Cyber experts, Democrats urge Trump administration not to break up cyber coordination in State reorg | CyberScoop
Splitting up the Cyberspace and Digital Policy bureau undercuts efforts to streamline cyber efforts at the department and undermines coordination in the U.S. and abroad, critics of the plan argue.
News alert: At RSAC 2025, SecAI unveils platform that fuses agentic AI, contextual threat intelligence
San Francisco, Calif., Apr 29, 2025, CyberNewswire -- SecAI, an AI-enriched threat intelligence company, made its official debut today at RSA Conference 2025 in San Francisco, marking the company’s first public appearance on the global cybersecurity stage. At the event, the SecAI team is showcasing the latest version of its platform to security professionals from
Grinex exchange suspected rebrand of sanctioned Garantex crypto firm
A new cryptocurrency exchange named Grinex is believed to be a rebrand of Garantex, a Russian cryptocurrency exchange whose domains were seized by the U.S. authorities and an admin arrested.
Microsoft: Windows Server hotpatching to require subscription
Microsoft has announced that it will soon introduce paid subscriptions for Windows Server 2025 hotpatching, a service that enables admins to install security updates without restarting.
France ties Russian APT28 hackers to 12 cyberattacks on French orgs
Today, the French foreign ministry blamed the APT28 hacking group linked to Russia's military intelligence service (GRU) for targeting or breaching a dozen French entities over the last four years.
Hackers ramp up scans for leaked Git tokens and secrets
Threat actors are intensifying internet-wide scanning for Git configuration files that can reveal sensitive secrets and authentication tokens used to compromise cloud services and source code repositories.
Amazon, CrowdStrike leaders say private threat intel can quickly bring cybercriminals to justice | CyberScoop
Threat intel experts expounded on how their data does not only serve to temporarily disrupt malicious activity, but find, arrest and convict cybercriminals for their offenses.
Apple 'AirBorne' flaws can lead to zero-click AirPlay RCE attacks
A set of security vulnerabilities in Apple's AirPlay Protocol and AirPlay Software Development Kit (SDK) exposed unpatched third-party and Apple devices to various attacks, including remote code execution.
France blames Russian military intelligence for years of cyberattacks on local entities
In a rare public attribution, the French foreign ministry said on Tuesday it “condemns in the strongest possible terms” the actions of the GRU-linked threat actor known as APT28 for attacks against local entities.
SK Telecom cyberattack: Free SIM replacements for 25 million customers
South Korean mobile provider SK Telecom has announced free SIM card replacements to its 25 million mobile customers following a recent USIM data breach, but only 6 million cards are available through May.
Veza lève 108 millions de dollars pour sa plateforme de gestion des identités
Soutenue par Snowflake et Atlassian, Veza développe une plateforme d'analyse des applications d'une société afin de déterminer quel utilisateur...-Cybersécurité
Cisco mêle sécurité et intelligence artificielle au sein d'une entité baptisée Foundation AI
Le lancement de Foundation AI a pour volonté de démocratiser la sécurité autour de l’IA grâce à une panoplie d'outils open source. Un premier...-IA générative
House passes legislation to criminalize nonconsensual deepfakes | CyberScoop
The Take It Down Act received rare levels of bipartisan support in the House and Senate, but critics fear enforcement could threaten First Amendment protections and unduly burden smaller companies and encrypted applications.
Microsoft fixes Outlook paste, blank calendar rendering issues
Microsoft has confirmed several issues affecting Microsoft 365 customers using the "paste special' option and the calendar feature in the classic Outlook email client.
RSAC Fireside Chat: Shift left, think forward — why MDR is emerging as cyber’s silver bullet
With RSAC kicking off next week, the conversation is shifting—literally. Cybersecurity pros are rethinking how “shift left” applies not just to code, but to enterprise risk. Related: Making sense of threat detection In this Fireside Chat, I spoke with John DiLullo, CEO of Deepwatch, who makes a compelling case for how Managed Detection and Response
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
Google's Threat Intelligence Group (GTIG) says attackers exploited 75 zero-day vulnerabilities in the wild last year, over 50% of which were linked to spyware attacks.
CISA tags Broadcom Fabric OS, CommVault flaws as exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning of Broadcom Brocade Fabric OS, Commvault web servers, and Qualitia Active! Mail clients vulnerabilities that are actively exploited in attacks.