Three vulnerabilities in Google’s Gemini AI tools exposed risks in Cloud Assist, Search, and Browsing — allowing prompt injection, logic manipulation, and stealth data leaks before being patched.
As AI becomes more ingrained in business strategies, CISOs are re-examining their security organizations to keep up with the pace and potential of the technology.
IT job recruitment scams now include security leadership roles. One CISO offers a blow-by-blow account of a fake job scam launched in the months after he applied for a position.
A Chinese-speaking cybercrime group is aggressively targeting vulnerable Internet Information Server (IIS) web servers for use in search engine optimization (SEO) fraud, as well as for the theft of ...
The Scattered Lapsus$ Hunters gang, which says it has stolen data from the Salesforce instances of dozens of international companies in recent months, upped its extortion game today by listing their ...
Red Hat has updated its OpenShift AI Service after discovering a vulnerability with a CVSS rating of 9.9 that would allow an attacker to take full control of a cluster and any applications running on ...
As Trump’s cyber spending cuts and CISA firings weaken defenses, the latest government shutdown leaves federal networks even more exposed to nation-state and criminal hackers looking to exploit ...
Cl0p-linked threat actors are targeting Oracle E-Business Suite users with spear-phishing emails claiming theft of sensitive ERP data.
Surge in vulnerabilities and exploits leaving overloaded security teams with little recourse but to embrace risk-based approaches to patching what they can.
The expiration of a landmark cybersecurity law strips liability protections for cyber threat information sharing, leaving US cyber defenses weaker until lawmakers act.
The cloud SIEM is gaining long-term data lake log storage, AI graph visualization, support for MCP, and a way to interact with custom agents built in Security Copilot, but it’s unclear yet whether ...
The lakehouse provider aims to unify security data and respond to AI threats faster without replacing existing tools.