Tag: control
-
APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL – Part 1
Tags: access, adobe, ai, antivirus, api, apt, attack, authentication, backdoor, backup, cloud, control, data, data-breach, detection, email, endpoint, github, google, government, group, india, infection, infrastructure, injection, Internet, malicious, malware, microsoft, network, phishing, service, spear-phishing, threat, tool, update, windowsIntroductionIn September 2025, Zscaler ThreatLabz identified two campaigns, tracked as Gopher Strike and Sheet Attack, by a threat actor that operates in Pakistan and primarily targets entities in the Indian government. In both campaigns, ThreatLabz identified previously undocumented tools, techniques, and procedures (TTPs). While these campaigns share some similarities with the Pakistan-linked Advanced Persistent Threat (APT) group, APT36, we…
-
Microsoft Shared BitLocker Keys With FBI, Raising Privacy Fears
Microsoft confirmed it can hand over BitLocker recovery keys stored in the cloud under warrant, reviving debate over who controls encrypted data. The post Microsoft Shared BitLocker Keys With FBI, Raising Privacy Fears appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-microsoft-bitlocker-keys-fbi-privacy/
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns
Tags: access, authentication, backup, breach, business, china, cloud, control, corporate, credentials, data, endpoint, governance, government, group, india, infrastructure, law, mfa, microsoft, risk, service, technologyWhere most enterprises go wrong: Enterprises using BitLocker should treat the recovery keys as highly sensitive, and avoid default cloud backup unless there is a clear business requirement and the associated risks are well understood and mitigated.The safest configuration is to redirect those keys to on-premises Active Directory or a controlled enterprise key vault. Even…
-
10 Key AI Security Controls For 2026
The 10 most important AI security controls for 2026 include deep visibility, strong authentication, data loss prevention and continuous AI red teaming. First seen on crn.com Jump to article: www.crn.com/news/security/2026/10-key-ai-security-controls-for-2026
-
Instagram Investigates Reported Vulnerability Allowing Access to Private Content
A server-side vulnerability in Instagram that allegedly allowed completely unauthenticated access to private account posts. This raises concerns about Meta’s vulnerability disclosure handling and the effectiveness of compensatory controls protecting user privacy. Technical Overview According to the disclosure, the vulnerability existed in Instagram’s mobile web interface and required no authentication or follower relationship to exploit.…
-
CISO’s predictions for 2026
Tags: access, ai, attack, authentication, automation, breach, business, ciso, cloud, control, credentials, cryptography, cyber, cyberattack, cybersecurity, data, data-breach, encryption, endpoint, extortion, finance, governance, government, healthcare, identity, infrastructure, malicious, mobile, mssp, network, password, penetration-testing, ransomware, risk, router, saas, soc, strategy, supply-chain, technology, threat, tool, vulnerability, warfareAI agents to reshape the threat landscape: But those same AI technologies are also changing the threat landscape. Toal points to a recent Anthropic report that documented the first large-scale AI-enabled cyberattack as an early warning sign. “I guarantee attackers will be more focused on using AI agents for what they want than a lot…
-
NDSS 2025 RContainer
Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Qihang Zhou (Institute of Information Engineering, Chinese Academy of Sciences), Wenzhuo Cao (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyberspace Security, University of Chinese Academy of Sciences), Xiaoqi Jia (Institute of Information Engineering, Chinese Academy of Sciences), Peng Liu (The Pennsylvania State University,…
-
As Oracle loses interest in MySQL, devs mull future options
As Big Red’s governance of the popular database comes into question, contributors to MySQL consider wresting control First seen on theregister.com Jump to article: www.theregister.com/2026/01/23/mysql_post_oracle/
-
Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls
Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations, leveraging SharePoint file-sharing services to bypass traditional email security controls and compromise multiple user accounts. SharePoint Abuse for Initial Access The attack began with a phishing email sent from a compromised trusted vendor’s email address, embedding SharePoint URLs that mimicked…
-
IBM prepares hybrid cloud twist for sovereign AI
IBM Sovereign Core proposes a control plane for AI apps that doesn’t rely on any single public cloud provider, which will appeal to some large enterprises, analysts said. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366637343/IBM-prepares-hybrid-cloud-twist-for-sovereign-AI
-
IBM prepares hybrid cloud twist for sovereign AI
IBM Sovereign Core proposes a control plane for AI apps that doesn’t rely on any single public cloud provider, which will appeal to some large enterprises, analysts said. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366637343/IBM-prepares-hybrid-cloud-twist-for-sovereign-AI
-
Microsoft Confirms Court-Ordered BitLocker Key Releases
FBI Accessed Encrypted Windows Devices Via BitLocker Keys, Microsoft Says. Microsoft confirmed it handed over BitLocker recovery keys to the FBI in 2025 under court order, raising concerns over cloud-stored encryption keys and whether default designs that prioritize recovery convenience and efficiency weaken user control and security. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/microsoft-confirms-court-ordered-bitlocker-key-releases-a-30593
-
Microsoft Confirms Court-Ordered BitLocker Key Releases
FBI Accessed Encrypted Windows Devices Via BitLocker Keys, Microsoft Says. Microsoft confirmed it handed over BitLocker recovery keys to the FBI in 2025 under court order, raising concerns over cloud-stored encryption keys and whether default designs that prioritize recovery convenience and efficiency weaken user control and security. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/microsoft-confirms-court-ordered-bitlocker-key-releases-a-30593
-
Microsoft Confirms Court-Ordered BitLocker Key Releases
FBI Accessed Encrypted Windows Devices Via BitLocker Keys, Microsoft Says. Microsoft confirmed it handed over BitLocker recovery keys to the FBI in 2025 under court order, raising concerns over cloud-stored encryption keys and whether default designs that prioritize recovery convenience and efficiency weaken user control and security. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/microsoft-confirms-court-ordered-bitlocker-key-releases-a-30593
-
NDSS 2025 WAVEN: WebAssembly Memory Virtualization For Enclaves
Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Weili Wang (Southern University of Science and Technology), Honghan Ji (ByteDance Inc.), Peixuan He (ByteDance Inc.), Yao Zhang (ByteDance Inc.), Ye Wu (ByteDance Inc.), Yinqian Zhang (Southern University of Science and Technology) PAPER WAVEN: WebAssembly Memory Virtualization for Enclaves The advancement of trusted execution environments (TEEs)…
-
Surrender as a service: Microsoft unlocks BitLocker for feds
If you’re serious about encryption, keep control of your encryption keys First seen on theregister.com Jump to article: www.theregister.com/2026/01/23/surrender_as_a_service_microsoft/
-
NHS England Probe Suppliers for Cybersecurity Controls
Suppliers May Be Asked for Evidence of Certain Security Controls, Best Practices. The National Health Service in England will reach out directly to suppliers to ensure they implement proactive and robust cybersecurity risk management, officials said Wednesday. The move comes after recent high-profile ransomware attacks on NHS vendors that seriously disrupted patient care. First seen…
-
Node.js Sets New Standard for HackerOne Reports, Demands Signal of 1.0 or Higher
Node.js has implemented a new quality control measure on its HackerOne bug bounty program, requiring researchers to maintain a minimum Signal reputation score of 1.0 before submitting vulnerability reports. This policy change, announced by the OpenJS Foundation, aims to reduce the growing volume of low-quality submissions that have overwhelmed the security team’s triage capacity. The…
-
Node.js Sets New Standard for HackerOne Reports, Demands Signal of 1.0 or Higher
Node.js has implemented a new quality control measure on its HackerOne bug bounty program, requiring researchers to maintain a minimum Signal reputation score of 1.0 before submitting vulnerability reports. This policy change, announced by the OpenJS Foundation, aims to reduce the growing volume of low-quality submissions that have overwhelmed the security team’s triage capacity. The…
-
Technische Härtung, Identity Controls und Detektion für SOC-Betrieb – Initiale Sicherheitskonfiguration von SAP S/4HANA
First seen on security-insider.de Jump to article: www.security-insider.de/sap-s4hana-initiale-sicherheitskonfiguration-a-5b0099d45e74f0640dccb4370b99f649/
-
Kasada Launches AI Agent Trust to Secure Agentic Commerce
New capability gives enterprises verified, policy-based control over AI agents and automated traffic First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/kasada-launches-ai-agent-trust-to-secure-agentic-commerce/
-
Kasada Launches AI Agent Trust to Secure Agentic Commerce
New capability gives enterprises verified, policy-based control over AI agents and automated traffic First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/kasada-launches-ai-agent-trust-to-secure-agentic-commerce/
-
Kasada Launches AI Agent Trust to Secure Agentic Commerce
New capability gives enterprises verified, policy-based control over AI agents and automated traffic First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/kasada-launches-ai-agent-trust-to-secure-agentic-commerce/
-
Kasada Launches AI Agent Trust to Secure Agentic Commerce
New capability gives enterprises verified, policy-based control over AI agents and automated traffic First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/kasada-launches-ai-agent-trust-to-secure-agentic-commerce/
-
Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Miami, Florida, January 22nd, 2026, CyberNewsWire Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type II compliance following an extensive multi-month audit by Insight Assurance. This certification validates that Halo Security’s security controls are not only properly designed but also operate…
-
HHS Watchdog Urges Cyber Governance Overhaul
OIG: Gaps in Standards, Third-Party Oversight Put Agencies, Health Sector at Risk. Auditors say the U.S. Department of Health and Human Services should buttress its ability to respond to cyberthreats by standardizing governance and controls across its many divisions – and also do a better job of overseeing its many contractors and the risk they…

