DataBreachToday.com
Koi Purchase Bolsters Palo Alto's AI Attack Surface Defense
1 month 2 weeks ago
$300M Acquisition Strengthens Palo Alto Networks' XDR and AI Governance Platform
Palo Alto Networks plans to acquire Koi Security for $300 million to address growing AI-driven endpoint risks. The startup's technology adds deep visibility into AI agents plug-ins and nonbinary code, enhancing Cortex XDR and Prisma AIRS as enterprises confront a growing unmanaged AI attack surface.
Palo Alto Networks plans to acquire Koi Security for $300 million to address growing AI-driven endpoint risks. The startup's technology adds deep visibility into AI agents plug-ins and nonbinary code, enhancing Cortex XDR and Prisma AIRS as enterprises confront a growing unmanaged AI attack surface.
Chronosphere Deal Signals Security-Observability Convergence
1 month 2 weeks ago
Founder, CEO Martin Mao: AI-Driven Remediation, Data Optimization at Core of Deal
Palo Alto Networks' acquisition of Chronosphere will help unify observability and security operations. The integration with Cortex AgentiX and Cortex XSIAM aims to automate remediation, optimize telemetry pipelines and help enterprises manage soaring data volumes from cloud-native and AI workloads.
Palo Alto Networks' acquisition of Chronosphere will help unify observability and security operations. The integration with Cortex AgentiX and Cortex XSIAM aims to automate remediation, optimize telemetry pipelines and help enterprises manage soaring data volumes from cloud-native and AI workloads.
Texas Sues TP-Link for Covering Up Chinese Manufacturing
1 month 2 weeks ago
Router Maker Accuses Rivals, Competitors of Smear Campaign
The Texas attorney general invoked state consumer protection law to sue Wi-Fi router maker TP-Link Systems for misrepresenting its connections to mainland China and the security of its ubiquitous devices. The suit says TP-Link should be forced to declare that their products are made in China.
The Texas attorney general invoked state consumer protection law to sue Wi-Fi router maker TP-Link Systems for misrepresenting its connections to mainland China and the security of its ubiquitous devices. The suit says TP-Link should be forced to declare that their products are made in China.
Massiv Attack: Android Trojan Targets IPTV Users
1 month 2 weeks ago
New Trojan May Soon Be Offered for Sale to Criminal Underground
Security researchers warn of "Massiv," an Android Trojan - disguised as an IPTV app - targeting users who sideload streaming apps. The malware enables screen capture, overlays and credential theft - and may soon be marketed on criminal underground forums as malware as a service.
Security researchers warn of "Massiv," an Android Trojan - disguised as an IPTV app - targeting users who sideload streaming apps. The malware enables screen capture, overlays and credential theft - and may soon be marketed on criminal underground forums as malware as a service.
AI-Native SOC Data Fitness: From Telemetry Flood to Decision-Quality Signals
1 month 2 weeks ago
'Promptware' Attacks Await an Unprepared AI Industry
1 month 2 weeks ago
Researchers Say AI Prompt Injection Has Emerged As a Dangerous New Class of Attacks
The large language model industry has mostly treated prompt injection attacks as a risk analogous to traditional web server prompt injection attacks. Researchers now say feeding rogue instructions to an artificial intelligence system merits its own classification as "promptware."
The large language model industry has mostly treated prompt injection attacks as a risk analogous to traditional web server prompt injection attacks. Researchers now say feeding rogue instructions to an artificial intelligence system merits its own classification as "promptware."
Hackers Increasingly Prefer Fast and Low-Complexity Attacks
1 month 2 weeks ago
Incident Responders Detail Top Ransomware and Business Email Compromise Tactics
There's no need to invest into sophisticated hacking operations when moving fast and exploiting well-trod techniques gives threat actors all the access they want. Threat actors are prioritizing "low-complexity entry points, rather than investing in sophisticated exploits," say incident responders.
There's no need to invest into sophisticated hacking operations when moving fast and exploiting well-trod techniques gives threat actors all the access they want. Threat actors are prioritizing "low-complexity entry points, rather than investing in sophisticated exploits," say incident responders.
Banks Need Revocable AI Identities, Continuous Trust Models
1 month 2 weeks ago
Fraud Specialist David Barnhardt on Addressing Authentication Risks of Agentic AI
Financial institutions are racing to deploy AI agents that can initiate payments, approve transactions and freeze accounts. But traditional authentication frameworks assume there's a human on the other end. As agentic AI use grows, banks are facing an authentication crisis that demands new controls.
Financial institutions are racing to deploy AI agents that can initiate payments, approve transactions and freeze accounts. But traditional authentication frameworks assume there's a human on the other end. As agentic AI use grows, banks are facing an authentication crisis that demands new controls.
How 72% of Enterprises Are Rewriting Cyber Resilience Playbooks
1 month 2 weeks ago
Cyber threats are continuous, unpredictable, and increasingly sophisticated. This session provides actionable insights to help organisations prepare, respond, and recover with confidence—while enabling innovation and growth.
Data Minimization Is Still an Underrated Security Control
1 month 2 weeks ago
Why Reducing Data Volume Matters More Than Ever for SOCs and CISOs
Data minimization is often perceived as a constraint on innovation. In reality, it is the ultimate enabler of resilience. It reduces the impact of breaches, weakens ransomware leverage, improves SOC efficiency and secures the AI frontier.
Data minimization is often perceived as a constraint on innovation. In reality, it is the ultimate enabler of resilience. It reduces the impact of breaches, weakens ransomware leverage, improves SOC efficiency and secures the AI frontier.
Chatbots, IT Outages, Devices Top 2026 Health Tech Hazards
1 month 2 weeks ago
AI chatbots rank as the number-one health tech hazard in 2026, followed by "digital darkness" and legacy medical device cyber issues, said Rob Schluth and Scott Luney, technology and security experts at patient safety group ECRI Institute, which compiles an annual top 10 list. They explained why.
Kettering Health Notifying Patients of Interlock Breach
1 month 2 weeks ago
Cybercrime Group First Listed Ohio Health System as a Data Theft Victim Last June
Ohio-based Kettering Health is notifying current and former patients and "affiliates" that their personal, health and financial information was potentially compromised in a May 2025 ransomware attack and data theft incident claimed by cybercriminal gang Interlock.
Ohio-based Kettering Health is notifying current and former patients and "affiliates" that their personal, health and financial information was potentially compromised in a May 2025 ransomware attack and data theft incident claimed by cybercriminal gang Interlock.
Is Your GRC Program Really Reducing Risk?
1 month 2 weeks ago
CISO Sean Atkinson on Moving From 'GRC Theater' to Continuous GRC Engineering
As NIST, ISO, SOC 2, NIS2 and DORA expand compliance pressure, many organizations are optimizing for audit success instead of risk reduction. Sean Atkinson warns that “GRC theater” creates false confidence. Adversaries operate continuously and so should GRC engineering, he said.
As NIST, ISO, SOC 2, NIS2 and DORA expand compliance pressure, many organizations are optimizing for audit success instead of risk reduction. Sean Atkinson warns that “GRC theater” creates false confidence. Adversaries operate continuously and so should GRC engineering, he said.
Cyber Startups to Take Innovation Spotlight at RSAC 2026
1 month 2 weeks ago
As Innovation Sandbox Turns 21, AI-Based Solutions Dominate Annual Contest
Next month in San Francisco, the Innovation Sandbox at RSAC Conference will celebrate its 21st year of choosing key emerging solutions in cybersecurity. Past winners and finalists range from EDR and XDR giant SentinelOne in 2014 to cloud security phenom Wiz in 2021.
Next month in San Francisco, the Innovation Sandbox at RSAC Conference will celebrate its 21st year of choosing key emerging solutions in cybersecurity. Past winners and finalists range from EDR and XDR giant SentinelOne in 2014 to cloud security phenom Wiz in 2021.
GitGuardian Doubles Down on AI Agent Defense With $50M Raise
1 month 2 weeks ago
Series C Funding Round Focuses on Secrets Remediation, Agent Governance Expansion
Backed by a $50 million Series C, GitGuardian plans to accelerate U.S. expansion and enhance secrets detection remediation and non-human identity controls as AI agents multiply across enterprises, increasing exposure to credential abuse and lateral movement.
Backed by a $50 million Series C, GitGuardian plans to accelerate U.S. expansion and enhance secrets detection remediation and non-human identity controls as AI agents multiply across enterprises, increasing exposure to credential abuse and lateral movement.
Webinar | Modernizing GRC: Automating Evidence, Controls & Compliance with a Security Data Fabric
1 month 2 weeks ago
Webinar | Continuous Assurance: Delivering Real-Time Risk Visibility to the Board
1 month 2 weeks ago
Healthcare Cyber Resilience: Building a Trusted Data Foundation for Secure, AI-Ready Operations
1 month 2 weeks ago
Closing the Federal Cyber Resilience Gap
1 month 2 weeks ago
Checked
1 hour 57 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed