Hackers use fake NDAs to deliver malware to US manufacturers
Hackers are targeting American industrial firms by contacting them through their website forms, posing as potential business partners before infecting them with malware.
Over 28,000 Citrix devices vulnerable to new exploited RCE flaw
More than 28,200 Citrix instances are vulnerable to a critical remote code execution vulnerability tracked as CVE-2025-7775 that is already being exploited in the wild.
Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks
The three companies were accused of providing “cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security” since at least 2021, according to the advisory.
Nevada “Network Security Incident” Shuts Down State Offices and Services
The Office of the Governor of Nevada revealed that the incident has shut down in-person State services, while government phone lines and websites are offline
Spanish police arrest student suspected of hacking school system to change grades
Spanish police have arrested a university student suspected of hacking the local government’s education management system to alter grades and gain access to professors’ emails.
Why zero trust is never 'done' and is an ever-evolving process
Zero trust isn't a project you finish—it's a cycle that keeps evolving. From supply chain exploits to policy drift, resilience requires continuous testing and adaptation. Learn how Specops Software supports this journey with tools that make it easier.
Framework to Protect Digital Identities in Agentic AI | CSA
The Digital Identity Rights Framework safeguards digital identities in AI environments by integrating legal & technical controls that ensure traceability.
From international conflicts and cyber warfare to tariffs and trade protectionism, today’s geopolitical landscape is creating unprecedented challenges for global supply chains. These forces directly affect material costs, logistics and overall operational stability, leaving companies to navigate increasing uncertainty. Now more than ever, leaders must understand how national security concerns and international politics can quickly....
Healthcare Services Group data breach impacts 624,000 people
The Healthcare Services Group (HSGI) is alerting more than 600,000 individuals that their personal information was exposed in a security breach last year.
More vulnerable stalkerware victims’ data exposed in new TheTruthSpy flaw
TheTruthSpy is at it again. A security researcher has discovered a flaw in the Android-based stalkerware that allows anyone to compromise any record in the system.
Compliance frameworks often fall short of addressing the nuanced nature of cyber risks. Risk-based security measures enhance your overall security posture.
We Are Still Unable to Secure LLMs from Malicious Inputs - Schneier on Security
Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official document on company meeting policies. But inside the document, Bargury hid a 300-word malicious prompt that contains instructions for ChatGPT. The prompt is written in white text in a size-one font, something that a human is unlikely to see but a machine will still read. In a proof of concept video of the attack...