Enterprise security teams are losing ground to AI-enabled attacks — not because defenses are weak, but because the threat model has shifted. As AI agents move into production, attackers are exploiting ...
Aura says a phishing attack led to a data breach affecting nearly 900,000 records, including names, emails, addresses and ...
CSMA links siloed security tools into attack paths to crown jewels, exposing hidden risks and enabling faster remediation.
I have always been a fan of Logitech mice, I mean, who isn’t? But I’m not a fan of reading the words “Logitech International S.A. ("Logitech") recently experienced a cybersecurity incident relating to ...
With exploitation of vulnerabilities taking just days, preemptive security must be the new model for defenders.
The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach ...
A new cybersecurity warning reveals how hackers briefly weaponized ChatGPT's Deep Research tool. The attack, called ShadowLeak, allowed them to steal Gmail data through a single invisible prompt — no ...
When detection capabilities lag behind model capabilities, organizations create a structural gap that attackers are ...
Even in an area of cybersecurity as essential as data protection, the stakes continue to climb higher in 2025. The pressures have mounted both from the intensification of data theft and extortion ...