Features

ZEST Security Adds AI Agents to Identify Vulnerabilities That Pose No Actual Risk

ZEST Security Adds AI Agents to Identify Vulnerabilities That Pose No Actual Risk

ZEST Security introduces AI Sweeper Agents that identify which vulnerabilities are truly exploitable, helping security teams cut patch backlogs and focus on real risk ... Read More
Microsoft Windows malware software supply chain

VoidLink Represents the Future of AI-Developed Malware: Check Point

Check Point dug into the details of VoidLink and found a sophisticated and quickly developed malware that was mostly generated using AI and putting a spotlight on what the future of cyber threats looks like ... Read More
facial recognition, surveillance, camera, security, data

Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance

The privacy rights group Fight for the Future was one of 44 organizations that sent a letter to lawmakers urging them to pull back on funding for ICE, noting the growing threats to U.S. citizens and others as the agency spends millions of dollars on its growing surveillance capabilities ... Read More
Exploiting Google Gemini to Abuse Calendar Invites Illustrates AI Threats

Exploiting Google Gemini to Abuse Calendar Invites Illustrates AI Threats

Researchers with security firm Miggo used an indirect prompt injection technique to manipulate Google's Gemini AI assistant to access and leak private data in Google Calendar events, highlighting the challenges AI presents that traditional security measures can't address ... Read More
FTC, privacy, AI privacy lawsuits court

Hacker Pleads Guilty to Access Supreme Court, AmeriCorps, VA Systems

Nicholas Moore, a 24-year-old Tennessee man, pleaded guilty to using stolen credentials of authorized users to hack into computer systems of the Supreme Court, VA, and AmeriCorps, obtaining sensitive information and then posting it online to his Instagram account ... Read More
Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters

Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters

ICE protests surveillance yet uses tech to track citizens' devices, possibly violating privacy laws and the Fourth Amendment, revealed through ICE's data tools ... Read More
vulnerability, patch, Cisco, flaw, patch, vulnerabilities, Cato, patch, automation, patch management, Action1 patching cyberattacks JumpCloud patching

JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability

JFrog this week published an analysis of a vulnerability in Redis databases that may be more serious than initially thought following the discovery of a remote code execution (RCE) exploit. Researchers found that a stack buffer overflow vulnerability in Redis (CVE-2025-62507) can be used to run the XACKDEL command with ... Read More
prompt cyberattacks trust certifications remote work office cybersecurity awareness Cyber Aware With Micro-Learning

Vulnerability in Anthropic’s Claude Code Shows Up in Cowork

PromptArmor threat researchers uncovered a vulnerability in Anthropic's new Cowork that already was detected in the AI company's Claude Code developer tool, and which allows a threat actor to trick the agent into uploading a victim's sensitive files to their own Anthropic account ... Read More
hacker, scam, Email, fraud, scam fraud

Cyber Fraud, Not Ransomware, is Now Businesses’ Top Security Concern

In a report a week before its Davos conference, the World Economic Foundation said 64% world business leaders are most worried about cyber fraud, replacing ransomware at their top concern. AI vulnerabilities also ranked high, as did threats fueled by geopolitics. The group argued that a coordinated approach to cybersecurity ... Read More