CrowdStrike says attackers are moving through networks in under 30 minutes

The average time from intrusion to network movement in 2025 was 29 minutes, a 65% increase in speed from the year prior.

The post CrowdStrike says attackers are moving through networks in under 30 minutes appeared first on CyberScoop.

Continue reading CrowdStrike says attackers are moving through networks in under 30 minutes

AI is becoming part of everyday criminal workflows

Underground forums include long threads about chatbots drafting phishing emails, generating code snippets, and coaching social engineering calls. A new study examined conversations captured between January 1, 2025 and July 31, 2025 across dozens of cyb… Continue reading AI is becoming part of everyday criminal workflows

Why SOCs are moving toward autonomous security operations in 2026

The modern security operations center faces a crisis of scale that human effort cannot fix. With alert volumes exponentially growing and threat actors automating their attacks, organizations must pivot to autonomous SOC strategies. This shift to AI-dri… Continue reading Why SOCs are moving toward autonomous security operations in 2026

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models.
The distillation at… Continue reading Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Posted in Uncategorized

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models.
The distillation at… Continue reading Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Posted in Uncategorized

Security and complexity slow the next phase of enterprise AI agent adoption

Enterprise AI agents are embedded in routine business processes, particularly inside engineering and IT operations. Many organizations report active production deployments, and agent development ranks high on strategic agendas. A new study from Docker,… Continue reading Security and complexity slow the next phase of enterprise AI agent adoption

Binding Operational Directive 26-02 sets deadlines for edge device replacement

In this Help Net Security video, Jen Sovada, General Manager, Public Sector at Claroty, explains CISA’s Binding Operational Directive 26-02 and what it means for federal agencies. The directive requires agencies to inventory, report, decommission, and … Continue reading Binding Operational Directive 26-02 sets deadlines for edge device replacement