DataBreachToday.com
Cancer Center: Hackers Stole Research Files, Encrypted Data
2 months 1 week ago
University of Hawaii Cancer Center Paid Ransom
Cancer patients who participated in University of Hawaii Cancer Center studies during the 1990s may soon receive a notification that ransomware hackers stole their data in an August 2025 incident. Experts said the hack spotlights concerning risks involving compromises of medical research data.
Cancer patients who participated in University of Hawaii Cancer Center studies during the 1990s may soon receive a notification that ransomware hackers stole their data in an August 2025 incident. Experts said the hack spotlights concerning risks involving compromises of medical research data.
WitnessAI Secures $58M to Grow Global AI Security Reach
2 months 1 week ago
Startup Targets MSSPs and MDR Vendors, Shadow AI Detection and Global Growth
WitnessAI has raised $58 million to scale its AI network and agent protection platform worldwide. The funding will help the firm build MSSP-ready offerings, detect unauthorized AI agents and enforce security policies across employee and customer LLM use cases.
WitnessAI has raised $58 million to scale its AI network and agent protection platform worldwide. The funding will help the firm build MSSP-ready offerings, detect unauthorized AI agents and enforce security policies across employee and customer LLM use cases.
Lawmakers Urged to Let US Take on 'Offensive' Cyber Role
2 months 1 week ago
Analysts Warn Foreign Adversaries Gaining Footholds in US Networks
Cyber policy analysts told lawmakers that the United States' cyber deterrence efforts are failing, allowing China and others to embed in critical infrastructure networks with minimal cost, while calling for faster, coordinated offensive actions across federal agencies.
Cyber policy analysts told lawmakers that the United States' cyber deterrence efforts are failing, allowing China and others to embed in critical infrastructure networks with minimal cost, while calling for faster, coordinated offensive actions across federal agencies.
Building a Solid IT Strategy in an Unstable World
2 months 1 week ago
Experts on How CIOs Can Avoid 'Geopolitical Lock-In' in AI, Cloud and Supply Chains
Geopolitical instability is a part of reality in 2026, and the stakes are high for CIOs who must rely on global supply chains to develop IT, artificial intelligence, cloud and cybersecurity strategies.
Geopolitical instability is a part of reality in 2026, and the stakes are high for CIOs who must rely on global supply chains to develop IT, artificial intelligence, cloud and cybersecurity strategies.
Dark Patterns, Children's Data and Corporate Fiduciary Risk
2 months 1 week ago
How UX Decisions Are Becoming Regulatory Liabilities for CISOs
Children's data is entering a new regulatory era where dark patterns, defaults and monetization choices can signal breached fiduciary duty. As privacy, safety and consumer laws converge globally, CISOs must treat manipulative UX, consent flows and retention practices as core security and governance risks.
Children's data is entering a new regulatory era where dark patterns, defaults and monetization choices can signal breached fiduciary duty. As privacy, safety and consumer laws converge globally, CISOs must treat manipulative UX, consent flows and retention practices as core security and governance risks.
AI Supply Chain Risk: Will CIOs Be Held Accountable?
2 months 1 week ago
Growing Third-Party Breach Trend Is Spreading to AI Suppliers
IT organizations have built processes for reducing vendor risk, but in the AI era, that operating model is being dismantled. Modern AI environments are built on dynamic external foundational models, countless APIs, open-source components and continuous data pipelines that pose risks.
IT organizations have built processes for reducing vendor risk, but in the AI era, that operating model is being dismantled. Modern AI environments are built on dynamic external foundational models, countless APIs, open-source components and continuous data pipelines that pose risks.
One Simple Trick to Knock Out the Wi-Fi Network
2 months 1 week ago
Black Duck Researchers Discover Flaw in Widely Used Broadcom Chipset
A flaw in Broadcom chipsets commonly used in wireless routers allows attackers to repeatedly knock offline the 5 gigahertz band, no matter how strong the security settings, say researchers.
A flaw in Broadcom chipsets commonly used in wireless routers allows attackers to repeatedly knock offline the 5 gigahertz band, no matter how strong the security settings, say researchers.
Magecart Hits Continue: Stripe Spoofing, Supply Chain Risks
2 months 1 week ago
Digital Skimming Attacks Spoof Stripe Payment Forms to Steal Payment Card Data
Magecart-style digital skimming attacks targeting payment card data continue, with researchers detailing an active campaign targeting the popular WooCommerce platform and Stripe. Separately, widely used ConnectPOS exposing its code repository for years, posing a supply-chain risk for customers.
Magecart-style digital skimming attacks targeting payment card data continue, with researchers detailing an active campaign targeting the popular WooCommerce platform and Stripe. Separately, widely used ConnectPOS exposing its code repository for years, posing a supply-chain risk for customers.
Overcoming Machine Identity Overload
2 months 1 week ago
CyberArk and Accenture Experts Discuss Modernization, Identity Sprawl, Securing AI
Enterprises are embracing modernization by adopting artificial intelligence tools, automation and DevOps-driven development in the cloud, but these new platforms have introduced an attack surface saturated with human and machine identities, said CyberArk's Barak Feldman and Accenture's Rex Thexton.
Enterprises are embracing modernization by adopting artificial intelligence tools, automation and DevOps-driven development in the cloud, but these new platforms have introduced an attack surface saturated with human and machine identities, said CyberArk's Barak Feldman and Accenture's Rex Thexton.
1Password Focuses on Identity Security in Agentic AI Era
2 months 1 week ago
Former AWS Exec Nancy Wang to Lead 1Password's Agentic AI Security Strategy
1Password named former AWS executive Nancy Wang as chief technology officer to oversee the evolution of its platforms to manage new artificial intelligence-driven workflows. "Agents are really their own class of identities," Wang said.
1Password named former AWS executive Nancy Wang as chief technology officer to oversee the evolution of its platforms to manage new artificial intelligence-driven workflows. "Agents are really their own class of identities," Wang said.
NIST Calls for Public to Help Better Secure AI Agents
2 months 1 week ago
NIST Seeks Input to Protect AI Systems Used in Government, Critical Infrastructure
The National Institute of Standards and Technology is seeking public input from security experts and stakeholders to weigh in on security threats from agentic AI warning they may be vulnerable to exploits like hijacking, backdoors and misaligned behavior across federal networks.
The National Institute of Standards and Technology is seeking public input from security experts and stakeholders to weigh in on security threats from agentic AI warning they may be vulnerable to exploits like hijacking, backdoors and misaligned behavior across federal networks.
SAP Defense in Focus as Zerlang Takes Over at SecurityBridge
2 months 1 week ago
New CEO Jesper Zerlang Plans Global Growth, US Push and Vertical Expansion
Former Logpoint chief Jesper Zerlang, now CEO at SecurityBridge, says SAP security remains a weak link in enterprise risk strategies. As CEO of SecurityBridge, he’s launching a global expansion and leaning into the company's product differentiators to fill the gap.
Former Logpoint chief Jesper Zerlang, now CEO at SecurityBridge, says SAP security remains a weak link in enterprise risk strategies. As CEO of SecurityBridge, he’s launching a global expansion and leaning into the company's product differentiators to fill the gap.
Inside the Growing Problem of Identity Sprawl
2 months 1 week ago
Why Identity Life Cycles, Visibility and Privilege Are Falling Out of Sync
Modern enterprises are struggling to maintain control over identity management. While authentication still works, a systemic drift in how identities are created and discarded is creating an expanded attack surface that adversaries are increasingly exploiting.
Modern enterprises are struggling to maintain control over identity management. While authentication still works, a systemic drift in how identities are created and discarded is creating an expanded attack surface that adversaries are increasingly exploiting.
Webinar | Improving Visibility and Response With a Unified Platform
2 months 1 week ago
Instagram Confirms Password-Reset Spam Flood, Denies Breach
2 months 1 week ago
Security Experts See Coincidental Timing After Leak of Scraped Instagram User Data
Instagram said a massive wave of password reset emails sent to its users traced to malicious abuse of a legitimate feature, but didn't result from any breach of its systems. Separately, security experts said a threat actor leaked 6.2 million users' email addresses, among other account information.
Instagram said a massive wave of password reset emails sent to its users traced to malicious abuse of a legitimate feature, but didn't result from any breach of its systems. Separately, security experts said a threat actor leaked 6.2 million users' email addresses, among other account information.
UK Probes X Over AI Deepfake Porn
2 months 1 week ago
Elon Musk's Social Media Network Faces Mounting Backlash from Governments
The British communications regulator is formally investigating social media network X over the willingness of its Grok AI to let users virtually undress people, including minors. Ofcom said Monday that will probe whether X is complying with the Online Safety Act.
The British communications regulator is formally investigating social media network X over the willingness of its Grok AI to let users virtually undress people, including minors. Ofcom said Monday that will probe whether X is complying with the Online Safety Act.
Threat Actors Launch Mass Reconnaissance of AI Systems
2 months 1 week ago
More Than 91,000 Attacks Target Exposed LLM Endpoints in Coordinated Campaigns
Two coordinated campaigns generated more than 91,000 attack sessions against AI infrastructure between October and January, with threat actors probing more than 70 model endpoints from OpenAI, Anthropic and Google to build target lists for future exploitation.
Two coordinated campaigns generated more than 91,000 attack sessions against AI infrastructure between October and January, with threat actors probing more than 70 model endpoints from OpenAI, Anthropic and Google to build target lists for future exploitation.
Key Areas of Convergence for IT-OT Security in Energy Sector
2 months 1 week ago
Hitachi Energy Security Head Joe Doetzl on Common Tools and Practices
While IT and OT environments were traditionally seen as two separate parts of the organization, security teams can use common tools and practices to protect both areas, said Joe Doetzl, head of cybersecurity at Hitachi Energy. The company designated a single leader for IT-OT environments years ago.
While IT and OT environments were traditionally seen as two separate parts of the organization, security teams can use common tools and practices to protect both areas, said Joe Doetzl, head of cybersecurity at Hitachi Energy. The company designated a single leader for IT-OT environments years ago.
CrowdStrike Adds Real-Time Identity Control With SGNL Deal
2 months 1 week ago
$740M SGNL Acquisition Boosts Dynamic Identity Enforcement for Humans and AI Agents
With the $740M acquisition of SGNL, CrowdStrike aims to deliver dynamic access control for human and nonhuman identities. The real-time enforcement layer expands CrowdStrike's identity capabilities amid a market shift toward zero standing privilege and agentic workforce security.
With the $740M acquisition of SGNL, CrowdStrike aims to deliver dynamic access control for human and nonhuman identities. The real-time enforcement layer expands CrowdStrike's identity capabilities amid a market shift toward zero standing privilege and agentic workforce security.
Checked
2 hours 55 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed