Aggregator
新型安卓恶意软件 GhostSpy 让攻击者完全控制受感染设备
稳定币巨头 Circle 提交纽交所 IPO 申请,估值 67 亿美元
Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition
Zscaler Inc. announced on May 27, 2025, a definitive agreement to acquire Red Canary, a leading Managed Detection and Response (MDR) company, in a strategic move to enhance its AI-powered security operations capabilities. The acquisition combines Zscaler’s Zero Trust Exchange platform with Red Canary’s threat detection expertise to create a unified, agile Security Operations Center […]
The post Zscaler Expands AI-Driven Security Operations with Red Canary Acquisition appeared first on Cyber Security News.
泰国关注与加密货币挂钩的信用卡,修订数字资产规则
Ukraine detains alleged Russian spies who used dash cams to guide missile strikes
PlainID announces Policy Management for Agentic AI
PlainID introduced Policy Management for Agentic AI. Securing the future with a solution that brings identity-aware, policy-based access control to the next generation of AI systems. As organizations adopt AI and LLM-based systems, they are ingesting and processing vast amounts of sensitive, and high-risk data. Organizations are exposed to: Data leaks and compliance violations (e.g., PII, IP, regulated content) Regulatory and reputational risks from misused or exposed data Inability to ensure auditability and accountability in AI-driven decisions Delays in … More →
The post PlainID announces Policy Management for Agentic AI appeared first on Help Net Security.
Microsoft introduces new Windows backup tool for businesses
Have Your Say: Dark Reading Seeks Your Input
App Store Security: Apple stops $2B in fraud in 2024 alone, $9B over 5 years
G.O.S.S.I.P 阅读推荐 2025-05-28 可迁移攻击全揭秘
Приватный репозиторий GitHub? Забудьте. Теперь он публичный, и не по вашей воле
Microsoft OneDrive Flaw Exposes Users to Data Overreach Risks
Where Capability Meets Opportunity: Introducing the Tenable Research Special Operations Team
Meet the elite squad that’s hunting the next major cyberattack. With more than 150 years of combined research experience and expert analysis, the Tenable Research Special Operations team arms organizations with the critical and actionable intelligence necessary to proactively defend the modern attack surface.
The digital battlefield is constantly shifting. It's no longer enough to just react. We need to anticipate. Massive data breaches leave consumers exposed to identity thieves, ransomware attacks cripple hospitals, and Nation State actors disrupt critical infrastructure. It's not just about vulnerable software anymore. In our hyper-connected world, from the smart devices in your home to the complex systems running our cities, everything is a potential target.
The explosion of cloud services and AI is accelerating this risk, creating countless new windows for cybercriminals and hostile nations to exploit. From software and hardware vulnerabilities, to misconfigurations, compromised identities, overexposed and highly privileged environments, and publicly accessible databases, the threat landscape is everywhere, all at once. As of October 2024, over 240,000 Common Vulnerabilities and Exposures (CVEs) have been tracked through the MITRE CVE program, including many that have significantly impacted consumers, businesses and governments. The volume has historically been too much for security teams to keep up with.
Beyond the sheer increase in the volume of traditional vulnerabilities, defenders are faced with an ever-expanding attack surface as enterprises have adopted remote work and new technologies like Generative AI that all contribute to increases in both the number and complexity of exposures that elevate the likelihood of business impacts.
But what if there was a team dedicated to seeing these threats coming, understanding the tactics being used by adversaries, and sending early warning signals for what might come next?
Introducing the Tenable Research Special Operations (RSO) Team – the next milestone in the evolution of the Research teams and capabilities that Tenable brings to bear, and designed to operate at the forefront of the fight.
The "special ops" of cybersecurity: What you need to knowSince 2018, Tenable’s Security Response Team (SRT) has monitored the cybersecurity landscape, aggregating and assessing insights from hundreds of sources daily to provide unique insights via Cyber Exposure Alerts and related advisory content. In that same year, we formalized our reverse engineering efforts, founding the Zero-Day Research team; that team’s research efforts have resulted in the discovery and disclosure of more than 500 zero-day vulnerabilities since its formation. In 2023, we launched the Decision Science Operations team to provide improved support for decision making through quantitative analysis techniques and the application of appropriate technologies augmenting human intelligence and analysis.
Today, the RSO team serves as Tenable’s Forward Logistics Element in the threat landscape, providing customers with the analyses and contextualized exposure intelligence required to manage risks to critical business assets. With over 150 years of collective expertise, this hand-picked group of world-class security researchers is united with one mission: to cut through the noise and deliver critical intelligence about the most dangerous cyber threats emerging right now. Uniting the missions of the Tenable Security Response, Zero-Day Research, and Decision Science Operations teams, RSO disseminates timely, accurate, and actionable information about the latest threats and exposures.
How? RSO is laser-focused on the "capability meets opportunity" equation- Capability: What are the attackers able to do? What tools, resources, and strategies do they have?
- Opportunity: What weaknesses exist in our systems that attackers can exploit?
By analyzing both sides of this equation, the RSO team can predict potential attacks and pinpoint exactly where the biggest points of exposure reside. This isn't just theoretical; it's about providing real-time, actionable insights that can literally save businesses – and potentially, lives – from devastating cyberattacks.
The RSO team's research goes beyond generic warnings. Not every risk is created equal. We understand that what’s critical for a power grid isn’t the same as what’s critical for a retail chain. Threat context is key to determining risk levels. Our insights are tailored, helping organizations across different industries and regions prioritize the threats that matter most to their specific operations.
Here's what this elite team is digging into – and why you should pay attention- Known and emergent exploits: Covering the vulnerabilities we already track and finding brand new ones before criminals can weaponize them.
- Nation-state and cybercriminal tactics: Uncovering the latest moves from sophisticated hacking groups and foreign governments.
- AI and emerging tech risks: Assessing the hidden dangers in the newest technologies, like advanced AI models (DeepSeek) and cutting-edge coding protocols (Model Context Protocol, Vibe Coding).
- "Old dog, new tricks" exploits: Discovering how hackers are re-purposing old vulnerabilities for devastating new attacks.
- The science of decision-making: Providing data-driven insights to help organizations make smarter security choices.
New and existing analysis and insights from Tenable RSO can be found on the Tenable Blog, the Tenable Research page and the Tenable Connect Community.
Recent research content from the Tenable RSO Team- CVE-2025-32756: Zero-Day Vulnerability in Multiple Fortinet Products Exploited in the Wild
- CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution
- Frequently Asked Questions about Vibe Coding
- MCP Prompt Injection: Not Just For Evil
- Frequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic Applications
- DeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and Ransomware
- Frequently Asked Questions About DeepSeek Large Language Model (LLM)
- Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
- Microsoft Patch Tuesday 2024 Year in Review
- Volt Typhoon: U.S. Critical Infrastructure Targeted by State-Sponsored Actors
RadiantOne platform enhancements prevent identity-based attacks
Radiant Logic announced its new Identity Observability features as part of the RadiantOne platform. As identity remains the dominant attack vector for cybercriminals, the latest enhancements to the RadiantOne platform deliver real-time visibility and context into the entire Identity and Access Management (IAM) ecosystem—empowering organizations to proactively detect, prioritize and remediate risks before they are exploited. Gartner in their 2025 Guidance for Comprehensive IAM Architecture Strategy recommends organizations should “Invest in a centralized identity and … More →
The post RadiantOne platform enhancements prevent identity-based attacks appeared first on Help Net Security.