News
Attackers are using your network against you, according to Cloudflare
1+ hour, 45+ min ago (485+ words) Attackers are turning the very services victims deploy and pay for into tools for launching large-scale attacks. Researchers say the barrier to entry has vanished, as identities and tokens allow attackers to weaponize gaps in cloud-based systems. Organizations" environments are…...
ThreatLocker’s Rob Allen on the dual impact of AI
2+ hour, 11+ min ago (96+ words) ThreatLocker's Rob Allen on the dual impact of AI'CyberScoop Rob Allen, Chief Product Officer at ThreatLocker, discussed the dual impact of AI on cybersecurity, highlighting its role as both a threat accelerant and a tool for defenders. ThreatLocker's "deny by…...
T-Mobile’s Eric Jensen on the challenge of securing vast supply chains
6+ hour, 56+ min ago (199+ words) T-Mobile's Eric Jensen on the challenge of securing vast supply chains'CyberScoop Eric Jensen, Senior Director of Cybersecurity at T-Mobile, discussed the primary challenges his organization faces in defending against an expanding attack surface. He emphasized the importance of understanding and…...
Datadog’s Emilio Escobar on compliance-first AI
6+ hour, 59+ min ago (102+ words) Datadog's Emilio Escobar on compliance-first AI'CyberScoop Emilio Escobar, Chief Information Security Officer for Datadog, discussed the impact of cloud adoption on real-time cybersecurity and threat detection, emphasizing the importance of visibility to make sense of the vast telemetry data generated....
Researchers discover suite of agentic AI browser vulnerabilities
20+ hour, 8+ min ago (320+ words) Researchers have discovered multiple vulnerabilities that let attackers to quietly hijack agentic AI browsers. Researchers at Zenity Labs discovered these flaws, which affected multiple AI browsers, including Perplexity's Comet. Before being patched, an attacker could exploit them via a legitimate…...
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
23+ hour, 24+ min ago (478+ words) An exploit kit that may have originated from a leaked U.S. government framework is behind what researchers are calling the first mass-scale attack on iOS, the operating system for Apple's iPhones. Traces of the exploits, found in the work of Chinese…...
The FBI’s cyber chief is using Winter SHIELD to accelerate China prep, threat intelligence sharing
1+ day, 20+ hour ago (595+ words) The FBI's cyber chief is prioritizing preparation for stepped-up Chinese threats, enhanced confrontation of adversaries in cyberspace and quicker intelligence sharing with industry as the bureau enters the second and final month of a unique cybersecurity awareness campaign. Brett Leatherman,…...
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities
1+ day, 23+ hour ago (467+ words) The memory-corruption vulnerability " CVE-2026-21385 " which Google's Android security team reported to Qualcomm Dec. 18, affects 234 chipsets, Qualcomm said in a security bulletin. Qualcomm said it notified customers of the vulnerability Feb. 2. Qualcomm declined to say when the earliest known instance of…...
Rubrik’s Travis Rosiek on the urgency of rapid cyber recovery
6+ day, 54+ min ago (102+ words) Rubrik's Travis Rosiek on the urgency of rapid cyber recovery'CyberScoop Travis Rosiek, Public Sector CTO at Rubrik, discussed the evolving threat landscape, emphasizing the danger of software supply chain attacks, which can compromise systems through trusted updates. He highlighted the…...
Splunk’s Paul Kurtz highlights urgency around AI-driven security strategies
6+ day, 59+ min ago (97+ words) Splunk's Paul Kurtz highlights urgency around AI-driven security strategies'CyberScoop Paul Kurtz, Chief Cybersecurity Advisor for Splunk, discussed the evolving challenges in cybersecurity, particularly the impact of AI on enterprise defense and the extended software supply chain. He highlighted the urgency…...