DataBreachToday.com
Pentagon’s Use of Grok Raises AI Security Concerns
17 hours 48 minutes ago
Analysts Say Pentagon Must Add Guardrails to Musk's Grok in Military Systems
Cybersecurity analysts said Elon Musk’s Grok artificial intelligence model lacks compliance with key federal AI risk frameworks, which will likely force the Pentagon to rely on containment measures while conducting adversarial testing and restricting access to prevent unpredictable or unsafe behavior when embedding the model across its systems.
Cybersecurity analysts said Elon Musk’s Grok artificial intelligence model lacks compliance with key federal AI risk frameworks, which will likely force the Pentagon to rely on containment measures while conducting adversarial testing and restricting access to prevent unpredictable or unsafe behavior when embedding the model across its systems.
Penetration Testing Startup Novee Exits Stealth With $51.5M
17 hours 48 minutes ago
Israeli Startup Novee's Custom AI Agents Mimic Human Attackers to Scale Detection
Novee launched with $51.5 million in funding to build AI agents trained to find and fix vulnerabilities. Its proprietary model combines human-led research, prompt engineering and simulations to offer scalable penetration testing as AI-fueled threats outpace traditional tools.
Novee launched with $51.5 million in funding to build AI agents trained to find and fix vulnerabilities. Its proprietary model combines human-led research, prompt engineering and simulations to offer scalable penetration testing as AI-fueled threats outpace traditional tools.
Epic Lawsuit Targets Alleged ‘Sham’ Providers in Data HIE
17 hours 48 minutes ago
Suit Alleges Competitor Lets 'Shell Firms' Exploit National Data Exchanges
Electronic health records giant Epic Systems is accusing a rival health information network vendor, Health Gorilla, of enabling a syndicate of "sham" entities "masquerading" as healthcare providers to improperly access patient records from national health data exchanges in pursuit of money.
Electronic health records giant Epic Systems is accusing a rival health information network vendor, Health Gorilla, of enabling a syndicate of "sham" entities "masquerading" as healthcare providers to improperly access patient records from national health data exchanges in pursuit of money.
ISP Sinkholes Kimwolf Servers Amid Eruption of Bot Traffic
17 hours 48 minutes ago
Lumen Spotted More Than 500 Command and Control Servers Since October
A major U.S. internet service provider said it's blocked incoming traffic to more than 550 command and control servers botnets identified over the past four months that administer the Kimwolf and Aisuru botnets.
A major U.S. internet service provider said it's blocked incoming traffic to more than 550 command and control servers botnets identified over the past four months that administer the Kimwolf and Aisuru botnets.
Trump's National Fraud Enforcement Plan Falls Short
1 day 20 hours ago
New Agency Focuses on Public Programs, Ignores Private Sector Fraud
Citing recent high-profile arrests of fraud rings in Minnesota, President Donald Trump announced the creation of National Fraud Enforcement division in the Department of Justice. Sounds nice, but will it make a difference without deeper coordination with banks, payment platforms and businesses?
Citing recent high-profile arrests of fraud rings in Minnesota, President Donald Trump announced the creation of National Fraud Enforcement division in the Department of Justice. Sounds nice, but will it make a difference without deeper coordination with banks, payment platforms and businesses?
CISA, Allies Sound Alarm on OT Network Exposure
1 day 20 hours ago
Joint US, UK and Five Eyes Guidance Flags OT Exposure as National Risk
U.S. and allied cyber agencies issued new guidance warning that insecure operational technology connectivity - driven by remote access, third-party vendors and IT integration - remains a major threat vector, enabling cyber intrusions to escalate into physical disruptions.
U.S. and allied cyber agencies issued new guidance warning that insecure operational technology connectivity - driven by remote access, third-party vendors and IT integration - remains a major threat vector, enabling cyber intrusions to escalate into physical disruptions.
Breach Roundup: Software Update Caused Verizon Outage
1 day 20 hours ago
Also, Venezuela Cyberattack, Endesa Confirms Breach and Telegram IP Leak
This week, a software flaw caused the Verizon outage. U.S. cyberattack in Venezuela. ICE identities published online. BreachForums users leaked. Spanish energy provider Endesa data breach. Telegram privacy risk. A MuddyWater upgrade. Dutch man sentenced for hacking a maritime port. A ServiceNow patch.
This week, a software flaw caused the Verizon outage. U.S. cyberattack in Venezuela. ICE identities published online. BreachForums users leaked. Spanish energy provider Endesa data breach. Telegram privacy risk. A MuddyWater upgrade. Dutch man sentenced for hacking a maritime port. A ServiceNow patch.
Torq Gets $140M Series D to Fuel AI-Powered SOC Capabilities
1 day 20 hours ago
Funding at $1.2B Valuation to Propel Federal Market Entry and R&D in GenAI
Torq secured $140 million in Series D funding at a $1.2 billion valuation to expand its generative AI-powered security operations platform. With backing from Merlin Ventures, Torq will grow internationally, deepen AI research and pursue U.S. federal opportunities including FedRAMP certification.
Torq secured $140 million in Series D funding at a $1.2 billion valuation to expand its generative AI-powered security operations platform. With backing from Merlin Ventures, Torq will grow internationally, deepen AI research and pursue U.S. federal opportunities including FedRAMP certification.
CIO Playbook for Post-Quantum Security
1 day 20 hours ago
Forrester's Sandy Carielli on Quantum Readiness, Key Steps for Successful Migration
Quantum security migrations are multi-year, cross-functional projects that touch product, infrastructure and supply chains. While the scope of migration can be daunting, CIOs can follow several practical steps to make the project more manageable, said Forrester's Sandy Carielli.
Quantum security migrations are multi-year, cross-functional projects that touch product, infrastructure and supply chains. While the scope of migration can be daunting, CIOs can follow several practical steps to make the project more manageable, said Forrester's Sandy Carielli.
PharMerica Will Pay at Least $5.2M to Settle Hack Lawsuit
2 days 18 hours ago
Ransomware Gang Money Message Claimed It Exfiltrated 4.7TB of Firm's Data
Pharmacy services firm PharMerica will pay at least $5.27 million - plus millions more on enhancing its security - as part of a preliminary class action settlement approved this week by a federal court involving a 2023 data theft incident the company reported as affecting 5.8 million individuals.
Pharmacy services firm PharMerica will pay at least $5.27 million - plus millions more on enhancing its security - as part of a preliminary class action settlement approved this week by a federal court involving a 2023 data theft incident the company reported as affecting 5.8 million individuals.
Court Axes Investor Lawsuit Over CrowdStrike Software Update
2 days 18 hours ago
Misstatement Claims Tossed in Class-Action Securities Case After CrowdStrike Outage
A U.S. district judge tossed most claims from investors accusing CrowdStrike of misrepresenting its software testing rigor before a July 2024 outage. The judge said two statements about federal compliance could plausibly be misleading, but said plaintiffs failed to establish intent or recklessness.
A U.S. district judge tossed most claims from investors accusing CrowdStrike of misrepresenting its software testing rigor before a July 2024 outage. The judge said two statements about federal compliance could plausibly be misleading, but said plaintiffs failed to establish intent or recklessness.
Incorporating Geopolitical Risk Into Your IT Strategy
2 days 18 hours ago
Scenario Planning Must Model Disruption, Strengthen Cyber Basics, Build Redundancy
IT organizations know how to plan for outages, but even the most rigorously designed strategy is vulnerable to the shifting winds of geopolitics. CIOs and technology leaders need to know how their organizations will respond to geopolitical disruptions, and scenario planning needs to be a priority.
IT organizations know how to plan for outages, but even the most rigorously designed strategy is vulnerable to the shifting winds of geopolitics. CIOs and technology leaders need to know how their organizations will respond to geopolitical disruptions, and scenario planning needs to be a priority.
The Difference Between Answering for and Owning It
2 days 22 hours ago
How to Deal With Having Influence Without Authority in Cybersecurity Roles
In some cybersecurity organizations, expertise and visible leadership don't reside in the same role. Usually, the person with the most influence on cybersecurity decisions is the owner, but it does not always work out that way. Fortunately, there are things you can do to change that for your career.
In some cybersecurity organizations, expertise and visible leadership don't reside in the same role. Usually, the person with the most influence on cybersecurity decisions is the owner, but it does not always work out that way. Fortunately, there are things you can do to change that for your career.
DeadLock Ransomware Group Utilizes Polygon Smart Contracts
2 days 22 hours ago
Stealthy Group Taps Blockchain 'EtherHiding' to Facilitate Victim Communications
The DeadLock ransomware group, a newly emerged digital extortion group, is using blockchain smart contracts to store proxy server addresses for facilitating ransomware negotiations with victim organizations. The technique suggests the group is made up of experienced cybercriminals.
The DeadLock ransomware group, a newly emerged digital extortion group, is using blockchain smart contracts to store proxy server addresses for facilitating ransomware negotiations with victim organizations. The technique suggests the group is made up of experienced cybercriminals.
Flaw in AI Libraries Exposes Models to Remote Code Execution
2 days 22 hours ago
3 Major Tech Firms Shipped Vulnerable Open-Source Tools to Hugging Face
Researchers discovered remote code execution vulnerabilities in three AI libraries from Apple, Salesforce and Nvidia used by models with tens of millions of Hugging Face downloads, allowing attackers to hide malicious code in model metadata.
Researchers discovered remote code execution vulnerabilities in three AI libraries from Apple, Salesforce and Nvidia used by models with tens of millions of Hugging Face downloads, allowing attackers to hide malicious code in model metadata.
Seraphic Acquisition Arms CrowdStrike for AI Browser Threats
2 days 22 hours ago
$420M Deal Enables Web Detection and Response, Secures AI-Driven Browser Activity
CrowdStrike is bolstering its Falcon platform with browser-native web detection and response by acquiring Seraphic for $420 million. The technology helps protect AI workflows by securing any browser against data leakage, session hijacking and other web-based threats.
CrowdStrike is bolstering its Falcon platform with browser-native web detection and response by acquiring Seraphic for $420 million. The technology helps protect AI workflows by securing any browser against data leakage, session hijacking and other web-based threats.
Verizon Outage Felt Across United States
2 days 22 hours ago
Cause Unknown But Many Previous Outages Due to Software Misconfiguration
Verizon customers along the Eastern Seaboard and Southern parts of the United States lost mobile phone connectivity Wednesday in an incident that appears to have peaked around 1 p.m. Eastern Standard Time.
Verizon customers along the Eastern Seaboard and Southern parts of the United States lost mobile phone connectivity Wednesday in an incident that appears to have peaked around 1 p.m. Eastern Standard Time.
Minimizing Attack Surface in IT-OT Converged Manufacturing Environments
3 days 16 hours ago
Cancer Center: Hackers Stole Research Files, Encrypted Data
3 days 16 hours ago
University of Hawaii Cancer Center Paid Ransom
Cancer patients who participated in University of Hawaii Cancer Center studies during the 1990s may soon receive a notification that ransomware hackers stole their data in an August 2025 incident. Experts said the hack spotlights concerning risks involving compromises of medical research data.
Cancer patients who participated in University of Hawaii Cancer Center studies during the 1990s may soon receive a notification that ransomware hackers stole their data in an August 2025 incident. Experts said the hack spotlights concerning risks involving compromises of medical research data.
Checked
9 hours 45 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed