Cisco Secure AI Factory with NVIDIA Makes AI Easier to Deploy and Secure, Anywhere Organizations Need It

Expanded architecture lets businesses run AI at scale, from central data centers to the factory floor, without sacrificing performance or security. Cisco announced a major expansion of its Secure AI Factory with NVIDIA, giving customers a framework for deploying AI across their entire infrastructure – from central data center to local sites where data is…

Read More

Accenture Helps Organizations Strengthen Cloud Security with Google Cloud

Cloud security further enhanced as Accenture continues its existing collaboration with Wiz, recently acquired by Google Cloud Accenture announced an expansion of its strategic partnership with Google Cloud to help organizations stay ahead of escalating AI-driven cyber threats, from hyper-personalized social engineering to autonomous malware. The collaboration helps better deliver unified, intelligence-led cyber defense by…

Read More

Google completes acquisition of Wiz

Google announced the completion of its acquisition of Wiz, a leading cloud and AI security platform headquartered in New York. Wiz will join Google Cloud and maintain its brand and commitment to securing customers across all cloud environments. This acquisition is an investment by Google Cloud to improve cloud security and enable organizations to build…

Read More

SailPoint redefines identity security with new adaptive identity innovations

New AI-powered capabilities deliver real-time governance, secure the full spectrum of human and machine identities, and provide integrated threat management for the modern enterprise SailPoint, Inc. today announced significant advancements to its AI-powered SailPoint Platform. These new capabilities are the first of many to deliver on the company’s new adaptive identity vision, an approach designed…

Read More

Securonix Introduces Agentic Mesh and the First Productivity-Based AI Model for the SOC

Powered by Sam, the AI SOC Analyst, the Securonix Agentic Mesh delivers governed, explainable AI that measurably improves SOC productivity and enables board-ready outcomes. Securonix, Inc., in collaboration with Amazon Web Services (AWS), today announced Sam, the AI SOC Analyst, and the Securonix Agentic Mesh, introducing a new operating model for security operations designed to scale…

Read More

Bumble, Match, Panera Bread & CrunchBase hit by cyberattacks, Bloomberg News reports

A new wave of cyberattacks has recently struck several prominent U.S. companies, including Bumble Inc., Panera Bread Co., Match Group Inc., and CrunchBase. Bumble Inc., the parent company of dating apps Bumble, Badoo, and BFF, reported that one of its contractor accounts was compromised in a phishing incident.   Similarly, it has been reported that Bumble…

Read More

Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware

Cybersecurity investigators have identified a new cyberattack campaign connected to the Russia-linked hacking group APT28, also known as UAC-0001. The campaign, named Operation Neusploit, uses a recently discovered Microsoft Office vulnerability called CVE-2026-21509. Security researchers from Zscaler ThreatLabz revealed that the attackers began exploiting the weakness just days after Microsoft publicly disclosed it. The attacks…

Read More

Google Uncovered Significant Expansion in ShinyHunters Threat Landscape

The ShinyHunters threat group has expanded its extortion operations with sophisticated attack methods targeting cloud-based systems across multiple organizations. These cybercriminals use voice phishing and fake harvesting credential websites to steal login information from employees. Once they gain access, they extract sensitive data from cloud software applications and use this information to demand ransom payments from…

Read More

Deloitte Private Global Report Highlights Rising Cybersecurity Risks for family businesses

Key takeaways Nearly three-quarters (74%) of family businesses globally experienced at least one cyberattack in the past two years; 33% faced multiple incidents Nearly half (43%) report having a robust cybersecurity strategy; most rely on basic defenses such as software updates (59%) and multifactor authentication (57%) Family businesses affected by attacks reported financial (54%), operational…

Read More

Open-source AI models can be exploited for criminal activities: Study

A new study shows that open-source AI chatbots, like Meta’s Llama and Google DeepMind’s Gemma, are being used in ways researchers didn’t expect—including by hackers. After tracking thousands of servers running these models worldwide over 293 days, experts found thousands of deployments with security issues, noting hundreds of instances where guardrails had been removed and…

Read More