Defenders fall behind, as AI rewrites the rules of a data breach

For almost 20 years, stolen credentials have been the most common route for attackers into organizations, according to the Verizon Data Breach Investigations Report (DBIR). But that’s no longer the case.

Read more in my article on the Fortra blog. Continue reading Defenders fall behind, as AI rewrites the rules of a data breach

CISA chief frets about open-source vulnerabilities, delayed security improvements

Acting director Nick Andersen’s comments came as a wave of malware attacks hit tech that’s publicly available for collaboration.

The post CISA chief frets about open-source vulnerabilities, delayed security improvements appeared first on CyberScoop.

Continue reading CISA chief frets about open-source vulnerabilities, delayed security improvements

Microsoft open-sources tools for designing and testing AI agents

Microsoft has open-sourced two tools aimed at bringing security discipline to AI agent development: Clarity, a structured design review tool, and RAMPART, a continuous testing framework. The release comes from Microsoft’s AI Red Team, the company… Continue reading Microsoft open-sources tools for designing and testing AI agents

European authorities take down prolific cybercrime VPN service

Officials arrested the alleged administrator of First VPN, seized its servers and domains. Europol said the service appeared in almost every major recent cybercrime investigation.

The post European authorities take down prolific cybercrime VPN service appeared first on CyberScoop.

Continue reading European authorities take down prolific cybercrime VPN service