Tag: data
-
What Is AI Risk? A Clear Definition for 2026
What AI risk actually means, where it lives, and why most teams get it wrong. Data-backed insights from the 2026 SaaS + AI Security Report. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/what-is-ai-risk-a-clear-definition-for-2026/
-
“I’m Just Scared”: Teen Hacker Jailed After Massive U.S. School Data Breach
Hacker Matthew Lane, now 20, played a central role in the PowerSchool data breach, one of the largest cyberattacks in U.S. education history. As he headed to federal prison in Connecticut, he admitted fear and regret, writing, “It’s extremely sad, and I’m just scared.” First seen on thecyberexpress.com Jump to article: thecyberexpress.com/hacker-matthew-lane-powerschool-data-breach/
-
AI platform n8n abused for stealthy phishing and malware delivery
Attackers abuse AI automation platform n8n to run phishing campaigns, deliver malware, and evade security by using trusted infrastructure. Threat actors are exploiting the popular AI workflow automation platform n8n to launch advanced phishing campaigns, deliver malware, and collect device data through automated emails. By using trusted infrastructure, they can bypass traditional security controls and…
-
Data breach at edtech giant McGraw Hill affects 13.5 million accounts
The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user accounts, stolen after breaching the company’s Salesforce environment earlier this month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/data-breach-at-edtech-giant-mcgraw-hill-affects-135-million-accounts/
-
What makes Agentic AI a smart choice for data security?
How Can Non-Human Identities Revolutionize Cloud Security? Can the effective management of Non-Human Identities (NHIs) transform cloud security? When organizations increasingly pivot towards cloud infrastructures, safeguarding digital environments has become a pivotal concern across industries. With data breaches making headlines globally, it is imperative for businesses to adopt comprehensive cybersecurity strategies that shield every corner……
-
Claude Mythos: Prepare for your board’s cybersecurity questions about the latest AI model from Anthropic
Tags: ai, api, application-security, attack, authentication, automation, best-practice, business, ceo, cisa, cloud, compliance, container, control, cve, cvss, cyber, cybersecurity, data, data-breach, endpoint, exploit, fedramp, finance, flaw, framework, governance, group, HIPAA, identity, injection, insurance, kev, law, linkedin, linux, LLM, macOS, network, PCI, risk, service, soc, software, strategy, technology, threat, update, vulnerability, vulnerability-management, windows, zero-day, zero-trustWith the Federal Reserve Chairman meeting with bank CEOs to discuss the security implications of Claude Mythos, you can bet that your board of directors will ask you about the impact of the AI model on your cybersecurity strategy. Here’s how to prepare. Key takeaways Anthropic announced Claude Mythos Preview, its most powerful general-purpose frontier…
-
Why Data Protection Vendor Commvault Is Eyeing Going Private
Tags: dataSlumping Stock and Slower Growth Than Rival Rubrik Pave Way for Take-Private Deal Reuters reported that Commvault is working with Goldman Sachs to explore a sale after receiving takeover interest from both private equity firms and strategic buyers. Thoma Bravo is among the buyers that have expressed interest in Commvault, sources told Reuters. First seen…
-
Why Data Trust Is Key to AI Success
CISO Insights Reveal Gaps Between AI Adoption Speed and Data Security Maturity A survey of 124 CISOs reveals most enterprises have scaled AI but lack confidence in data security controls. With only one in five initiatives meeting KPIs, gaps in enforcement, data trust and visibility are emerging as critical barriers to AI success. First seen…
-
Over 100 Chrome Web Store extensions steal user accounts, data
More than 100 malicious extensions in the official Chrome Web Store are attempting to steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data/
-
Over 100 Chrome extensions in Web Store target users accounts and data
More than 100 malicious extensions in the official Chrome Web Store are attempting to steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data/
-
Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)
Tags: advisory, api, attack, best-practice, cloud, container, cve, cvss, cyber, data, exploit, firewall, firmware, flaw, framework, github, Internet, malicious, microsoft, mitigation, office, powershell, rce, remote-code-execution, service, software, sql, startup, tool, update, vulnerability, windows, zero-day8Critical 154Important 1Moderate 0Low Microsoft addresses 163 CVEs in the April 2026 Patch Tuesday release, including two zero-day vulnerabilities, one of which was exploited in the wild. Microsoft patched 163 CVEs in its April 2026 Patch Tuesday release, with eight rated critical, 154 rated as important and one rated as moderate. This is the second…
-
Emulating the Persuasive NightSpire Ransomware
AttackIQ has released a new attack graph that emulates the behaviors of NightSpire Ransomware, a financially motivated ransomware and data extortion group that emerged in early 2025 and quickly evolved into a full double-extortion operation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/emulating-the-persuasive-nightspire-ransomware/
-
4 questions to ask before outsourcing MDR
2. Can your team separate real threats from noise?: Alert fatigue is one of the biggest barriers to effective security. Tools generate volumes of signals, but not all alerts represent real risk. When everything looks critical, teams either burn out or miss the alerts that matter most.MDR helps by applying human expertise and threat intelligence…
-
5 trends defining the future of AI-powered cybersecurity
Tags: ai, automation, backup, breach, business, cloud, compliance, cyber, cybersecurity, data, defense, detection, endpoint, framework, government, metric, monitoring, msp, regulation, resilience, threatSee how AI is altering the landscape in the new N-able and Futurum report, Cybersecurity in the Age of AI: Moving from Fragile to Resilient. Get key insights on building a modern framework for business resilience. 2. From perimeter security to continuous cyber resilience: The “castle and moat” approach is obsolete. In a world of…
-
McGraw-Hill confirms data breach following extortion threat
Education company McGraw-Hill has confirmed in a statement to BleepingComputer that hackers exploited a Salesforce misconfiguration and accessed its internal data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/mcgraw-hill-confirms-data-breach-following-extortion-threat/
-
Virginia enacts ban on precise geolocation data sales as momentum for similar prohibitions builds
The legislation bars the sale of geolocation within a 1,750 foot radius, a buffer large enough to keep data brokers from pinpointing where consumers live, work, worship, shop and otherwise travel. First seen on therecord.media Jump to article: therecord.media/virginia-enacts-ban-on-precise-geolocation-data
-
Privacy-Preserving Data Analytics: Stop Collecting What You Do Not Need
There is an almost reflexive habit in data engineering: whenever you instrument an event, you attach a user ID. It feels natural. User IDs are how you join tables, track behavior, and measure engagement. The problem is that most teams attach them without ever asking whether they actually need them. That habit is becoming expensive……
-
World-Quantum-Day Hybride Verschlüsselung zur Risikominimierung
Die Bedrohung durch Post-Quantum-Technologie ist nicht mehr Theorie, sondern prägt bereits heute die Risikolandschaft. Während das Quantencomputing bahnbrechende Fortschritte verspricht, wird es gleichzeitig die kryptografischen Grundlagen untergraben, die unsere digitale Wirtschaft schützen. Ein Kommentar von Chris Harris, EMEA Technical Director, Data & Application Security bei Thales. Was sich geändert hat, ist der Zeitplan. Die Frage…
-
The Future of Modern Observability
Bridging Observability Gaps With AI, OTel and Scalable Data Models As AI-driven development and cloud adoption accelerate system complexity, traditional observability tools are struggling to keep pace. This analysis outlines four foundational pillars to close visibility gaps and enable faster, AI-powered root cause analysis. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/blogs/future-modern-observability-p-4093
-
Google $135M Settlement: Millions of Android Users May Qualify for Payout
Android users may be eligible for a payout from Google’s $135 million settlement over background data use. Here’s who qualifies and how to claim. The post Google $135M Settlement: Millions of Android Users May Qualify for Payout appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-google-135m-android-data-settlement-payout/
-
Malicious Chrome Extensions Campaign Exposes User Data
108 malicious Chrome extensions steal sessions, Google data, inject ads via single C2 infrastructure First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chrome-extensions-expose-user-data/
-
Claude Mythos Changed Everything. Your APIs Are the First Target.
Tags: access, ai, api, attack, breach, ceo, crowdstrike, cyber, cybersecurity, data, endpoint, exploit, finance, flaw, infrastructure, threat, tool, update, vulnerability, zero-dayAnthropic just released Claude Mythos Preview. They did not make it publicly available. That decision alone should tell you everything you need to know about what this model can do. During internal testing, Mythos autonomously discovered and exploited zero-day vulnerabilities across every major operating system and web browser. It found a 27-year-old bug in OpenBSD.…
-
EdTech Digest – How to Fix the Digital Ghosting Epidemic
This article was originally published in EdTech Digest on 03/24/26 by Charlie Sander. To fight “digital ghosting,” schools need a smarter approach to device use, student safety, and digital wellbeing While physical attendance has long been the primary metric for school safety and success, a more insidious trend is emerging that data alone often misses. I…
-
Basic-Fit hack compromises data of up to 1 million members
Basic-Fit, a European gym chain, disclosed that hackers breached one of its internal systems, exposing members’ personal data in several countries. The company operates more … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/14/basic-fit-data-breach-1-million-members-europe/
-
Q1 2026 Open Source Malware Index: Adaptive Attacks, Familiar Weaknesses
Tags: access, ai, api, attack, automation, cloud, credentials, crypto, data, github, guide, intelligence, kubernetes, linux, macOS, malicious, malware, open-source, pypi, risk, software, supply-chain, tactics, theft, tool, update, windows, worm<div cla TL;DR Sonatype identified 21,764 open source malware packages in Q1 2026, bringing the total logged since 2017 to 1,346,867. npm accounted for 75% of malicious packages this quarter. Trojans dominated, with most activity focused on credential theft, host reconnaissance, and staged payload delivery. The quarter’s defining pattern was trust abuse: attackers succeeded by…
-
ShinyHunters claim the hack of Rockstar Games breach and started leaking data
Leak of 8.1GB data tied to Rockstar Games includes anti-cheat code, game data, analytics and more, reportedly exposed by ShinyHunters. An 8.1GB data leak reportedly linked to Rockstar Games has surfaced, with files shared by ShinyHunters after being obtained via Anodot. The dataset includes anti-cheat source code, player analytics, game assets, Zendesk support tickets and…
-
Booking.com data breach: Customer reservation data exposed
>>Unauthorized third parties may have been able to access certain booking information associated with your reservation,<< email alerts sent out by Booking.com over … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/14/booking-com-data-breach-customer-reservation-data-exposed/
-
Booking.com Confirms Data Breach as Hackers Access Customer Details
Booking.com confirms a data breach exposing customer details to hackers. No payment data accessed, but users face risk of targeted phishing scams now! First seen on hackread.com Jump to article: hackread.com/booking-com-data-breach-hackers-customer-details/
-
The AI inflection point: What security leaders must do now
The questions have matured: The AI discussion in security has evolved in phases.First came skepticism from security leaders, asking whether AI actually works in security operations. Given years of overpromised technology, the caution was warranted.Experimentation followed, with questions centering on what types of work AI should handle and where it introduces risk.Now, the dominant questions…

