
Bandit is an open‑source Python security scanner maintained by the PyCQA community. It parses source files and flags risky patterns such as unsafe eval calls, weak cryptography, hard‑coded credentials, and insecure temporary file handling. Each finding is annotated with severity and confidence scores, allowing teams to prioritize remediation. The tool integrates easily with CI pipelines, supports configuration via command‑line or pyproject.toml, and offers baseline reporting to isolate new issues.

Penetration testing has shifted from static, point‑in‑time reports to continuous, outcome‑driven programs. Modern teams now demand real‑time delivery, automated routing of findings, and closed‑loop validation to reduce risk. Platforms like PlexTrac enable centralized visibility, integration with ticketing tools, and automated...

Security and risk teams still rely heavily on manual GRC processes, spending thousands of person‑hours each year collecting evidence and preparing audits. While organizations adopt automation for policy management and evidence gathering, deeper workflow automation and continuous controls monitoring remain...
.webp?ssl=1)
A new phishing campaign is using LinkedIn private messages to deliver remote access trojans to enterprise networks. Attackers send self‑extracting WinRAR archives that contain a legitimate PDF reader, a malicious DLL, and a portable Python interpreter. The DLL is loaded...

The article warns that generative AI is reshaping email insider threats, turning everyday tools like grammar checkers into vectors for intellectual property loss. Attackers now use AI‑crafted phishing emails and malicious attachments that bypass traditional filters, while browser extensions silently...

NSFOCUS has been placed in the Star Quadrant of MarketsandMarkets' Global DDoS Protection and Mitigation Security Market Forecast to 2030, marking its entry into the industry’s top tier. The ranking reflects NSFOCUS’s mature technology stack, broad solution portfolio, and expanding...
Businesses are abandoning passwords for B2C apps, citing high friction and security risks. Password resets cost about $70 each and cause significant support expenses, while passwordless solutions can boost conversion rates by more than 10%. The CIAM market is expanding,...
Data destruction is now a strategic imperative, requiring more than simple file deletion. Certified IT asset disposition (ITAD) vendors, especially those with R2v3, Appendix B, and Appendix C credentials, guarantee logical sanitization, physical destruction, and secure refurbishment. These certifications provide...
Coherent Corp. and Quside have demonstrated a mass‑manufacturable quantum entropy source using Coherent’s 6‑inch VCSEL line combined with Quside’s QRNG technology. The system generates true, verifiable randomness by measuring VCSEL phase fluctuations and includes real‑time entropy monitoring to detect tampering....
Everest ransomware announced a breach of McDonald’s India, claiming to have stolen 861 GB of customer and internal data. The leaked material reportedly contains financial reports, ERP migration files, investor contact lists, and store‑level employee details. HackRead published screenshots to substantiate...

Barnegat Township Police warned New Jersey residents of a hybrid fraud scheme that combines phone spoofing with a physical courier pickup to steal debit cards. Criminals pose as bank fraud agents, claim unauthorized out‑of‑state activity, and arrange a courier to...

Enzoic’s real‑time breach alerts can now be piped into Microsoft Sentinel using Azure Logic Apps, turning each webhook into a Sentinel incident. The guide walks through provisioning a Log Analytics workspace, creating a consumption‑based Logic App, parsing Enzoic’s JSON payload,...

UStrive, a nonprofit mentoring platform for students, fixed a security lapse that let any logged‑in user view personal data of others, including children. The flaw stemmed from a vulnerable Amazon‑hosted GraphQL endpoint, exposing at least 238,000 records containing names, emails,...

Mend.io launched an interactive AI Security Maturity Survey and a companion Compliance Checklist to help organizations assess and document AI risk. The tools map to OWASP AIMA, NIST AI RMF, ISO 42001 and the upcoming EU AI Act, delivering a personalized...
Airlock Digital released an independent Total Economic Impact study by Forrester Consulting showing a 224% return on investment and a $3.8 million net present value over three years for its allow‑listing solution. The research reports more than a 25% reduction in...

Zendesk reported a wave of mass spam campaigns that exploit its customer‑service platform to send phishing emails. The messages appear to originate from legitimate Zendesk subdomains, tricking recipients into opening malicious links. Zendesk clarified that the campaigns are not linked...

Researchers at NDSS 2025 examined defensive domain registrations by Fortune 500 firms, uncovering 19,523 domains registered across 447 companies. The study found most firms register only a handful of domains, yet they collectively rely heavily on online brand protection (OBP)...

Cybersecurity leaders are trapped in a zero‑risk mindset, chasing perfect audit scores while real threats evolve. The article argues that this pursuit leads to burnout, misallocated resources, and a false sense of security. It proposes a shift toward ruthless risk...

The European Commission has unveiled a comprehensive cybersecurity package that gives it authority to conduct EU‑wide risk assessments and restrict high‑risk foreign suppliers in critical telecom infrastructure. The proposal builds on the voluntary 5G Security Toolbox and expands the Cybersecurity...

2025 marked a turning point for space cybersecurity as the National Reconnaissance Office unveiled a centralized Space Cyber Program, while Ukraine publicly confirmed a 2023 hack on Russia’s Dozor‑Teleport satellite network. Academic research revealed that low‑cost satellite receivers can capture...

Data centers now feature layered physical safeguards, redundant systems and zero‑trust digital controls, creating a robust perimeter. Despite these defenses, most breaches stem from human error, especially phishing and weak passwords. The article highlights that 90 % of 2021 data breaches...
Digital wallets are evolving beyond UI to prioritize security architecture, payment infrastructure, and regulatory intelligence for 2026. Agentic commerce will enable AI agents to execute transactions autonomously, requiring cryptographic consent and continuous trust orchestration. Multi‑biometric authentication, AI‑driven predictive security, and...
High Lander Aviation, Abu Dhabi’s Technology Innovation Institute (TII) and venture builder VentureOne announced a strategic collaboration at UMEX 2026 to develop national‑level zero‑trust security standards for unmanned traffic management (UTM) in the UAE. The partnership will focus on end‑to‑end security...

E‑commerce retailers are shifting Philippine outsourcing from a pure cost play to a fraud‑resilience strategy as cyber threats intensify. Leading BPOs now embed machine‑learning, behavioral analytics, device intelligence and seasoned fraud analysts, delivering 40‑60% lower fraud losses, 50‑70% fewer false...

In 2024, smart‑contract vulnerabilities cost the Web3 ecosystem $1.42 billion across 149 incidents, with access‑control flaws alone responsible for $953.2 million. While the community debates perfect AI solutions, current AI‑powered static analysis tools already capture roughly 80 % of known issues, and models...

Cybersecurity AIOps combines AI, machine learning, and automation to transform traditional security operations. It enables real‑time threat detection, reduces human error, and shifts defenses from reactive to proactive. Key strategies include predictive analytics, automated response, alert prioritization, cross‑team collaboration, and...

Security vendors increasingly market ‘integrated’ platforms as a way to simplify protection, but most are merely stitched collections of separate tools. This architectural shortcut leaves each product with its own data model, causing delayed correlation and siloed response actions that...

Signaloid announced that it has earned a SOC 2 Type II attestation, concluding a three‑month audit of its cloud infrastructure, data‑processing pipelines, and operational controls. The audit, performed by compliance specialist A‑LIGN, covered the period from July 1 to September 30, 2025,...
Sprocket Security announced the appointment of Eric Sheridan as its new Chief Technology Officer. Sheridan brings decades of cybersecurity and software engineering experience, along with multiple patents, to guide the firm’s technology vision. In his role, he will oversee engineering...

Identity Threat Detection & Response (ITDR) is positioned as the core security strategy for 2026, shifting focus from perimeter defenses to monitoring compromised accounts. The article highlights that identity‑based attacks are the most common threat, and traditional controls like MFA...

Universidad Politécnica de Madrid and Q*Bird have deployed Spain’s first operational multi‑node measurement‑device‑independent quantum key distribution (MDI‑QKD) network in Madrid. The hub‑and‑spoke architecture links two INTA facilities and the Ministry of the Interior’s SGSICS site, using Q*Bird’s Falqon® MQX4000 hub...

Ping Identity introduced Universal Services, a continuous identity assurance suite that extends trust beyond the login event to every digital interaction. The offering integrates with any existing identity provider via standard APIs, allowing enterprises to validate, re‑verify, and adapt protections...
South Korea’s largest mobile carrier, SK Telecom, has filed a lawsuit with the Seoul Administrative Court to overturn a record 135 billion‑won (US$91 million) fine imposed by the Personal Information Protection Commission for a massive data breach. The breach, disclosed belatedly, exposed...
Crypto criminals are increasingly buying stolen consumer databases to pinpoint high‑net‑worth individuals and siphon cryptocurrency. A breach at luxury conglomerate Kering exposed millions of shopper records, which a hacker purchased for $300,000 and cross‑referenced with other leaks. Using the combined...
Former defence secretary Sir Ben Wallace criticised the use of a secret gagging order to conceal a massive data breach at the Ministry of Defence that exposed the personal details of thousands of Afghan collaborators. The breach occurred after an...

PwC’s 29th Global CEO Survey reveals cyber risk has risen to a top‑three threat alongside macroeconomic volatility, with 31 % of CEOs rating their firms as highly or extremely exposed to significant financial loss from cyber attacks in the coming year....

HackerOne introduced the Good Faith AI Research Safe Harbor, a framework that grants legal protection to researchers testing AI systems in good faith. Building on its 2022 Gold Standard Safe Harbor for traditional software, the new program clarifies authorization, limits...

Two critical flaws were discovered in the open‑source AI framework Chainlit, allowing arbitrary file reads (CVE‑2026‑22218) and server‑side request forgery (CVE‑2026‑22219). The vulnerabilities can expose environment variables, API keys and cloud credentials, and enable attackers to forge authentication tokens for...

The City of London Police has unveiled a national "Report Fraud" service, replacing the older Action Fraud programme. The platform offers victims and businesses across England, Wales and Northern Ireland a single gateway to report cyber crime and fraud. By centralising...
In 2025 the healthcare sector saw breach incidents more than double, yet the total number of patient records exposed dropped sharply. The Fortified Health Security report, based on HHS OCR data, its own NIST Cybersecurity Framework assessments, and incident‑response experience,...
North West Ambulance Service NHS Trust disclosed nearly 400 data‑breach incidents over the past three years, with reports climbing from 75 breaches in 2022/23 to 143 the following year and 172 in the most recent period. Confidentiality failures dominated, accounting...

Security operations centers are plagued by alert fatigue because many tools are selected by executives without input from analysts. A BleepingComputer webinar on Jan. 29 will feature Sumo Logic experts discussing the disconnect between purchasing decisions and SOC needs. The session...
RansomHouse, a ransomware‑extortion group, alleges it breached Luxshare Precision Industry, a major Apple manufacturing partner, and accessed sensitive engineering data such as 3D CAD and PCB files. The group posted a victim profile on its dark‑web leak site, listing Apple...

Anthropic has patched three critical flaws in its Git MCP server that could be chained with the Filesystem MCP server to achieve remote code execution via prompt injection. The vulnerabilities – CVE‑2025‑68145 (path‑validation bypass), CVE‑2025‑68143 (unrestricted git_init), and CVE‑2025‑68144 (git_diff...
.webp?ssl=1)
Apache Airflow released version 3.1.6 to fix two credential‑exposure flaws (CVE‑2025‑68675 and CVE‑2025‑68438). The first flaw logged proxy URLs with embedded usernames and passwords, while the second allowed unmasked API keys and tokens in the Rendered Templates UI. Both issues affect...

Endace released OSm 7.3, a major update that dramatically speeds packet‑capture search and adds a Vault REST API for automated forensic data access. The new search engine delivers up to 50‑fold performance gains, cutting typical query times from nearly a minute...

Group‑IB warns that cybercrime has entered a fifth wave powered by weaponized AI, accelerating attacks with generative tools. Dark‑web marketplaces now sell synthetic identity kits and deep‑fake‑as‑a‑service for as little as $5, while AI‑enhanced phishing kits automate victim targeting and...

Orchid Security highlights the growing threat of orphan accounts—unused human, service, and AI identities that remain active across enterprise environments due to fragmented IAM and IGA processes. These hidden credentials, often with elevated privileges, have been leveraged in high‑profile breaches...

Radware announced its API Security Service, an end‑to‑end platform that safeguards APIs throughout their entire lifecycle using live production traffic. The solution tackles OWASP Top 10 API risks, including sophisticated Layer 7 DDoS attacks, by delivering continuous discovery, runtime posture management, and...