at the same time for security teams. That tension is…