Identity Security Lessons from the Treasury Incident | CSA
The Treasury Department breach highlights the persistent risks organizations face with identity security. Learn how to better protect your sensitive systems.
ReVault flaws let hackers bypass Windows login on Dell laptops
ControlVault3 firmware vulnerabilities impacting over 100 Dell laptop models can allow attackers to bypass Windows login and install malware that persists across system reinstalls.
Who Got Arrested in the Raid on the XSS Crime Forum?
On July 22, 2025, the European police agency Europol said a long-running investigation led by the French Police resulted in the arrest of a 38-year-old administrator of XSS, a Russian-language cybercrime forum with more than 50,000 members. The action has triggered…
WhatsApp adds new security feature to protect against scams
WhatsApp is introducing a new security feature that will help users spot potential scams when they are being added to a group chat by someone not in their contact list.
Trend Micro warns of Apex One zero-day exploited in attacks
Trend Micro has warned customers to immediately secure their systems against an actively exploited remote code execution vulnerability in its Apex One endpoint security platform.
The Semiconductor Industry and Regulatory Compliance - Schneier on Security
Earlier this week, the Trump administration narrowed export controls on advanced semiconductors ahead of US-China trade negotiations. The administration is increasingly relying on export licenses to allow American semiconductor firms to sell their products to Chinese customers, while keeping the most powerful of them out of the hands of our military adversaries. These are the chips that power the artificial intelligence research fueling China’s technological rise, as well as the advanced military equipment underpinning Russia’s invasion of Ukraine...
SonicWall firewalls hit by active mass exploitation of suspected zero-day | CyberScoop
About 20 organizations have been impacted and the pace of attacks is rising. Threat researchers and SonicWall are scrambling to determine the root cause.
Why identity is the definitive cyber defense for federal agencies | CyberScoop
As adversaries leverage AI to mimic user behavior, agencies must adopt dynamic identity architectures to verify every interaction and safeguard critical missions continuously. As adversaries leverage AI to mimic user behavior, agencies must adopt dynamic identity architectures to verify every interaction and safeguard critical missions continuously.