
Reality Defender partners with Orange Business to embed deep‑fake detection
U.S. AI‑security firm Reality Defender has signed a deal to integrate its multimodal deep‑fake detection technology into Orange Business, the enterprise arm of French telecom giant Orange. The solution will safeguard Orange’s video‑conferencing, contact‑center and voice‑telephony services through real‑time, API‑driven analysis of audio, video, images and documents.
Also developing:

Within weeks, two state Departments of Human Services suffered separate data breaches, exposing personal information for nearly one million residents. In Illinois, a misconfigured map inadvertently displayed details of about 700,000 individuals, including Medicaid recipients, while Minnesota’s MnCHOICES system was accessed by an over‑privileged user, leaking comprehensive PII for roughly 304,000 people. Both incidents involve public‑sector data handling failures, and authorities have not yet determined the extent of misuse. The breaches underscore growing cybersecurity challenges for government agencies.
A New York Times report highlighted an early Bitcoin investor who lost access to a $220 million stash after forgetting his wallet password, underscoring the high‑stakes nature of self‑custody. The article explains that only when the encrypted wallet file is available can a...
Oracle has disclosed CVE‑2026‑21962, a critical flaw in its Fusion Middleware WebLogic proxy plug‑ins that permits unauthenticated attackers to compromise Oracle HTTP Server over HTTP. The vulnerability affects Oracle HTTP Server versions 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0, as well as the...

CyberNut, a Miami‑based startup, closed a $5 million minority growth equity round led by Growth Street Partners to scale its K‑12 cybersecurity awareness platform. The company, which emerged from stealth in May 2024 after raising $800,000 in pre‑seed capital, already serves over...

The paper presented at NDSS 2025 reveals a new, sophisticated phishing vector on Ethereum called payload‑based transaction phishing (PTXPHISH). Researchers built the first ground‑truth dataset of 5,000 phishing transactions and identified four main tactics across eleven sub‑categories. Their rule‑based detection...

AppOmni released an ROI report showing SaaS security delivers tangible operational benefits quickly. Customers reported saving roughly 146 manual hours each month and a 24% reduction in audit findings after gaining visibility. The study found measurable value within two weeks...

WISeKey International unveiled SEALCOIN, a space‑based, quantum‑resistant crypto platform, at Davos 2026. The system uses the WISeSat low‑Earth‑orbit constellation to generate cryptographic signatures directly onboard satellites, extending blockchain transactions beyond terrestrial networks. Its native QAIT token will fuel machine‑to‑machine value exchange,...

Attackers are abandoning noisy, brute‑force attacks for stealth‑first, multi‑stage malware that can linger for weeks. OPSWAT telemetry shows a 127% rise in malware complexity and an increase from eight to 18 behavioral nodes per sample in six months. Traditional signature‑based...

A sophisticated loan‑phishing campaign in Peru, uncovered by Group‑IB, uses fake loan applications to harvest valid bank card numbers and six‑digit PINs. The operation impersonates a leading Peruvian bank across 16 dedicated domains and more than 370 related sites, employing...
AI was the accelerant on a perverse incentive fire sparked by bug bounty platforms that reward spray & pray. Both open source & orgs without dedicated vuln response teams get overloaded when they offer cash there. cURL is right to...

Tonic.ai has added upsert capabilities to its test‑data platform, allowing teams to insert new records while updating existing ones without overwriting valuable test data. The feature supports preserving legacy fixtures, merging multiple data subsets, and retaining mock data for unreleased...
Check Point unveiled Exposure Management, a platform that fuses threat intelligence, vulnerability prioritization, and automated remediation into a single workflow. The solution offers real‑time situational awareness by correlating dark‑web insights, exploitability context, and attack‑surface visibility. It integrates with more than...

Realm introduced Data Haven, a dedicated long‑term log archive that separates storage from real‑time SIEM detection. The platform automatically routes all telemetry to secure, low‑cost storage without manual configuration and normalizes logs on ingest. Analysts retrieve archived data by simple...

Cohesity has introduced Identity Threat Detection and Response (ITDR) capabilities, extending its Identity Resilience suite to protect Active Directory and Microsoft Entra ID. The solution continuously monitors identity posture, flags risky changes, and detects attack patterns before an incident. During...
NEW: BTQ is partnering with ITRI to build a new chip architecture for post-quantum security. $BTQ ’s QCIM targets lower-power cryptography, and is now moving into silicon validation with ITRI, the incubator behind $TSMC.

AI‑assisted development now dominates software creation, with 92% of developers using tools like GitHub Copilot and AI‑generated code comprising roughly 40% of new code. Traditional application security controls, designed for post‑commit review, fail to see code at the moment it...
Stellar Cyber announced the appointment of Eric van Sommeren as Vice President of EMEA, accelerating the firm’s push into Europe, the Middle East and Africa. Van Sommeren brings senior leadership experience from SentinelOne, Palo Alto Networks and Corelight, positioning the company...

XBOW has named former Samsung SDS penetration‑testing leader WonLae Lee as General Manager for South Korea, tasking him with spearheading the company’s Asia‑Pacific expansion. Lee brings three decades of Red Team, vulnerability research and incident‑response experience to the autonomous offensive...

Furl, a security remediation platform, closed a $10 million seed round led by Ten Eleven Ventures, with participation from Rapid7 CEO Corey Thomas and Open Opportunity Fund. The company targets the chronic execution gap in cybersecurity, where only one in ten...
Veritensor launches as a zero‑trust security solution for the AI model supply chain, offering deep static analysis and cryptographic verification of popular model formats such as Pickle, PyTorch, Keras, GGUF, and Python wheels. The tool can detect malicious code—including RCE,...

Vectra AI unveiled a next‑generation platform designed to safeguard the emerging AI enterprise, where machine‑speed workloads span on‑premises, multi‑cloud, SaaS, IoT and edge environments. The solution delivers unified observability, automatically discovers AI agents as first‑class identities, and uses behavior‑driven AI...

aiFWall Inc emerged from stealth, releasing a free AI firewall that protects both inbound prompts and outbound responses of agentic AI deployments. The product leverages contextual analysis and a central AI engine to create just‑in‑time threat markers from malicious prompts....

Sumo Logic announced two new applications for Snowflake and Databricks that enhance real‑time visibility into data pipelines. The Snowflake Logs App provides login analytics, query performance insights, and centralized log correlation, while the Databricks Audit App offers unified monitoring of...

Nightfall unveiled an AI Browser Security solution that protects browsers, endpoints, and SaaS applications from real‑time data theft driven by AI tools. The offering intercepts uploads, clipboard pastes, screenshots and other browser‑based actions that traditional DLP cannot see. Powered by...

Security researchers discovered that dozens of publicly exposed, intentionally vulnerable training applications—such as Hackazon, OWASP Juice Shop, DVWA and bWAPP—are being run on real cloud infrastructure. These apps often carry over‑permissioned IAM roles, allowing attackers to harvest temporary credentials and...
Pentera uncovered nearly 2,000 publicly exposed security‑testing web apps—such as DVWA, Juice Shop and bWAPP—hosted on AWS, GCP and Azure. These intentionally vulnerable tools were linked to over‑privileged IAM roles, allowing attackers to steal cloud credentials and gain admin access....

The article argues that the United States must accelerate digital transformation in its national‑security space architecture to maintain deterrence against a rapidly modernizing China. It highlights current shortcomings such as legacy single‑prime contracts, stovepiped systems, and slow acquisition cycles that...

GitLab announced patches for a high‑severity two‑factor authentication bypass (CVE‑2026‑0723) and multiple denial‑of‑service flaws affecting both Community and Enterprise editions. The 2FA bypass lets attackers with a known account ID circumvent the second factor, while CVE‑2025‑13927 and CVE‑2025‑13928 enable unauthenticated...
Reflectiz’s 2026 State of Web Exposure Research reveals that 64 % of third‑party applications on 4,700 leading websites access sensitive data without a legitimate business justification, up from 51 % a year earlier. The study also shows a sharp rise in malicious...

Microsoft Azure’s Private Endpoint design has a DNS flaw that can turn secure Private Link connections into denial‑of‑service conditions. When a Private DNS zone is linked across multiple virtual networks, Azure prefers that zone for name resolution; if the target...

North Korean threat actors have launched a new campaign that abuses Visual Studio Code task configuration files to deliver macOS malware. The attackers masquerade as recruiters, enticing developers to clone malicious GitHub or GitLab repositories under the guise of job...

The Rust package registry crates.io has introduced a Security tab that surfaces RustSec advisories and flags vulnerable versions on each crate page. Publishing workflows were enhanced with Trusted Publishing support for GitLab CI/CD, enabling OIDC‑based authentication without long‑lived tokens. New...
[New Episode] The Billion Dollar Fraud Crisis Most Banks Are Missing. With @shanthi_peace, CEO of Casap. Watch the latest episode now: https://t.co/aCTj9YH63K https://t.co/dJky1nDo6a

Prompt injection exploits the textual nature of large language models, allowing users to bypass safety guardrails with cleverly phrased commands. The article compares this vulnerability to a fast‑food worker refusing to hand over a cash drawer, highlighting how humans rely...

DigitalOcean announced Vinay Kumar as its new Chief Product and Technology Officer, tasked with steering product strategy, cloud infrastructure, and security as the firm expands its AI inference cloud. Kumar, a founding member of Oracle Cloud Infrastructure and former AWS...

Marks & Spencer’s chief technology officer Josie Smith is leaving the firm, a move that comes nine months after a ransomware attack by the Scattered Spiders group wiped out roughly £229 million and halved the retailer’s 2025 profit. The breach forced...
Advanced Family Surgery Center, part of Covenant Health, was notified by the Genesis hacking group on November 26 2025 that its systems had been compromised and 100 GB of sensitive data—including protected health information—had been exfiltrated. Genesis later posted a file‑tree on a...

Enterprise MFA usage has reached roughly 70% in early 2025, cementing it as a core defense against automated attacks. Yet cybercriminals exploit AI‑driven phishing, SIM swapping, and credential theft to bypass even strong multi‑factor controls. Recent data shows a 63%...
Security researchers at Pwn2Own Automotive 2026 demonstrated 37 zero‑day vulnerabilities in Tesla's infotainment system, earning $516,500 on day one. Synacktiv secured $35,000 by chaining an information leak and out‑of‑bounds write to gain root, while other teams exploited EV chargers and navigation...
A recent open letter warns that internet voting remains fundamentally insecure, with no existing or foreseeable technology able to guarantee its safety. Despite decades of academic consensus, vendors continue to market online voting solutions as secure. The letter specifically calls...

SecurityWeek’s Cyber Insights 2026 warns that APIs, already handling roughly 83 % of internet traffic, will become even more critical as agentic AI proliferates. The rise of autonomous AI agents is set to double the number of API endpoints by 2026, expanding...
Enterprise software vendors are accelerating the retirement of perpetual‑license products, declaring many versions End of Availability and pushing customers toward cloud‑based SaaS suites. While the shift may raise short‑term costs, research shows that modern subscription models deliver better cybersecurity, functionality,...

Adversa AI’s Agentic AI Security Platform has been named a winner in the 2026 BIG Innovation Awards for Innovative Products – Software, as announced by the Business Intelligence Group. The platform tackles the emerging attack surface of autonomous AI agents,...

Enterprises accelerating AI adoption face a critical gap in identity verification. A GBG report shows 31% of businesses struggle to detect fraud during onboarding, exposing AI workflows to manipulation. Enterprise‑grade verification combines biometrics, document validation, API checks, MFA and continuous...

Researchers at Luleå University of Technology introduced QERS, a Quantum Encryption Resilience Score that evaluates post‑quantum cryptography (PQC) suitability for IoT and IIoT devices. The framework aggregates six normalized metrics—latency, packet reliability, CPU load, energy use, RSSI, and key size—into...

ErrTraffic is a traffic‑distribution system that powers ClickFix social‑engineering attacks by deliberately corrupting website visuals—a technique dubbed “GlitchFix.” When a victim visits a compromised page, the script distorts text, CSS and cursor movement before presenting a fake update prompt that...

LastPass disclosed an active phishing campaign that began around January 19, 2026, in which attackers impersonated the service with urgent‑maintenance emails to harvest master passwords. The messages contain links to an Amazon S3‑hosted page that redirects to a counterfeit LastPass...

Oracle has issued its first Critical Patch Update for 2026, delivering 337 security patches that address roughly 230 unique CVEs across more than 30 products. More than two dozen of the fixes target critical‑severity bugs, and over 235 patches remediate...

Signal founder Moxie Marlinspike has launched Confer, a privacy‑first AI chatbot that encrypts every conversation end‑to‑end. The service uses passkey authentication, server‑side encryption, and runs in a Trusted Execution Environment to prevent data leakage. A free tier allows 20 messages...

Gartner’s inaugural Magic Quadrant introduces Exposure Assessment Platforms (EAP) as a formal replacement for traditional vulnerability management, emphasizing Continuous Threat Exposure Management. The report evaluated 20 vendors on continuous discovery, risk‑informed prioritization, and cross‑environment visibility. Data shows 74 % of identified...