News
The hidden security cost of treating labs like data centers
1+ hour, 2+ min ago (437+ words) In this Help Net Security interview, Rich Kellen, VP, CISO at IFF, explains why security teams should not treat OT labs like IT environments. He discusses how compromise can damage scientific integrity and create safety risks that backups cannot fix....
Enterprises are racing to secure agentic AI deployments
1+ hour, 32+ min ago (705+ words) AI assistants are tied into ticketing systems, source code repositories, chat platforms, and cloud dashboards across many enterprises. In some environments, these systems can open pull requests, query internal databases, book services, and trigger automated workflows with limited human involvement....
Criminals create business website to sell RAT disguised as RMM tool
2+ day, 18+ hour ago (440+ words) A RAT masquerading as legitimate remote monitoring and management (RMM) software is being sold to cybercriminals as a service, Proofpoint researchers recently discovered. The fake RMM tool, called TrustConnect, was being marketed via an LLM-created website parked on trustconnectsoftware[.]com,…...
Applying green energy tax policies to improve cybersecurity
3+ day, 1+ hour ago (520+ words) For years, governments have focused only on the stick of compliance when they could leverage the carrot of tax incentives. Theoretically, compliance fines and penalties should act as a deterrent that improves accountability and reduces data breaches. However, many vendors…...
Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)
3+ day, 19+ hour ago (353+ words) A critical security vulnerability (CVE-2026-2329) in Grandstream VoIP phones could let hackers remotely take full control of the devices and even intercept calls, Rapid7 researchers discovered. "The vulnerability is present in the device's web-based API service, and is accessible in a…...
Microsoft signals breakthrough in data storage that can last for generations
3+ day, 22+ hour ago (176+ words) Close up of Writer showing high-speed multi-beam data encoding on laser pulses (Source: Microsoft) Rising global data volumes increase the need for storage that can last for generations. Researchers believe this technology could preserve information for up to 10,000 years. Richard…...
Securonix shifts security operations to measurable AI-driven productivity
4+ day, 16+ hour ago (549+ words) Securonix announced Sam, the AI SOC Analyst, and the Securonix Agentic Mesh, introducing a new operating model for security operations that scales analyst productivity, governs AI in production, and delivers board-ready outcomes. Sam is Securonix's AI SOC Analyst. It is…...
Cloud Range launches AI Validation Range to safely test and secure AI before deployment
4+ day, 17+ hour ago (456+ words) Cloud Range has introduced its AI Validation Range, a secure, contained virtual cyber range that enables organizations to test, train, and validate AI models, applications, and autonomous agents without risking exposure of sensitive production data. AI adoption is accelerating faster…...
ISC2 Knowledge Vault Webinars—Cybersecurity Discussions
5+ day, 17+ hour ago (154+ words) Ready to get certified but not sure where to start? Get insider tips and tricks on what to do from day one to test day. Join ISC2-certified instructors and an audience of your peers for this live interactive webinar on…...
OT teams are losing the time advantage against industrial threat actors
5+ day, 17+ hour ago (397+ words) Dragos tracked 26 threat groups targeting OT environments, including three new groups identified in 2025: AZURITE, PYROXENE, and SYLVANITE. The activity across these groups shows more specialization and a growing division of labor, where one team focuses on gaining access and another…...