Tag: risk
-
The blind spot every CISO must see: Loyalty
Tags: access, ai, ciso, corporate, data, espionage, exploit, finance, framework, gartner, government, intelligence, jobs, malicious, monitoring, risk, strategy, tool, training, vulnerability, zero-trustHow the misread appears in practice: Recent examples illustrate the point. In the US federal sphere, abrupt terminations under workforce reduction initiatives have left former employees with lingering access to sensitive systems, amplifying the potential for data exposure or retaliation. Corporate cases show a similar dynamic: engineers or executives who have spent years building institutional…
-
OpenAI Launches Trusted Access for Cyber to Expand AI-Driven Defense While Managing Risk
OpenAI has announced a new initiative aimed at strengthening digital defenses while managing the risks that come with capable artificial intelligence systems. The effort, called Trusted Access for Cyber, is part of a broader strategy to enhance baseline protection for all users while selectively expanding access to advanced cybersecurity capabilities for vetted defenders. First seen…
-
The hidden cost of putting off security decisions
In this Help Net Security video, Hanah Darley, Chief AI Officer, Geordie AI, talks about how putting off security risk decisions creates long-term costs that often stay … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/06/deferred-security-risk-decisions-video/
-
Four new vulnerabilities found in Ingress NGINX
Tags: access, api, authentication, container, cve, cybersecurity, data, exploit, group, injection, jobs, kubernetes, malicious, risk, service, strategy, vulnerabilitycustom-errors configuration that includes HTTP errors 401 or 403, and if the configured default custom-errors backend is defective and fails to respect the X-Code HTTP header, then an Ingress with the auth-url annotation may be accessed even when authentication fails.CVE-2026-24512 is a configuration injection vulnerability where the rules.http.paths.path Ingress field can be used to inject configuration into nginx.…
-
ChatGPT-Verbesserung durch Malewarebytes: Erkennung von Scams, Malware und Online-Risiken
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/chatgpt-verbesserung-malewarebytes-erkennung-scams-malware-online-risiken
-
Agentic AI Site ‘Moltbook’ Is Riddled With Security Risks
Someone used AI to build an entire Web platform, which then did something predictable and preventable: It exposed all its data through a publicly accessible API. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/agentic-ai-moltbook-security-risks
-
OpenClaw and the Growing Security Risks of Agentic AI
OpenClaw’s rise shows how agentic AI can expand attack surfaces and introduce new enterprise security risks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/openclaw-and-the-growing-security-risks-of-agentic-ai/
-
n8n Flaw Puts Hundreds of Thousands of Enterprise AI Systems at Risk
A n8n sandbox escape flaw could allow any authenticated user to take over enterprise AI workflows at massive scale. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/n8n-flaw-puts-hundreds-of-thousands-of-enterprise-ai-systems-at-risk/
-
The silent security gap in enterprise AI adoption
Tags: access, ai, api, backup, breach, business, cloud, compliance, computer, computing, control, credentials, cryptography, data, data-breach, encryption, exploit, finance, group, healthcare, infrastructure, malicious, risk, service, technology, threat, toolInfoWorld explains in its analysis of why AI is all about inference now.This shift has happened quickly. In many organizations, AI systems have moved from pilot projects to core infrastructure in less than two years. Yet security architectures have not evolved at the same pace. The result is a widening gap between where sensitive data…
-
Why boards should be obsessed with their most ‘boring’ systems
Following a series of high-profile cyberattacks, boards of directors are now requiring their organizations to take greater responsibility for the risks posed by enterprise resource planning (ERP) systems pose after a series of high-profile cyberattacks. The Jaguar Land Rover (JLR), incident in Sept. 2025 illustrates the severe consequences of such attacks. The cyberattack forced JLR…
-
Varonis Acquires AllTrue to Strengthen AI Security Capabilities
The deal underscores a broader industry shift as security vendors race to address the risks introduced by LLMs, copilots, and autonomous AI agents. The post Varonis Acquires AllTrue to Strengthen AI Security Capabilities appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-varonis-buys-alltrue/
-
The Compliance Convergence Challenge: Permission Sprawl and AI Regulations in Hybrid Environments
Permission sprawl is colliding with AI regulations, creating new compliance risks across hybrid and multi-cloud environments. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/the-compliance-convergence-challenge-permission-sprawl-and-ai-regulations-in-hybrid-environments/
-
Ein kompromittiertes System kann mit einem Schritt 85 Prozent der Umgebung erreichen
Ein erfolgreicher Angriff auf ein Unternehmensnetzwerk ermöglicht es Angreifern oft, in kürzester Zeit einen Großteil der Umgebung zu kompromittieren, da sie legitime Zugriffswege und administrative Protokolle nutzen. Das größte Risiko besteht nicht im initialen Eindringen, sondern in der schnellen und weitreichenden lateralen Bewegung innerhalb des Netzwerks, wobei klassische Sicherheitsmetriken wie die Anzahl der Alarmmeldungen das……
-
Building trust with the board through evidence-based proof
Tags: backup, business, cio, ciso, compliance, control, cyber, cybersecurity, data, finance, governance, incident, insurance, mitigation, regulation, resilience, risk, strategy, tool, updateBuilding a common language to get to “Here’s the proof of cyber resilience”: CISOs can reframe the discussion using data and evidence. Modern cybersecurity tools produce a large volume of data and information on how they operate at any point in time, the status of controls deployed, the validation of configuration and more. There’s an…
-
Kurz vor Olympia: Italien wehrt russische Hacker-Angriffe ab
Russische Hacker haben kurz vor den Olympischen Winterspielen einige Standorte in Italien angegriffen. Die Angriffe wurden abgewehrt.Wenige Tage vor Beginn der Olympischen Winterspiele in Mailand und Cortina d’Ampezzo hat Italien mehrere russische Hackerattacken abgewehrt. Die Cyberangriffe hätten unter anderem einige Standorte der Winterspiele, darunter Hotels in Cortina, zum Ziel gehabt, sagte Außenminister Antonio Tajani. Auch…
-
1.5 million AI agents are at risk of going rogue
The real issue is invisible AI, not rogue AI: Manish Jain, principal research director at Info-Tech Research Group, said that as the “exponential” speed of AI development continues, his firm, based on experiences with CIOs and CDOs, predicts that there will be more AI agents globally by the year 2028 than the number of human…
-
How SCSU Is Rebuilding Campus Technology for the AI Era
Southern Connecticut State University CIO Tom Armstrong on Modernization Priorities. Like other schools, Southern Connecticut State University is under pressure to modernize legacy systems, strengthen security and adopt AI. CIO Tom Armstrong must balance expanding research ambitions, student expectations and operational efficiency in an increasingly complex risk environment. First seen on govinfosecurity.com Jump to article:…
-
IT Gives, Security Takes Away, and Configuration Drift Is the Hidden Cost
There’s an old joke in enterprise tech: IT giveth, and security taketh away. At its best, IT exists to empower people to give employees faster, better, smarter tools to do their jobs. As we know no good deed goes unpunished, though, and security inevitably shows up afterward to clean up the risk created by.. First…
-
The ‘Absolute Nightmare’ in Your DMs: OpenClaw Marries Extreme Utility with ‘Unacceptable’ Risk
It is the artificial intelligence (AI) assistant that users love and security experts fear. OpenClaw, the agentic AI platform created by Peter Steinberger, is tearing through the tech world, promising a level of automation that legacy chatbots like ChatGPT can’t match. But as cloud giants rush to host it, industry analysts are issuing a blunt..…
-
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud On-Prem)
Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance. Google moved swiftly to patch these issues. Organizations running Looker on-prem should verify they have upgraded to the patched versions. Key takeaways Two novel vulnerabilities: Tenable Research discovered a remote code execution (RCE) chain via…
-
Global SystemBC Botnet Found Active Across 10,000 Infected Systems
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/global-systembc-botnet-10000/
-
Why Moltbook Changes the Enterprise Security Conversation
For several years, enterprise security teams have concentrated on a well-established range of risks, including users clicking potentially harmful links, employees uploading data to SaaS applications, developers inadvertently disclosing credentials on platforms like GitHub, and chatbots revealing sensitive information. However, a notable shift is emerging”, one that operates independently of user actions. Artificial intelligence agents…
-
OT attacks surge as threat actors embrace cloud and AI, warns Forescout
Cyberattacks targeting operational technology (OT) environments rose sharply in 2025, according to new research from Forescout, highlighting growing risks to critical infrastructure as attackers adapt to cloud services, AI platforms and increasingly distributed attack infrastructure. Forescout’s 2025 Threat Roundup Report, produced by its research arm Vedere Labs, analysed more than 900 million cyberattacks observed globally…
-
Big Breach or Smooth Sailing? Mexican Gov’t Faces Leak Allegations
A hacktivist group claims a 2.3-terabyte data breach exposes the information of 36 million Mexicans, but no sensitive accounts are at risk, says government. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/big-breach-or-nada-de-nada-mexican-govt-faces-leak-allegations
-
Big Breach or Nada de Nada? Mexican Gov’t Faces Leak Allegations
A hacktivist group claims a 2.3-terabyte data breach exposes the information of 36 million Mexicans, but no sensitive accounts are at risk, says government. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/big-breach-or-nada-de-nada-mexican-govt-faces-leak-allegations
-
Russian hackers exploited a critical Office bug within days of disclosure
One campaign, two infection paths: ZScaler found that exploitation of CVE-2026-21509 did not lead to a single uniform payload. Instead, the initial RTF-based exploit branched into two distinct infection paths, each serving a different operational purpose. The choice of dropper reportedly determined whether the attackers prioritized near-term intelligence collection or longer-term access to compromised systems.In…
-
How Hospitals’ Use of GenAI is Putting Patients at Risk Without Realizing It
Hospitals are adopting Gen AI across EHR workflows, but hallucinations, bias, and weak governance pose real patient safety risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/how-hospitals-use-of-genai-is-putting-patients-at-risk-without-realizing-it/
-
AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026
Author : Karunakar Goud RGDate Published : February, 04, 2026 AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026 Artificial intelligence is no longer experimental. By 2026, AI systems are embedded in customer support, security operations, decision-making, and product development. As AI adoption accelerates, AI governance has become a…The…
-
Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
Researchers at Tenable have disclosed two vulnerabilities, collectively referred to as “LookOut,” affecting Google Looker. Because the business intelligence platform is … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/04/google-looker-vulnerabilities-cve-2025-12743/

