Experts Flag Major Security Flaws in Grok 4 as xAI Expands Federal Access
Grok 4 shows severe security gaps unless properly prompted before use. ChatGPT-4o provides stronger safety by default compared to Grok…
Virtru Raises $50 Million, Secures Data as AI Use Grows
Virtru secures $50 million to develop its data-centric security solutions. The Trusted Data Format embeds controls within the data for…
French Police Hold Ex-Penn State Player on U.S. Ransomware Charge
French police arrested Daniil Kasatkin at the U.S. government’s request in June. Authorities allege his involvement in ransomware negotiations, which…
Experts Warn Trump Bill Hits Healthcare Cybersecurity Funding
Healthcare cybersecurity faces increased pressure following federal funding cuts. Loss of federal advisory councils disrupts coordinated cyber risk strategies. Sector-wide…
Oligo Security Introduces Application Attack Matrix to Map App Layer Threats
Oligo Security launched the Application Attack Matrix for application-layer threats. The framework aims to address limitations in the MITRE ATT&CK…
Call of Duty Pulls PC Game After Hackers Seize Players’ Computers
Call of Duty: World War 2 PC was taken offline due to major security issues. Hackers exploited peer-to-peer networking to…
Scattered Spider Tactics Pressure Companies With Rapid Social Attacks
Scattered Spider uses social engineering to access major organizations across industries. Attribution remains difficult due to the group’s adaptability and…
Congress Directs Major Funding to Military Cybersecurity Initiatives
Congress allocated major cybersecurity funds, focusing on military agencies. Limited direct funding went to civilian cyber infrastructure. Bipartisan debate on…
China-Linked Cyberattack Targets French Infrastructure Using Ivanti Flaws
Ivanti vulnerabilities led to major attacks on French critical sectors in 2024. UNC5174, linked to China, exploited zero-days to steal…
FBI Reports Chinese Hackers Remain Contained in US Telecoms
Salt Typhoon remains dormant but contained in US telecom company networks. Authorities face difficulties removing entrenched cyber actors from infrastructure.…
