Verizon’s annual Data Breach Investigations Report uncovered a surge of exploited vulnerabilities, and a growing lack of critical defect remediation industrywide.
Another malware wave is washing through open-source software repos, stealing publishing tokens, installing OS‑level backdoors and persisting in developer tools and CI pipelines.
Fox Tempest, a financially-motivated threat group, allowed ransomware operators and other cybercriminals to slip malware-laced software past security controls.
Anthropic and OpenAI promise their latest tools will find more vulnerabilities. Cybersecurity employees say they’re already flooded with AI-generated reports.
This photograph taken in Lyon, eastern France, on September 5, 2023 shows the entrance of the International Criminal Police Organization headquarters, known as Interpol. (Photo by OLIVIER CHASSIGNOLE/AFP via Getty Images)
SEDALIA, CO – JUNE 28: Mesa County Clerk and Colorado Republican candidate for secretary of state Tina Peters (C) follows election results with supporters during a primary night watch party at the Wide Open Saloon on June 28, 2022 in Sedalia, Colorado. Peters lost to former Jefferson County Clerk Pam Anderson, who will move on to face Democratic incumbent Jena Griswold. (Photo by Marc Piscotty/Getty Images)
Peters was sentenced to nine years for stealing voting data and has been publicly unrepentant. But Colorado Governor Jared Polis has been hinting at the decision for…
This week, FTC Chair Andrew Ferguson sent letters to private-sector companies detailing how the commission intends to police compliance once enforcement begins. (Getty Images)
The commission will dole out hefty fines and promises investigations for Take It Down Act violators. Experts say questions remain around the agency’s resources and priorities.
Nick Polk, branch director for cybersecurity at the Executive Office of the President, said government agencies must pay more attention to identity security in the age of AI. (Image Source: Maggie Callahan/Scoop News Group)
While AI tools present unique cybersecurity threats, they still rely on poor identity security by organizations to do the most damage, a White House official said Thursday.