UK government's Vulnerability Monitoring System is working - fixes flow far faster

The UK government's Vulnerability Monitoring System has significantly accelerated the patching of DNS vulnerabilities in the public sector. This automated scanning system, implemented as part of a program launched last year, has reduced fix times by 84 percent. The article also briefly mentions Firefox enhancing XSS protection, leadership changes at CISA, and FTC exemptions for certain data collection.

Samsung TVs to stop collecting Texans’ data without express consent

Samsung has agreed to a settlement with the State of Texas following allegations of unlawfully collecting content-viewing data from smart TVs without explicit consent. This agreement requires Samsung to obtain express consent before collecting such data and to provide clear privacy notices to Texans.

Denizens of DEF CON are 'fed up with government'

Jake Braun, speaking at DEF CON, expressed frustration with government inaction and called for hackers to develop a "Digital arsenal of democracy." This initiative aims to empower citizens and defend against digital threats.

Friday Squid Blogging: Squid Fishing in Peru

Peru has increased its squid catch limit for artisanal fishing, with the author clarifying that the "giant squid" mentioned likely refers to a smaller species. The post also serves as an open forum for readers to discuss other security news not covered by the author and links to a new blog moderation policy.

Cities Hosting Major Events Need More Focus on Wireless, Drone Defense

Experts are advising that major events, such as the FIFA World Cup, should enhance their security measures to include active and passive wireless threats in addition to traditional physical and cyber defenses. This involves addressing vulnerabilities related to wireless communication and drone activity to protect against potential disruptions and security breaches.

Microsoft testing Windows 11 batch file security improvements

Microsoft is testing security improvements in Windows 11 Insider Preview builds that aim to improve the security and performance when executing batch files (CMD scripts). The improvements focus on mitigating potential security risks associated with script execution.

Europol-led crackdown on The Com hackers leads to 30 arrests

A Europol-coordinated operation, "Project Compass", targeting the online cybercrime collective known as "The Com" has resulted in 30 arrests and implicated 179 suspects. The Com specifically targets children and teenagers with cybercrime activities.

Third-Party Patching and the Business Footprint We All Share

This article discusses the often-overlooked attack surface created by third-party software and the increased risk of exploitation due to unpatched vulnerabilities. Action1 advocates for consistent patching strategies to mitigate exposure across all endpoints, highlighting the importance of managing third-party software vulnerabilities.

Chilean Carding Shop Operator Extradited to US

A 24-year-old Chilean man, suspected of operating a carding shop, has been extradited to the United States. He is accused of trafficking over 26,000 credit cards from a single brand.

US authorities punish sellers of malware and spyware

US authorities sentenced Peter Williams to 87 months in prison for selling sensitive cyber-exploit components to a Russian company. Simultaneously, the Department of the Treasury sanctioned Sergey Sergeyevich Zelenyuk and Matrix LLC (Operation Zero) for acquiring and distributing cyber tools harmful to US national security, including exploits for US products.

Why application security must start at the load balancer

The article argues that application security should start at the load balancer, which is often treated as a performance device rather than a security control. The author provides an example from the financial services industry where weak TLS configurations at the load balancer allowed attackers to exploit vulnerabilities. They recommend enforcing strong TLS versions and cipher suites at the load balancer to establish a secure trust boundary.

How to make LLMs a defensive advantage without creating a new attack surface

The article discusses how large language models (LLMs) are impacting security teams, both as productivity tools and potential attack vectors. It suggests approaching LLMs as high-impact systems, defining outcomes, modeling threats, and building controls, and recommends starting with narrow, verifiable workflows before expanding their use.

The CSO guide to top security conferences

This article is a guide to upcoming security conferences in 2026, offering a list of events that cover various aspects of cybersecurity. It aims to help cybersecurity professionals stay informed about industry trends and threats by attending these conferences for networking and knowledge gathering.

Victory! Tenth Circuit Finds Fourth Amendment Doesn’t Support Broad Search of Protesters’ Devices and Digital Data

The U.S. Court of Appeals for the Tenth Circuit overturned a lower court’s dismissal of a challenge to sweeping warrants that allowed police to search a protester’s devices and digital data, as well as a nonprofit’s social media data. The court found the warrants to be overbroad and lacking in particularity, violating the Fourth Amendment.

EPIC, OTI Urge FTC Not to Ignore Full Scope of Data-Driven Harms

EPIC and the Open Technology Institute (OTI) have urged the Federal Trade Commission (FTC) to consider a broader range of harms stemming from unlawful data practices. The organizations emphasize the need for the FTC to expand its understanding of privacy injuries, encompassing both quantitative and qualitative aspects, to effectively protect consumers.

Apple iPhone and iPad Cleared for Classified NATO Use

Apple's iPhones and iPads have been cleared for classified use by NATO. These devices have been added to the NATO Information Assurance Product Catalogue (NIAPC), indicating they meet the security requirements for handling classified information within the alliance.

Four Risks Boards Cannot Treat as Background Noise

This SecurityWeek article discusses four cybersecurity risks that boards of directors should prioritize and not ignore. The emphasis is on business continuity and resilience in the face of inevitable successful attacks, rather than focusing solely on prevention.

Ransomware payment rate drops to record low as attacks surge

The ransomware payment rate has dropped to a record low of 28% in the past year, even as the number of claimed ransomware attacks has risen significantly. This indicates that organizations are becoming more resilient to ransomware demands, potentially due to improved backup strategies, incident response plans, and a greater willingness to restore from backups rather than pay the ransom.

Microsoft expands Windows restore to more enterprise devices

Microsoft is expanding the ability for enterprise users to restore their personal settings and Microsoft Store apps from a previous Windows 11 device. This feature aims to streamline the transition process when upgrading or replacing devices, ensuring a consistent user experience.

Gambit Security Emerges From Stealth With $61 Million in Funding

Gambit Security, a cybersecurity startup, has emerged from stealth mode with $61 million in seed and Series A funding. The company plans to use the investment to accelerate product development and expand its sales and customer success teams.

Trend Micro Patches Critical Apex One Vulnerabilities

Trend Micro has addressed eight critical and high-severity vulnerabilities affecting its Apex One endpoint security products on Windows and macOS. The vulnerabilities could potentially allow attackers to compromise systems.

9 Essential Open Source Security Tools [DE]

The article discusses the benefits of using open-source security tools for cybersecurity. It highlights that open-source solutions are often supported by active communities and offer numerous high-quality options for preventing breaches and data leaks. It suggests nine open-source security tools that CISOs and their teams should consider using, for purposes such as vulnerability scanning, protocol analysis, forensics, and threat intelligence support.

How to Justify Your Security Investments [DE]

The article discusses how CISOs can justify security investments to boards of directors. It emphasizes the importance of framing security spending in terms of revenue generation, risk mitigation, and shareholder value, rather than simply as technical upgrades. The article also advises CISOs to link technology investments to strategic priorities, such as entering new markets, improving margins, increasing resilience, and ensuring compliance.

Sophos Workspace Protection is Now Available

Sophos has announced the release of Sophos Workspace Protection, a new product offering. The article highlights the availability of this new protection solution for workspaces.

RAMP Forum Seizure Fractures Ransomware Ecosystem

The seizure of the RAMP forum has disrupted the ransomware ecosystem, causing groups to fracture and potentially reform. Researchers advise defenders to monitor these shifts and use the intelligence to inform their security strategies.

How to Pick Your Password Manager

The article discusses the importance of using password managers to defend against phishing and data breaches by generating and automatically filling unique passwords for each site. It highlights the protections offered by password managers, including preventing password reuse and mitigating the impact of data breaches, while also discussing the evolution of built-in password managers in browsers and operating systems.

How to Pick Your Password Manager

The article discusses the importance of using password managers to protect against phishing and data breaches. It acknowledges potential flaws in some password manager implementations but emphasizes that using a password manager remains a critical security investment. It also touches on built-in password managers like iCloud Keychain and Google Password Manager.

Discord pushes back age verification after security risks revealed

Discord is delaying the rollout of its age verification feature due to security vulnerabilities discovered by researchers. Privacy International found that the feature, which requires users to submit photos of their IDs, exposed users to potential risks, including data breaches and identity theft.

The OpenClaw Hype: Analysis of Chatter from Open-Source Deep and Dark Web

Flare's analysis of OpenClaw discussions on Telegram and the dark web reveals significant interest and research hype, but limited evidence of widespread criminal exploitation. The analysis highlights a potential supply-chain risk within the skills marketplace, indicating a need for vigilance despite the lack of current large-scale malicious activity.

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

ICS/OT experts have created a new scoring system, akin to the Richter scale, for gauging the magnitude and impact of cyber incidents within operational technology (OT) environments. This system aims to provide a standardized method for assessing the severity and consequences of such events.

Astelia Raises $35 Million for Exposure Management

Astelia, a company focused on exposure management, has raised $35 million in funding. The company intends to use the funds to expand its AI-based analysis capabilities, increase its workforce, and scale deployments.

Operation Red Card 2.0 Leads to 651 Arrests in Africa

Operation Red Card 2.0 resulted in the arrest of 651 individuals involved in cybercrime across Africa. The operation, a collaboration between African law enforcement, Interpol, and cybersecurity companies, recovered over USD 4.3 million.

Windows 11 KB5077241 update improves BitLocker, adds Sysmon tool

Microsoft's KB5077241 optional cumulative update for Windows 11 includes 29 changes, featuring enhancements to BitLocker and the addition of native System Monitor (Sysmon) functionality. The update also introduces a new network speed test tool.

Boards don’t need cyber metrics — they need risk signals

The article discusses the disconnect between the cybersecurity metrics that security teams track and the risk signals that boards of directors need to effectively govern risk. It argues that boards are less interested in technical metrics like "mean time to detect" and more interested in metrics that directly map to financial consequences, regulatory exposure, and operational disruption. Experts suggest focusing on metrics like detection and containment speed, which function as proxies for business loss avoided.

Sophos Workspace Protection is Now Available

Sophos has launched Sophos Workspace Protection, a new offering designed to provide comprehensive security for modern work environments. This solution integrates endpoint protection, threat detection, and response capabilities to safeguard against evolving cyber threats.

EPIC Joins Groups Urging FTC to Crack Down on Hidden Surveillance Pricing

EPIC and other consumer protection groups are urging the FTC to create a rule requiring companies to disclose when they use "surveillance pricing." This practice involves companies collecting and analyzing consumer data to personalize pricing, often without the consumer's knowledge or consent.

Cyber defense: From reactive to proactive

The article discusses the importance of shifting from a reactive to a proactive approach to cybersecurity, highlighting the increasing speed and sophistication of AI-driven attacks. It emphasizes the need for efficient automation, an integrated platform, and a focus on layered security controls, zero trust, multi-cloud infrastructure, and security by design.

Microsoft adds Copilot data controls to all storage locations

Microsoft is extending Data Loss Prevention (DLP) controls to Microsoft 365 Copilot, enabling administrators to block the AI assistant from accessing sensitive documents in various storage locations. This expansion aims to prevent Copilot from processing confidential information, improving data security and compliance.

Identity-First AI Security: Why CISOs Must Add Intent to the Equation

The article discusses the importance of securing AI agents by treating them as identities with specific intents. CISOs need to implement intent-based controls to ensure AI agents only have access when their purpose and context align, preventing over-scoped privileges.