New AI “agents” could hold people for ransom in 2025
“Agentic” AI could arrive in 2025, and it may allow hackers to send individual, AI-powered agents to do their dirty work.
Read more“Agentic” AI could arrive in 2025, and it may allow hackers to send individual, AI-powered agents to do their dirty work.
Read moreCredit to Author: Mark Keierleber| Date: Tue, 04 Feb 2025 09:00:00 +0000
An investigation into more than 300 cyberattacks against US K–12 schools over the past five years shows how schools can withhold crucial details from students and parents whose data was stolen.
Read moreCredit to Author: Peter Girnus| Date: Tue, 04 Feb 2025 00:00:00 +0000
The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks.
Read moreCredit to Author: Chris LaFleur| Date: Fri, 31 Jan 2025 00:00:00 +0000
XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.
Read moreCredit to Author: Benjamin Lim| Date: Mon, 03 Feb 2025 17:00:00 +0000
Security events offer a valuable opportunity to learn about the latest trends and solutions, evolve your skills for cyberthreats, and meet like-minded security professionals. See where you can meet Microsoft Security in 2025.
The post Hear from Microsoft Security experts at these top cybersecurity events in 2025 appeared first on Microsoft Security Blog.
Read moreCredit to Author: Editor| Date: Mon, 03 Feb 2025 15:07:16 +0000
Transforming the future, together
Read moreWhatsApp has accused professional spyware company Paragon of spying on a select group of users.
Read moreCredit to Author: Chris LaFleur| Date: Mon, 03 Feb 2025 00:00:00 +0000
Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.
Read moreCredit to Author: Dhruv Mehrotra| Date: Sat, 01 Feb 2025 11:30:00 +0000
Plus: WhatsApp discloses nearly 100 targets of spyware, hackers used the AT&T breach to hunt for details on US politicians, and more.
Read more