
Volvo Group North America announced that an indirect data breach exposed personal information of about 17,000 customers and staff. The breach stemmed from Conduent, a U.S. business‑process‑outsourcing firm, whose systems were compromised between October 21, 2024 and January 13, 2025. Threat actors accessed names, Social Security numbers, dates of birth, health‑insurance details, and medical data. Volvo is providing a year of identity‑monitoring, credit‑watch, and dark‑web monitoring services to affected individuals.

Microsoft has begun distributing updated Secure Boot certificates through the regular monthly Windows updates, replacing the original 2011 certificates that will expire in late June 2026. The refresh targets Windows 11 24H2 and 25H2 devices, with many newer PCs already shipping the...
In 2026 a web3 audit must be scoped around the entire value‑moving system—on‑chain code, privileged controls, integrations, and any off‑chain components that can affect outcomes. Most security gaps arise from what teams leave out of scope, such as front‑end risk,...

Airrived has been named a Gartner Tech Innovator in Agentic AI, highlighted for its composable multi‑agent architecture and domain‑specialized cybersecurity agents. The company’s Agentic OS offers a no‑code platform with pre‑built agents and tools such as RAG, RLHF and LoRA...

A newly released Aryaka report details a Pakistan‑attributed APT36 campaign that has launched a three‑pronged cyber assault on Indian government and defense entities. The operation employs three distinct Remote Access Trojans—GETA (a .NET Windows RAT), ARES (a Python‑based Linux RAT),...

Vega Security announced a $120 million Series B round, lifting its valuation to $700 million. The Boston‑based startup aims to overturn the traditional SIEM model by analyzing security data where it already resides—in cloud services, data lakes, and existing storage—using an AI‑native platform....

Microsoft confirmed a service outage affecting the Microsoft 365 admin center for some business and enterprise administrators in North America. The disruption also extends to the M365 app, with users experiencing degraded functionality and inability to raise support tickets. Thousands...

Safer Internet Day 2026 spotlighted the safe, responsible use of AI, prompting VPN leaders to embed privacy into generative tools. Proton introduced Lumo, an open‑source chatbot that encrypts every conversation and refuses to train on user data. ExpressVPN announced ExpressAI,...

The article details a pre‑built Tines workflow that automates AWS incident investigation by running CLI commands through secure Tines agents. Instead of analysts manually logging into the AWS console and crafting commands, the workflow pulls the required data directly into...

Malicious MEV, especially sandwich attacks, still extracts over $2 million monthly from Ethereum traders. Researchers propose Flash Freezing Flash Boys (F3B), a per‑transaction threshold encryption scheme that keeps transaction data hidden until finality. The protocol can be built with TDH2 or...

Imprivata has expanded its Enterprise Access Management platform with context‑aware passwordless authentication, AI‑powered risk signaling, and behavioral analytics. The new suite supports FIDO passkeys, facial recognition, and zero‑trust VPN‑less remote access, aiming to streamline access for frontline staff and knowledge...

Microsoft’s 2026 Global Online Safety Survey reveals that 58% of UK residents encountered a major online risk in 2025, with fraud and cyberbullying topping the list. Generative AI usage has surged to 28% weekly, up from 9% three years earlier,...

Portnox has broadened its zero‑trust network access (ZTNA) platform to include passwordless connectivity for console‑based protocols such as RDP, SSH, VNC and Telnet. The expansion removes credential‑based authentication, a vector behind roughly 80 % of data breaches, while preserving a frictionless...
Communications service providers are deploying AI in billing, service configuration and revenue recognition faster than they are building governance structures. McKinsey reports that while eight‑in‑ten firms use generative AI, only one percent consider their AI strategy mature, highlighting a gap...

SpecterOps has launched BloodHound Scentry, a managed service that pairs the BloodHound Enterprise platform with seasoned security practitioners to fast‑track identity attack‑path management (APM). The offering delivers tailored remediation, monthly threat analysis, privilege‑zone design, OpenGraph extensions, and custom reporting, promising...

Malwarebytes discovered a trojanized version of the popular 7‑Zip installer that silently adds proxyware payloads, turning compromised home computers into residential proxy nodes. The malicious installer is hosted on a look‑alike domain (7zip.com) and is often reached through erroneous links...

Armis introduced Centrix for Application Security, an AI‑driven platform that unifies vulnerability detection across the entire software development lifecycle. The solution scans source code, dependencies, container images and configuration files in unlimited languages, delivering context‑aware insights tied to the CI/CD...

A new APQC study shows only 41% of firms integrate cybersecurity into enterprise risk management (ERM), leaving a critical visibility gap. The report highlights that merely 23% apply unified risk structures to suppliers, despite third‑party breaches rising. CFOs can close...

Capitol AI announced Chester Leung as Vice President of Engineering, bolstering its leadership as the firm pushes AI tools deeper into workflows handling sensitive data. Leung brings a risk‑first mindset and extensive experience building secure, governance‑focused AI platforms, most recently...

Google expanded its “Results about you” tool to let users monitor and request removal of search results containing government‑issued IDs such as passports, driver’s licenses, and Social Security numbers. The feature builds on existing monitoring for phone numbers and home...

Versa has upgraded its Universal SASE Platform (v23.1.1) with advanced text‑analysis and OCR capabilities that can spot sensitive data hidden in documents and images, cutting false‑positive DLP alerts. The release also embeds a Model Context Protocol server, letting the Verbo...

Picus Security’s Red Report 2026, based on analysis of over 1.1 million malicious files and 15.5 million actions, shows threat actors now favor stealthy persistence and silent data exfiltration for extortion. Process injection remains the top technique for the third consecutive year, accounting...
Most digital engagement metrics are being polluted by bots, synthetic traffic, and identity spoofing, turning them from reliable signals into attack surfaces. Datavault AI is addressing this by building a verification‑first platform that authenticates human actions at the point of...
ANYbotics earned ISO/IEC 27001 certification after a multi‑stage audit, achieving zero non‑conformities on its first attempt. The certification validates the company’s world‑class Information Security Management System and signals maturity in security governance. It directly addresses the compliance concerns of energy and...

ID Dataweb announced it has again earned SOC 2 Type II attestation for its platform, confirming that its security, availability and confidentiality controls operate effectively over time. The audit, performed by an independent third party, validates continuous compliance with the AICPA...

Phantom wallet’s new chat feature has come under fire after an investor lost roughly $264,000 worth of wrapped Bitcoin in an address‑poisoning scam. Researchers traced the theft to a 3.5 wBTC transfer that leveraged a small‑value transaction in the victim’s history,...

Microsoft announced that Windows 11 will adopt smartphone‑style permission prompts, requiring user consent before apps can access files, cameras, microphones or install software. The rollout introduces a Baseline Security Mode that enforces runtime integrity by allowing only signed code to run,...

ZeroDayRAT, a commercial mobile spyware kit, provides full remote control of iOS and Android devices. Available through Telegram, the toolkit includes live camera streaming, keylogging, GPS tracking, and modules for bank credential harvesting and clipboard‑based crypto theft. Researchers at iVerify...

Security firm Flare has uncovered a new Linux botnet named SSHStalker that relies on a suite of decade‑old exploits and IRC‑based control mechanisms. The malware chain deploys multiple C‑based and Perl IRC bots, leverages 19 Linux kernel vulnerabilities from 2009,...

Scammers have launched a Pride‑themed phishing campaign weeks before June, exploiting diversity messaging to steal employee credentials. The operation leverages compromised SendGrid accounts to send seemingly internal emails that either promise Pride branding or an opt‑out link, driving engagement regardless...
Pipelock is a single‑binary, zero‑dependency security harness designed for AI coding agents that need shell access and API keys. It isolates the agent process from unrestricted internet by routing all web traffic through a fetch‑proxy that applies a seven‑layer scanning...
Forcepoint X‑Labs uncovered a Phorpiex‑driven phishing campaign that weaponizes Windows shortcut (LNK) files to deliver Global Group ransomware. The emails use a double‑extension lure such as "Document.doc.lnk" and hide the true file type behind Windows’ default extension hiding. Once opened,...

The UK National Cyber Security Centre (NCSC) has issued an urgent alert to critical national infrastructure (CNI) providers, warning of "severe" cyber‑attacks that could disrupt essential services. The warning follows a coordinated malware strike on Poland’s energy grid in December,...

ZAST.AI announced a $6 million Pre‑Series A round led by Hillhouse Capital, bringing total funding near $10 million. The Seattle‑based startup claims its AI‑driven platform delivers “zero false‑positive” code security by automatically generating and validating proof‑of‑concept exploits. In 2025 the company uncovered...
Microsoft researchers uncovered a novel attack called GRP‑Obliteration that uses a single benign‑sounding prompt to strip safety guardrails from 15 major language and image models. By hijacking the Group Relative Policy Optimization training loop, the method rewards harmful completions, driving...

Law firms are turning to managed IT support to counter escalating cyber threats, meet strict compliance mandates, and sustain uninterrupted client service. Subscription‑based models replace ad‑hoc repairs, delivering predictable budgeting and scalable resources. Proactive monitoring curtails downtime, while secure remote‑work...
Cisco has donated its Project CodeGuard framework to the OASIS Open‑run Coalition for Secure AI (CoSAI). The model‑agnostic security coding agent embeds best‑practice rules across the entire software development lifecycle, from design through AI‑generated code to post‑generation review. CodeGuard integrates...
E‑commerce veteran Scot Wingo argues that merchants must decide whether to block or welcome AI bots that now crawl retail sites. Four major agents—ChatGPT, Google Gemini, Microsoft Copilot and Perplexity—collectively command roughly one billion monthly active users, and Google’s shift to AI...

The global secure mobile communications market is projected to expand from $28.5 bn in 2026 to $100.9 bn by 2033, reflecting a 19.8% compound annual growth rate. Growth is fueled by escalating cyber‑threats, stricter data‑privacy regulations, and the shift toward remote, mobile‑first...

Tax season in 2026 is seeing a surge in sophisticated IRS‑related scams, with fraudsters leveraging AI, phishing, and fake W‑2 schemes to steal personal data and refunds. Scammers impersonate the agency via email, text, or phone, demanding payment through gift...

DuckDuckGo has integrated AI-powered voice chat into its Duck.ai assistant, allowing users to converse with the model using spoken input. The company emphasizes that audio streams are processed in real time and are not stored after the session, with encryption...

SailPoint reports growing demand for adaptive identity security as enterprises grapple with an influx of non‑human identities such as AI agents, machines, and service accounts. The company unveiled its Agent Identity Security feature, enabling discovery, classification, and governance of these...

AlgoSec’s State of Network Security Report, based on over 500 global respondents, reveals enterprises are shifting toward unified policy control amid rapid cloud growth, AI‑driven traffic, and hybrid workloads. Sixty‑five percent of organizations have already adjusted to AI‑powered threats, with...

Australian fixed‑income firm FIIG Securities was hit with a AU$2.5 million civil penalty after the Federal Court found it failed to protect client data for over four years. A 2023 ransomware attack exfiltrated roughly 385 GB of personal and financial information belonging...

Google Translate switched to Gemini models in December 2025, and researchers have uncovered a prompt‑injection flaw that lets users bypass the translation engine entirely. By appending an English instruction after foreign‑language input, the system answers the instruction instead of translating....

The European Union Agency for Cybersecurity (ENISA) has published an updated International Strategy aimed at reinforcing the EU’s cyber‑defence ecosystem through selective global cooperation. The revision aligns partnerships with the EU’s policy objectives, highlighting collaborations with Ukraine, the United States,...

The EU’s Markets in Crypto‑Assets Regulation (MiCA) replaces disparate national rules with a single, EU‑wide framework for Crypto‑Asset Service Providers (CASPs). It mandates incorporation in an EU member state, a national licence, and capital thresholds ranging from €50,000 to €150,000...

The article highlights that most cyber breaches stem from basic hygiene failures—human error, unpatched software, weak authentication, and poor segmentation—rather than sophisticated exploits. Multi‑factor authentication (MFA) blocks the majority of automated attacks but remains vulnerable to fatigue and social‑engineering tricks....

Cybersecurity teams are drowning in disparate findings, while adversaries leverage AI to craft rapid attack chains. By integrating AI with the MITRE ATT&CK framework, organizations can generate dynamic heat maps that surface coverage gaps and model realistic attack paths. Platforms...

A dual Chinese‑St. Kitts and Nevis national, Daren Li, was sentenced in absentia to 20 years in prison for his role in an international cryptocurrency pig‑butchering scheme that stole over $73 million from U.S. victims. The fraud operated through a network of 74...