BankInfoSecurity.com
The Smarter Enterprise: A CIO's Blueprint for 2030
4 weeks ago
IBM Survey Finds AI Strategy Now Hinges on Integration and Differentiation
The thriving enterprise of 2030 will be AI-first, not just AI-enabled, said IBM's latest Institute for Business Value. The company surveyed more than 2,000 C-suite executives in the second half of 2025. The results paint a picture of the future of digital transformation dominated by AI technology.
The thriving enterprise of 2030 will be AI-first, not just AI-enabled, said IBM's latest Institute for Business Value. The company surveyed more than 2,000 C-suite executives in the second half of 2025. The results paint a picture of the future of digital transformation dominated by AI technology.
Germany and Israel Pledge Cybersecurity Alliance
4 weeks ago
Berlin Readies Legislation Authorizing More Aggressive Stance in Cyberspace
Germany wants to drastically step up defenses against cyberattacks from foes such as Russia, China, Iran and North Korea, and it's looking to key ally Israel for lessons and cooperation.
Germany wants to drastically step up defenses against cyberattacks from foes such as Russia, China, Iran and North Korea, and it's looking to key ally Israel for lessons and cooperation.
How Check Point Has Built Its AI Security Platform With M&A
4 weeks ago
CEO Nadav Zafrir Discusses Lakera and Veriti Buys, Wiz Pact and AI Strategy Shift
Check Point Software is doubling down on AI security through the acquisitions of Lakera and Veriti and platform integration with Wiz. CEO Nadav Zafrir explains how the firm is shifting from point products to a holistic approach and why it's investing heavily to stay ahead in the AI security race.
Check Point Software is doubling down on AI security through the acquisitions of Lakera and Veriti and platform integration with Wiz. CEO Nadav Zafrir explains how the firm is shifting from point products to a holistic approach and why it's investing heavily to stay ahead in the AI security race.
Minnesota Agency Notifies 304,000 of Vendor Breach
4 weeks ago
State Monitoring Incident Involving a Health Entity Worker for Potential Fraud
The Minnesota Department of Human Services is notifying nearly 304,000 people of data breach involving someone at a healthcare provider who inappropriately accessed information from an IT system managed by a vendor. State officials are monitoring the incident for potential fraud.
The Minnesota Department of Human Services is notifying nearly 304,000 people of data breach involving someone at a healthcare provider who inappropriately accessed information from an IT system managed by a vendor. State officials are monitoring the incident for potential fraud.
Fraud Tops Ransomware in WEF's 2026 Cybersecurity Outlook
4 weeks ago
Findings From WEF's 2026 Report Show Shifting Cyber Priorities as AI Reshapes Risk
Cyber-enabled fraud has overtaken ransomware as the top cybersecurity concern for CEOs heading into 2026, according to the World Economic Forum's Global Cybersecurity Outlook 2026, released ahead of the Davos meeting. AI is a top emerging technology affecting both cyber risk and cyber defense.
Cyber-enabled fraud has overtaken ransomware as the top cybersecurity concern for CEOs heading into 2026, according to the World Economic Forum's Global Cybersecurity Outlook 2026, released ahead of the Davos meeting. AI is a top emerging technology affecting both cyber risk and cyber defense.
Ransomware 'Most Wanted': Cops Seek Head of Black Basta
4 weeks 1 day ago
Crackdown Targets Multiple Members of Cybercrime Group, Including 'Hash Crackers'
Police raided two suspected members of the notorious Black Basta ransomware group - tied to over 600 victims worldwide and many millions in ransom payments - in Ukraine and issued an international arrest warrant for the Russian national suspected of being the operation's founder and ringleader.
Police raided two suspected members of the notorious Black Basta ransomware group - tied to over 600 victims worldwide and many millions in ransom payments - in Ukraine and issued an international arrest warrant for the Russian national suspected of being the operation's founder and ringleader.
HHS Urges Health Sector to Harden Security of PHI, Devices
4 weeks 1 day ago
Feds Pushing HIPAA Regulated Entities to Bolster Security Risk Management
Federal regulators are advising regulated healthcare firms and their third-party vendors to harden systems, software and medical devices to better safeguard protected health information. Hardening is a necessary measure for protecting data privacy and security - as well as patient safety.
Federal regulators are advising regulated healthcare firms and their third-party vendors to harden systems, software and medical devices to better safeguard protected health information. Hardening is a necessary measure for protecting data privacy and security - as well as patient safety.
Aikido Gets $60M Series B to Scale, Automate AI Pen Testing
4 weeks 1 day ago
5x Revenue Growth, $1B Valuation Fuel Investment in Code Security Innovation
Backed by DST Global, Aikido Security's $60 million Series B will fund global expansion and boost its AI-powered security tools. CEO Willem Delbare said the firm's autonomous pen-testing and code remediation capability cuts cost, boosts software resilience and already outperforms humans.
Backed by DST Global, Aikido Security's $60 million Series B will fund global expansion and boost its AI-powered security tools. CEO Willem Delbare said the firm's autonomous pen-testing and code remediation capability cuts cost, boosts software resilience and already outperforms humans.
Over-the-Air Software Updates Pose Risks to Vehicles
4 weeks 1 day ago
eSync Alliance Chair Shrikant Acharya on How Standardization Can Prevent Breaches
Over-the-air updates are an irreplaceable part of software-defined vehicles, giving manufacturers a convenient way of remotely fixing and upgrading vehicles. If not appropriately secured, over-the-air updates can become a gateway for data theft, malware injection, vehicle theft and even injury.
Over-the-air updates are an irreplaceable part of software-defined vehicles, giving manufacturers a convenient way of remotely fixing and upgrading vehicles. If not appropriately secured, over-the-air updates can become a gateway for data theft, malware injection, vehicle theft and even injury.
Anthropic's Cowork Shipped With Known Vulnerability
4 weeks 1 day ago
AI Agent Can Access File Upload API to Exfiltrate Documents
Security researchers have demonstrated how Anthropic's new Claude Cowork productivity agent can be tricked into stealing user files and uploading them to an attacker's account, exploiting a vulnerability the company allegedly knew about.
Security researchers have demonstrated how Anthropic's new Claude Cowork productivity agent can be tricked into stealing user files and uploading them to an attacker's account, exploiting a vulnerability the company allegedly knew about.
Webinar | Securing AI in Practice: What’s Working, What’s Failing, and What to Do Next
1 month ago
Pentagon's Use of Grok Raises AI Security Concerns
1 month ago
Analysts Say Pentagon Must Add Guardrails to Musk's Grok in Military Systems
Cybersecurity analysts said Elon Musk's Grok artificial intelligence model lacks compliance with key federal AI risk frameworks, which will likely force the Pentagon to rely on containment measures while conducting adversarial testing and restricting access to prevent unpredictable or unsafe behavior when embedding the model across its systems.
Cybersecurity analysts said Elon Musk's Grok artificial intelligence model lacks compliance with key federal AI risk frameworks, which will likely force the Pentagon to rely on containment measures while conducting adversarial testing and restricting access to prevent unpredictable or unsafe behavior when embedding the model across its systems.
Penetration Testing Startup Novee Exits Stealth With $51.5M
1 month ago
Israeli Startup Novee's Custom AI Agents Mimic Human Attackers to Scale Detection
Novee launched with $51.5 million in funding to build AI agents trained to find and fix vulnerabilities. Its proprietary model combines human-led research, prompt engineering and simulations to offer scalable penetration testing as AI-fueled threats outpace traditional tools.
Novee launched with $51.5 million in funding to build AI agents trained to find and fix vulnerabilities. Its proprietary model combines human-led research, prompt engineering and simulations to offer scalable penetration testing as AI-fueled threats outpace traditional tools.
Epic Lawsuit Targets Alleged 'Sham' Providers in Data HIE
1 month ago
Suit Alleges Competitor Lets 'Shell Firms' Exploit National Data Exchanges
Electronic health records giant Epic Systems is accusing a rival health information network vendor, Health Gorilla, of enabling a syndicate of "sham" entities "masquerading" as healthcare providers to improperly access patient records from national health data exchanges in pursuit of money.
Electronic health records giant Epic Systems is accusing a rival health information network vendor, Health Gorilla, of enabling a syndicate of "sham" entities "masquerading" as healthcare providers to improperly access patient records from national health data exchanges in pursuit of money.
ISP Sinkholes Kimwolf Servers Amid Eruption of Bot Traffic
1 month ago
Lumen Spotted More Than 500 Command and Control Servers Since October
A major U.S. internet service provider said it's blocked incoming traffic to more than 550 command and control servers botnets identified over the past four months that administer the Kimwolf and Aisuru botnets.
A major U.S. internet service provider said it's blocked incoming traffic to more than 550 command and control servers botnets identified over the past four months that administer the Kimwolf and Aisuru botnets.
CISA, Allies Sound Alarm on OT Network Exposure
1 month ago
Joint US, UK and Five Eyes Guidance Flags OT Exposure as National Risk
U.S. and allied cyber agencies issued new guidance warning that insecure operational technology connectivity - driven by remote access, third-party vendors and IT integration - remains a major threat vector, enabling cyber intrusions to escalate into physical disruptions.
U.S. and allied cyber agencies issued new guidance warning that insecure operational technology connectivity - driven by remote access, third-party vendors and IT integration - remains a major threat vector, enabling cyber intrusions to escalate into physical disruptions.
Breach Roundup: Software Update Caused Verizon Outage
1 month ago
Also, Venezuela Cyberattack, Endesa Confirms Breach and Telegram IP Leak
This week, a software flaw caused the Verizon outage. U.S. cyberattack in Venezuela. ICE identities published online. BreachForums users leaked. Spanish energy provider Endesa data breach. Telegram privacy risk. A MuddyWater upgrade. Dutch man sentenced for hacking a maritime port. A ServiceNow patch.
This week, a software flaw caused the Verizon outage. U.S. cyberattack in Venezuela. ICE identities published online. BreachForums users leaked. Spanish energy provider Endesa data breach. Telegram privacy risk. A MuddyWater upgrade. Dutch man sentenced for hacking a maritime port. A ServiceNow patch.
Torq Gets $140M Series D to Fuel AI-Powered SOC Capabilities
1 month ago
Funding at $1.2B Valuation to Propel Federal Market Entry and R&D in GenAI
Torq secured $140 million in Series D funding at a $1.2 billion valuation to expand its generative AI-powered security operations platform. With backing from Merlin Ventures, Torq will grow internationally, deepen AI research and pursue U.S. federal opportunities including FedRAMP certification.
Torq secured $140 million in Series D funding at a $1.2 billion valuation to expand its generative AI-powered security operations platform. With backing from Merlin Ventures, Torq will grow internationally, deepen AI research and pursue U.S. federal opportunities including FedRAMP certification.
CIO Playbook for Post-Quantum Security
1 month ago
Forrester's Sandy Carielli on Quantum Readiness, Key Steps for Successful Migration
Quantum security migrations are multi-year, cross-functional projects that touch product, infrastructure and supply chains. While the scope of migration can be daunting, CIOs can follow several practical steps to make the project more manageable, said Forrester's Sandy Carielli.
Quantum security migrations are multi-year, cross-functional projects that touch product, infrastructure and supply chains. While the scope of migration can be daunting, CIOs can follow several practical steps to make the project more manageable, said Forrester's Sandy Carielli.
Checked
8 hours 52 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed