17 Mar

Gartner suggests Friday afternoon Copilot ban because tired users may be too lazy to check its mistakes

Gartner analyst Dennis Xu has half-jokingly suggested banning use of Microsoft’s Copilot AI on Friday afternoons, because he fears at that time of week users

Author rabih
17 Mar

Gartner suggests Friday afternoon Copilot ban because users may be too lazy to check its mistakes

Gartner analyst Dennis Xu has half-jokingly suggested banning use of Microsoft’s Copilot AI on Friday afternoons, because he fears at that time of week users

Author rabih
17 Mar

Bank built its own threat hunting agent because vendors can’t keep pace with new threats

Australia’s Commonwealth Bank built its own agentic AI threat hunting tools, because vendors are too slow to develop tools that can cope with emerging AI-powered

Author rabih
16 Mar

Robotics surgical biz Intuitive discloses phishing attack

Robotics-assisted surgical tech firm Intuitive said that unauthorized intruders gained access to some of its internal IT business applications after stealing an employee’s credentials during

Author rabih
16 Mar

Cybercrime has skyrocketed 245% since the start of the Iran war

Cybercrime has skyrocketed since the start of the Iran war, according to Akamai, which reports a 245 percent increase in everything from credential harvesting attempts

Author rabih
16 Mar

AI finally delivers those elusive productivity gains… for cybercriminals

AI is apparently good for the bottom line if your business is crime. Financial fraud schemes carried out with the help of artificial intelligence are

Author rabih
16 Mar

Flaw in UK’s corporate registry let directors rummage through rival records

Companies House was forced to pull down its record-filing platform for the entire weekend to rectify a “security issue” that exposed the personal details of

Author rabih
15 Mar

Outsourcer Telus admits to attack – may have lost a petabyte of data to ShinyHunters

Infosec In Brief Canadian outsourcer Telus Digital has admitted it fell victim to a cyberattack. The company said it is “investigating a cybersecurity incident involving

Author rabih
13 Mar

Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others

A group of cybercriminals tracked as Storm-2561 is using fake enterprise VPN clients from CheckPoint, Cisco, Fortinet, Ivanti, and other vendors to steal users’ credentials,

Author rabih
13 Mar

Interpol cybercrime crackdown leads to 94 arrests, 45,000 IP takedowns

Ninety-four people were arrested as part of a global, multi-month cybercrime crackdown, Interpol revealed today. Announcing the results of Operation Synergia III, the third iteration

Author rabih
13 Mar

NanoClaw latches onto Docker Sandboxes for safer AI agents

exclusive NanoClaw, an open source agent platform, can now run inside Docker Sandboxes, furthering the project’s commitment to security. NanoClaw, as we noted recently, followed

Author rabih
13 Mar

Google rushes Chrome update fixing two zero-days already under attack

Google has pushed out an emergency Chrome update to fix two previously unknown vulnerabilities that attackers were already exploiting before the patches landed. The bugs,

Author rabih
13 Mar

Face value: What it takes to fool facial recognition

ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he’ll demo it all at RSAC 2026

Author rabih
12 Mar

Rogue AI agents can work together to hack systems and steal secrets

AI agents work together to bypass security controls and stealthily steal sensitive data from within the enterprise systems in which they operate, according to tests

Author rabih
12 Mar

Operation Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud

Cops from eight countries this week disrupted SocksEscort, a residential proxy service used by criminals to compromise hundreds of thousands of routers worldwide and carry

Author rabih
12 Mar

Operating Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud

Cops from eight countries this week disrupted SocksEscort, a residential proxy service used by criminals to compromise hundreds of thousands of routers worldwide and carry

Author rabih
12 Mar

Cyber fallout from the Iran war: What to have on your radar

The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March

Author rabih
12 Mar

CISA warns max-severity n8n bug is being exploited in the wild

The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that hackers are exploiting a max-severity remote code execution (RCE) vulnerability in workflow automation platform

Author rabih
Load moreLoadingAll items loaded