Tag: defense
-
What impact does Agentic AI have on cloud-native security
How Can Organizations Safeguard Non-Human Identities in the Age of Agentic AI? How can robust management of Non-Human Identities (NHIs) and Secrets Security Management tighten your organization’s cybersecurity defenses? While the concept might sound futuristic, the impact is very real, especially in cloud-native environments. Let’s unravel how effective management of NHIs can mitigate potential security……
-
What impact does Agentic AI have on cloud-native security
How Can Organizations Safeguard Non-Human Identities in the Age of Agentic AI? How can robust management of Non-Human Identities (NHIs) and Secrets Security Management tighten your organization’s cybersecurity defenses? While the concept might sound futuristic, the impact is very real, especially in cloud-native environments. Let’s unravel how effective management of NHIs can mitigate potential security……
-
Northrop Grumman, Ford prep AI infrastructure with OpenShift
The defense contractor leaned on OpenShift AI and GitOps as it installed a 30,000-core GPU farm, while the automaker established workload identity federation across clouds. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366634397/Northrop-Grumman-Ford-prep-AI-infrastructure-with-OpenShift
-
Northrop Grumman, Ford prep AI infrastructure with OpenShift
The defense contractor leaned on OpenShift AI and GitOps as it installed a 30,000-core GPU farm, while the automaker established workload identity federation across clouds. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366634397/Northrop-Grumman-Ford-prep-AI-infrastructure-with-OpenShift
-
Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks
Tags: access, advisory, ai, antivirus, application-security, attack, authentication, backup, business, chatgpt, cisa, ciso, cloud, compliance, control, corporate, cve, cyber, cybersecurity, data, defense, detection, encryption, endpoint, exploit, finance, firewall, flaw, framework, germany, group, guide, healthcare, infrastructure, injection, Internet, iot, law, malware, mfa, mitigation, phishing, privacy, programming, ransomware, resilience, risk, service, soc, software, supply-chain, tactics, technology, threat, tool, update, vulnerabilityLearn why you should revise your Akira ransomware protection plans. Plus, find out what’s new in OWASP’s revamped Top 10 Web Application Risks list. Also, find out about agentic AI’s cognitive degradation risk. And get the latest on AI security trends and CISO compensation. Key takeaways CISA and other agencies are urging organizations, especially in…
-
Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks
Tags: access, advisory, ai, antivirus, application-security, attack, authentication, backup, business, chatgpt, cisa, ciso, cloud, compliance, control, corporate, cve, cyber, cybersecurity, data, defense, detection, encryption, endpoint, exploit, finance, firewall, flaw, framework, germany, group, guide, healthcare, infrastructure, injection, Internet, iot, law, malware, mfa, mitigation, phishing, privacy, programming, ransomware, resilience, risk, service, soc, software, supply-chain, tactics, technology, threat, tool, update, vulnerabilityLearn why you should revise your Akira ransomware protection plans. Plus, find out what’s new in OWASP’s revamped Top 10 Web Application Risks list. Also, find out about agentic AI’s cognitive degradation risk. And get the latest on AI security trends and CISO compensation. Key takeaways CISA and other agencies are urging organizations, especially in…
-
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a new espionage-focused campaign.The activity, detected in early September 2025 and assessed to be ongoing, has been codenamed SpearSpecter by the Israel National Digital Agency (INDA).”The…
-
Why Cybersecurity Jobs Are Likely To Resist AI Layoff Pressures: Experts
Even as AI-driven automation spreads to nearly all parts of the workforce, including cybersecurity teams, the field of cyber defense is one of the few likely to be spared from major layoffs going forward, according to security experts. First seen on crn.com Jump to article: www.crn.com/news/security/2025/why-cybersecurity-jobs-are-likely-to-resist-ai-layoff-pressures-experts
-
Fighting AI with AI: Adversarial bots vs. autonomous threat hunters
Tags: access, ai, attack, automation, backup, breach, bug-bounty, cloud, credentials, cyber, cybersecurity, data, defense, endpoint, exploit, hacker, healthcare, identity, infrastructure, Internet, iot, least-privilege, malicious, network, phishing, startup, technology, threat, tool, update, vpn, vulnerability, zero-dayWhile there’s no doubt AI holds great potential for cybersecurity, in practice, it’s mainly being used to automate what we’re already doing. For companies to stand a chance, we need new approaches to AI-powered defense, not optimized ones. Attackers already have systemic advantages that AI amplifies dramatically. While there are some great examples of how…
-
Fighting AI with AI: Adversarial bots vs. autonomous threat hunters
Tags: access, ai, attack, automation, backup, breach, bug-bounty, cloud, credentials, cyber, cybersecurity, data, defense, endpoint, exploit, hacker, healthcare, identity, infrastructure, Internet, iot, least-privilege, malicious, network, phishing, startup, technology, threat, tool, update, vpn, vulnerability, zero-dayWhile there’s no doubt AI holds great potential for cybersecurity, in practice, it’s mainly being used to automate what we’re already doing. For companies to stand a chance, we need new approaches to AI-powered defense, not optimized ones. Attackers already have systemic advantages that AI amplifies dramatically. While there are some great examples of how…
-
Press Release: CIO100 and CSO30 ASEAN Awards Gala 2025 Celebrate Regional Excellence in Technology Leadership
Tags: ai, business, cio, computer, cyber, cybersecurity, defense, finance, framework, group, healthcare, insurance, intelligence, international, resilience, service, technologyThe CIO100 and CSO30 ASEAN and Hong Kong Awards Gala on November 12, 2025, delivered a powerful validation of the region’s technology leadership maturity. CIO ASEAN and CSO ASEAN had the privilege of hosting an evening that brought together the most elite CIO100 and CSO30 award winners, and technology teams from Singapore, Malaysia, Indonesia, Vietnam,…
-
DDoS Cyberattack Disrupts Danish Government and Defense Websites
Tags: attack, country, cyberattack, ddos, defense, government, intelligence, military, monitoring, serviceA cyberattack on Danish institutions disrupted several government and defense-related websites on November 13, according to the country’s Civil Protection Agency. The incident, which involved widespread DDoS attacks, caused temporary outages across multiple online services and prompted authorities to intensify monitoring alongside Denmark’s military intelligence service. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cyberattack-on-danish-government-sites/
-
Press Release: CIO100 and CSO30 ASEAN Awards Gala 2025 Celebrate Regional Excellence in Technology Leadership
Tags: ai, business, cio, computer, cyber, cybersecurity, defense, finance, framework, group, healthcare, insurance, intelligence, international, resilience, service, technologyThe CIO100 and CSO30 ASEAN and Hong Kong Awards Gala on November 12, 2025, delivered a powerful validation of the region’s technology leadership maturity. CIO ASEAN and CSO ASEAN had the privilege of hosting an evening that brought together the most elite CIO100 and CSO30 award winners, and technology teams from Singapore, Malaysia, Indonesia, Vietnam,…
-
Protecting mobile privacy in real time with predictive adversarial defense
Mobile sensors are everywhere, quietly recording how users move, tilt, or hold their phones. The same data that powers step counters and activity trackers can also expose … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/14/research-real-time-mobile-privacy-protection/
-
Los Alamos researchers warn AI may upend national security
For decades, the United States has built its defense posture around predictable timelines for technological progress. That assumption no longer holds, according to researchers … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/14/research-ai-national-security-threats/
-
CISA Warns: Akira Ransomware Has Extracted $42M After Targeting Hundreds
A newly updated cybersecurity advisory from federal agencies reveals that the Akira ransomware operation has significantly escalated its campaign, compromising organizations worldwide and accumulating massive ransom proceeds through sophisticated attack methods. According to the joint advisory released on November 13, 2025, by the FBI, CISA, Department of Defense Cyber Crime Center (DC3), Department of Health…
-
Feds Fumble Cisco Patches as China-Linked Hackers Strike
CISA Says Agencies Believed They Patched Cisco Flaws But Had Not. The U.S. cyber defense agency issued new patch guidance after discovering multiple federal agencies failed to properly secure Cisco firewalls, leaving federal networks exposed to exploitation by a suspected Chinese threat actor despite a prior emergency directive. First seen on govinfosecurity.com Jump to article:…
-
The 2025 Healthcare Cyber Crisis: Unified AI Defense Against $10.3M Breaches
Tags: ai, breach, cloud, cyber, data, defense, healthcare, infrastructure, network, ransomware, theftThe U.S. healthcare system has entered its most dangerous cyber era.As digital transformation reshapes patient care, cloud infrastructure, IoT/IoMT ecosystems, and interconnected provider networks, the sector has simultaneously become the #1 most cyber-attacked industry for 13 consecutive years. Ransomware outages, data theft, and multi-week operational disruptions now hit hospitals at an unprecedented scale.With average breach…
-
The 2025 Healthcare Cyber Crisis: Unified AI Defense Against $10.3M Breaches
Tags: ai, breach, cloud, cyber, data, defense, healthcare, infrastructure, network, ransomware, theftThe U.S. healthcare system has entered its most dangerous cyber era.As digital transformation reshapes patient care, cloud infrastructure, IoT/IoMT ecosystems, and interconnected provider networks, the sector has simultaneously become the #1 most cyber-attacked industry for 13 consecutive years. Ransomware outages, data theft, and multi-week operational disruptions now hit hospitals at an unprecedented scale.With average breach…
-
How Rapid AI Adoption Is Creating an Exposure Gap
Tags: access, ai, attack, best-practice, breach, business, cloud, compliance, control, cybersecurity, data, data-breach, defense, encryption, exploit, framework, identity, nist, risk, risk-assessment, risk-management, service, strategy, threat, tool, vulnerabilityAs organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap, the widening divide between innovation and protection, and what security leaders can do to close it. Key takeaways: The AI exposure gap is widening as most organizations adopt AI faster than they can secure…
-
Rogue MCP servers can take over Cursor’s built-in browser
Defenses: Organizations must review and control, both through policy and access controls, the IDE extensions and MCP servers their developers use. They should do this just like they should be vetting application dependencies from package registries such as npm or PyPI to prevent the compromise of developer machines or inheriting vulnerabilities in their code.Attackers are…
-
Zero-day exploits hit Cisco ISE and Citrix systems in an advanced campaign
Tags: access, attack, authentication, cisco, citrix, credentials, defense, encryption, endpoint, exploit, identity, infrastructure, monitoring, network, risk, service, tactics, threat, update, zero-daypatch-gap exploitation technique is a hallmark of sophisticated threat actors who closely monitor security updates and quickly weaponize vulnerabilities.”Amazon did not immediately respond to CSO’s queries on why it’s sharing information about the zero-day exploits months after.After gaining access, the actor deployed a tailor-made web shell disguised as the “IdentityAuditAction” component of Cisco ISE. It…
-
How AI-Generated Content is Fueling Next-Gen Phishing and BEC Attacks: Detection and Defense Strategies
With AI phishing attacks rising 1,760% and achieving a 60% success rate, learn how attackers use AI, deepfakes and automation, and discover proven, multi-layered defense strategies to protect your organization in 2025. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/how-ai-generated-content-is-fueling-next-gen-phishing-and-bec-attacks-detection-and-defense-strategies/
-
ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories
Behind every click, there’s a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting smarter, using new tools to sneak past filters and turn trusted systems against us.But security teams are fighting back. They’re building faster defenses, better ways to spot attacks, and stronger systems…
-
Operationalizing Threat Intelligence and AI-Powered Cyber Defense
Sachin Jade, chief product officer at Cyware, discusses the evolving challenge of operationalizing threat intelligence and how AI is redefining the speed and scale of cyber defense. Jade explains that most organizations today struggle to turn intelligence into meaningful action. Despite the massive investment in feeds, dashboards, and frameworks, many security teams still rely on..…
-
From Data to Defense in Modern Security Operations
Sachin Jade, chief product officer at Cyware, discusses the evolving challenge of operationalizing threat intelligence and how AI is redefining the speed and scale of cyber defense. Jade explains that most organizations today struggle to turn intelligence into meaningful action. Despite the massive investment in feeds, dashboards, and frameworks, many security teams still rely on..…

