News
CISA warns organizations of supply chain compromise in Axios npm package delivering remote access trojan
2+ hour, 9+ min ago (566+ words) Industrial Cyber CISA warns organizations of supply chain compromise in Axios npm package delivering remote access trojan The U. S. CISA (Cybersecurity and Infrastructure Security Agency) issued an alert warning of a supply chain compromise affecting the Axios npm package, urging organizations…...
Darktrace introduces Adaptive Human Defense to personalize security training and protection across organizations
3+ week, 6+ day ago (1046+ words) Industrial Cyber Darktrace introduces Adaptive Human Defense to personalize security training and protection across organizations Darktrace announced the launch of Darktrace / Adaptive Human Defense, a new generation of security coaching that replaces static, scheduled security awareness training with adaptive real-time…...
Net Rise Provenance launched to expose open source contributor risk, map impact across software supply chains
3+ week, 6+ day ago (208+ words) For organizations that build and ship software, Net Rise Provenance enables developers and product security teams to set policies to govern selection of open-source projects, automatically failing a build when dependencies cross a risk line. The platform also provides maintainer…...
Armis benchmark exposes systemic security gaps in AI-generated code across leading models
4+ week, 1+ day ago (443+ words) Industrial Cyber Armis benchmark exposes systemic security gaps in AI-generated code across leading models Armis warns that rapid enterprise adoption of AI-native development is outpacing critical security safeguards, leaving organizations exposed to systemic vulnerabilities. In its first benchmark report, Armis…...
Cydome flags NAVTOR Nav Box path traversal and authentication flaws exposing vessel data, networks to cyber risk
1+ mon, 1+ week ago (228+ words) The most severe issues, tracked as CVE-2026-2752 and CVE-2026-2753, carry CVSS scores of 7. 5 and stem from missing authentication controls and an absolute path traversal flaw in the device's HTTP service." The post noted that the vulnerabilities affect Nav Box version…...
OPSWAT debuts Meta Defender Aether combining sandboxing, ML scoring and threat hunting for perimeter security
1+ mon, 1+ week ago (598+ words) Industrial Cyber OPSWAT debuts Meta Defender Aether combining sandboxing, ML scoring and threat hunting for perimeter security OPSWAT introduced Meta Defender Aether, an AI-native decision engine designed to accelerate zero-day threat detection at the network perimeter. The platform brings together…...
CISA launches free web tool to translate software acquisition guidance into actionable procurement steps
7+ mon, 3+ week ago (598+ words) Industrial Cyber News Editor. Anna Ribeiro is a freelance journalist with over 14 years of experience in the areas of security, data storage, virtualization and Io T. CISA launches free web tool to translate software acquisition guidance into actionable procurement steps The…...
Clear Sky exposes Russian cyber operation targeting Ukraine with newly discovered Bad Paw, Meow Meow malware
1+ mon, 2+ week ago (248+ words) At the time of analysis, only nine antivirus engines flagged the file as malicious. Researchers have named the malware Bad Paw, a loader designed to establish communication with a C2 server and download additional malicious components. Clear Sky researchers noted that…...
Armis Developer Portal operationalizes asset intelligence across IT and OT; deepens Centrix integrations
1+ mon, 3+ week ago (443+ words) Armis announces its Armis Developer Portal operationalizes asset intelligence across IT and OT; deepens Centrix integrations Armis, a cyber exposure management and security company, announced on Tuesday the launch of the Armis Developer Portal. The centralized knowledge hub enables organizations…...
CISA updates Brickstorm malware report with new. NET-compiled variant and expanded detection guidance
2+ mon, 1+ week ago (284+ words) CISA analyzed 12 Brickstorm samples obtained from victim organizations, including one where the agency conducted an incident response engagement. CISA initially examined eight samples, added analysis of three more in an update last December, and included one additional sample in the…...