CYBERNEWSMEDIA Network:||

Security Architecture

80 материалов

  • Mobile Attack Surface Expands as Enterprises Lose Control

    Mobile & Wireless · Threat Intelligence

    Shadow AI embedded in everyday apps, combined with outdated mobile devices and zero-click exploits, is creating a new and largely unseen mobile risk. The post Mobile Attack Surface Expands as Enterprises Lose Control appeared first on SecurityWeek.

  • Apple Rolls Out DarkSword Exploit Protection to More Devices

    Mobile & Wireless · Vulnerabilities

    The DarkSword exploit kit has been used by both state-sponsored hackers and commercial spyware vendors. The post Apple Rolls Out DarkSword Exploit Protection to More Devices appeared first on SecurityWeek.

  • Linx Security Raises $50 Million for Identity Security and Governance

    Cybersecurity Funding · Identity & Access

    The company will accelerate product development, scale go-to-market efforts, and expand its global footprint. The post Linx Security Raises $50 Million for Identity Security and Governance appeared first on SecurityWeek.

  • FBI Warns of Data Security Risks From China-Made Mobile Apps

    Mobile & Wireless

    The agency has not named the problematic foreign-made applications, but TikTok and Temu come to mind. The post FBI Warns of Data Security Risks From China-Made Mobile Apps appeared first on SecurityWeek.

  • Webinar Today: Agentic AI vs. Identity’s Last Mile Problem

    Identity & Access · Artificial Intelligence

    Join the webcast as we explore what Agentic AI can and cannot solve today, and real world breach scenarios linked to disconnected applications. The post Webinar Today: Agentic AI vs. Identity’s Last Mile Problem appeared first on SecurityWeek.

  • Axios NPM Package Breached in North Korean Supply Chain Attack

    Supply Chain Security · Application Security

    A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions. The post Axios NPM Package Breached in North Korean Supply Chain Attack appeared first on SecurityWeek.

  • Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

    Artificial Intelligence · Cloud Security

    Palo Alto Networks has disclosed the details of its analysis of Google Cloud Platform’s Vertex AI. The post Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents appeared first on SecurityWeek.

  • Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

    Identity & Access · Cybercrime

    Report shows how industrialized credential theft underpins ransomware, SaaS breaches, and geopolitical attacks, shifting security focus from prevention to detecting misuse of legitimate access. The post Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks appeared first on SecurityWeek.

  • TeamPCP Moves From OSS to AWS Environments

    Cloud Security · Application Security

    After validating stolen credentials using TruffleHog, the hacking group started AWS services enumeration and lateral movement activities. The post TeamPCP Moves From OSS to AWS Environments appeared first on SecurityWeek.

  • Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

    Identity & Access · Artificial Intelligence

    LLMs can write complex Rego and Cedar code in seconds, but a single missing condition or hallucinated attribute can quietly dismantle your organization’s least-privilege security model. The post Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control appeared first on SecurityWeek.

  • Huskeys Emerges From Stealth With $8 Million in Funding

    Cybersecurity Funding · Application Security

    The startup has built an edge security management (ESM) platform, an AI engine atop the entire edge security stack. The post Huskeys Emerges From Stealth With $8 Million in Funding appeared first on SecurityWeek.

  • Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit

    Nation-State · Mobile & Wireless

    The state-sponsored group’s campaign has targeted government, higher education, financial, and legal entities, as well as think tanks. The post Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit appeared first on SecurityWeek.

  • Coruna iOS Exploit Kit Likely an Update to Operation Triangulation

    Mobile & Wireless

    Coruna contains the updated version of a kernel exploit used in Operation Triangulation three years ago. The post Coruna iOS Exploit Kit Likely an Update to Operation Triangulation appeared first on SecurityWeek.

  • Dell and HP Roll Out Quantum-Resistant Device Security

    Endpoint Security

    The computer giants have announced new security capabilities for PCs and printers. The post Dell and HP Roll Out Quantum-Resistant Device Security appeared first on SecurityWeek.

  • AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link

    Identity & Access · Artificial Intelligence

    PwC finds AI is amplifying speed and scale of attacks, as identity theft evolves into a cybercriminal supply chain. The post AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link appeared first on SecurityWeek.

  • iOS, macOS 26.4 Roll Out With Fresh Security Patches

    Endpoint Security · Vulnerabilities

    Apple released security fixes for older devices as well, in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5. The post iOS, macOS 26.4 Roll Out With Fresh Security Patches appeared first on SecurityWeek.

  • FCC Bans New Routers Made Outside the US Over National Security Risks

    Network Security · Risk Management

    The ban aligns with a White House determination that all routers produced abroad are a threat to national security. The post FCC Bans New Routers Made Outside the US Over National Security Risks appeared first on SecurityWeek.

  • From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

    Application Security · Malware & Threats

    The hackers compromised GitHub Action tags, then shifted to NPM, Docker Hub, VS Code, and PyPI, and teamed with Lapsus$. The post From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI appeared first on SecurityWeek.

  • Cape Raises $100 Million for Protection Against Cellular Security Threats

    Cybersecurity Funding · Mobile & Wireless

    Cape offers a privacy-focused mobile virtual network operator (MVNO) service for consumers, enterprises, and governments. The post Cape Raises $100 Million for Protection Against Cellular Security Threats appeared first on SecurityWeek.

  • Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation

    IoT Security · Cybercrime

    The lesser-known JackSkid and Mossad botnets have also been targeted in the operation. The post Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation appeared first on SecurityWeek.

  • 1stProtect Emerges From Stealth With $20 Million in Funding

    Cybersecurity Funding · Endpoint Security

    The company’s endpoint security platform monitors behavior and verifies user intent to stop cyberattacks in real time. The post 1stProtect Emerges From Stealth With $20 Million in Funding appeared first on SecurityWeek.

  • Raven Emerges From Stealth With $20 Million in Funding

    Cybersecurity Funding · Application Security

    Raven’s platform observes applications at runtime to detect anomalous behavior and prevent cyberattacks. The post Raven Emerges From Stealth With $20 Million in Funding appeared first on SecurityWeek.

  • Cloud Security Startup Native Exits Stealth With $42 Million in Funding

    Cybersecurity Funding · Cloud Security

    Phil Venables, former CISO of Google Cloud and now a venture partner at Ballistic Ventures, has joined Native’s board of directors. The post Cloud Security Startup Native Exits Stealth With $42 Million in Funding appeared first on SecurityWeek.

  • ‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors

    Mobile & Wireless · Vulnerabilities

    Targeting six iOS vulnerabilities and leading to full device compromise, the exploit chain is meant for surveillance. The post ‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors appeared first on SecurityWeek.

  • Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches

    Identity & Access · Artificial Intelligence

    From Chaos to Control examines the chaos that often comes from shadow AI hidden in SaaS apps and urges better visibility and control over agentic AI. The post Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches appeared first on SecurityWeek.

  • Apple Debuts Background Security Improvements With Fresh WebKit Patches

    Endpoint Security · Mobile & Wireless

    The lightweight updates are meant to deliver security protections between security updates. The post Apple Debuts Background Security Improvements With Fresh WebKit Patches appeared first on SecurityWeek.

  • AI, APIs and DDoS Collide in New Era of Coordinated Cyberattacks

    Network Security · Threat Intelligence

    Akamai warns that Layer 7 DDoS, API abuse and AI-powered attacks are merging into coordinated, multi-vector campaigns that are harder to detect and defend against. The post AI, APIs and DDoS Collide in New Era of Coordinated Cyberattacks appeared first on SecurityWeek.

  • Apple Updates Legacy iOS Versions to Patch Coruna Exploits

    Mobile & Wireless

    The company has released iOS and iPadOS versions 16.7.15 and 15.8.7 to patch the vulnerabilities. The post Apple Updates Legacy iOS Versions to Patch Coruna Exploits appeared first on SecurityWeek.

  • Wiz Joins Google Cloud as Landmark Acquisition Closes

    M&A Tracker · Cloud Security

    Google has completed its $32 billion acquisition of the cloud security giant, which will maintain its brand. The post Wiz Joins Google Cloud as Landmark Acquisition Closes appeared first on SecurityWeek.

  • ‘BlackSanta’ Malware Activates EDR and AV Killer Before Detonating Payload

    Endpoint Security · Malware & Threats

    The malware disables antivirus and EDR protections at the kernel level, clearing the path for credential harvesting, system reconnaissance, and eventual data exfiltration. The post ‘BlackSanta’ Malware Activates EDR and AV Killer Before Detonating Payload appeared first on SecurityWeek.

  • SIM Swaps Expose a Critical Flaw in Identity Security

    Mobile & Wireless · Identity & Access

    SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. The post SIM Swaps Expose a Critical Flaw in Identity Security appeared first on SecurityWeek.

  • Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks

    Mobile & Wireless

    Google and iVerify analysis reveals a powerful exploit kit originally used by Russian state actors that is now appearing in broader criminal campaigns. The post Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks appeared first on SecurityWeek.

  • Google Plans Two-Week Release Schedule for Chrome

    Endpoint Security

    Starting September 2026, new Chrome iterations will be released twice as fast, part of a two-week cycle. The post Google Plans Two-Week Release Schedule for Chrome appeared first on SecurityWeek.

  • Global Coalition Publishes 6G Security and Resilience Principles

    Mobile & Wireless · Security Architecture

    The principles cover security, resilience against attacks and disasters, AI, and openness and interoperability. The post Global Coalition Publishes 6G Security and Resilience Principles appeared first on SecurityWeek.

  • Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters

    Cloud Security · Cyberwarfare

    Two AWS data centers in the United Arab Emirates were “directly struck” and another facility in Bahrain was also damaged after a drone landed nearby. The post Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters appeared first on SecurityWeek.

  • New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security

    Network Security · Mobile & Wireless

    Researchers have uncovered a Wi-Fi vulnerability that allows nearby attackers to intercept sensitive data and execute machine-in-the-middle attacks against connected devices. The post New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security appeared first on SecurityWeek.

  • Android Update Patches Exploited Qualcomm Zero-Day

    Mobile & Wireless · Vulnerabilities

    An integer overflow or wraparound in the Qualcomm graphics component, the bug leads to memory corruption. The post Android Update Patches Exploited Qualcomm Zero-Day appeared first on SecurityWeek.

  • Researchers Uncover Method to Track Cars via Tire Sensors

    IoT Security · Mobile & Wireless

    Using low-cost receivers deployed along roads, academic researchers tracked drivers and their movement patterns. The post Researchers Uncover Method to Track Cars via Tire Sensors appeared first on SecurityWeek.

  • AWS Expands Security Hub Into a Cross-Domain Security Platform

    Cloud Security

    The AWS Security Hub Extended plan aims to reduce security tool sprawl by correlating findings across multiple security domains. The post AWS Expands Security Hub Into a Cross-Domain Security Platform appeared first on SecurityWeek.

  • Apple iPhone and iPad Cleared for Classified NATO Use

    Mobile & Wireless

    The devices have been added to the NATO Information Assurance Product Catalogue (NIAPC). The post Apple iPhone and iPad Cleared for Classified NATO Use appeared first on SecurityWeek.

  • Trend Micro Patches Critical Apex One Vulnerabilities

    Endpoint Security · Vulnerabilities

    TrendAI has fixed eight critical and high-severity issues in Windows and macOS endpoint security products. The post Trend Micro Patches Critical Apex One Vulnerabilities appeared first on SecurityWeek.

  • Claude’s New AI Vulnerability Scanner Sends Cybersecurity Shares Plunging

    Endpoint Security · Artificial Intelligence

    The stocks of major cybersecurity companies have fallen sharply over fears that AI is disrupting the industry. The post Claude’s New AI Vulnerability Scanner Sends Cybersecurity Shares Plunging appeared first on SecurityWeek.

  • Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS

    Network Security

    Threat actors relying on AI have been exploiting exposed ports and weak credentials to take over FortiGate devices. The post Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS appeared first on SecurityWeek.

  • PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence

    Mobile & Wireless · Malware & Threats

    The malware leverages Gemini to analyze on-screen elements and ensure that it remains on the device even after a reboot. The post PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence appeared first on SecurityWeek.

  • Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management

    Cybersecurity Funding · Identity & Access

    Formerly named Valkyrie, the company’s funding includes $25 million raised in a Series A round. The post Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management appeared first on SecurityWeek.

  • New Keenadu Android Malware Found on Thousands of Devices

    Mobile & Wireless · Malware & Threats

    The malware has been preinstalled on many devices but it has also been distributed through Google Play and other app stores. The post New Keenadu Android Malware Found on Thousands of Devices appeared first on SecurityWeek.

  • API Threats Grow in Scale as AI Expands the Blast Radius

    Artificial Intelligence · Application Security

    New research shows attackers increasingly abusing APIs at machine speed as AI-driven systems widen exposure and amplify impact. The post API Threats Grow in Scale as AI Expands the Blast Radius appeared first on SecurityWeek.

  • Android 17 Beta Strengthens Secure-by-Default Design for Privacy and App Security

    Mobile & Wireless

    The latest Android version continues to improve security and privacy, according to its developers. The post Android 17 Beta Strengthens Secure-by-Default Design for Privacy and App Security appeared first on SecurityWeek.

  • Microsoft to Enable ‘Windows Baseline Security’ With New Runtime Integrity Safeguards

    Endpoint Security

    Windows will have runtime safeguards enabled by default, ensuring that only properly signed software runs. The post Microsoft to Enable ‘Windows Baseline Security’ With New Runtime Integrity Safeguards appeared first on SecurityWeek.

  • Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses

    Identity & Access

    Gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats. The post Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses appeared first on SecurityWeek.

  • GitGuardian Raises $50 Million for Secrets and Non-Human Identity Security

    Cybersecurity Funding · Identity & Access

    The secrets security company has raised more than $100 million since its creation in 2017. The post GitGuardian Raises $50 Million for Secrets and Non-Human Identity Security appeared first on SecurityWeek.

  • Zast.AI Raises $6 Million for AI-Powered Code Security

    Cybersecurity Funding · Application Security

    The startup relies on AI agents to identify software vulnerabilities and validate them before reporting. The post Zast.AI Raises $6 Million for AI-Powered Code Security appeared first on SecurityWeek.

  • Microsoft to Refresh Windows Secure Boot Certificates in June 2026

    Endpoint Security

    After a decade and a half of service, the current certificates will expire, and new ones will be rolled out. The post Microsoft to Refresh Windows Secure Boot Certificates in June 2026 appeared first on SecurityWeek.

  • Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD

    Endpoint Security · Vulnerabilities

    More than two dozen advisories have been published by the chip giants for vulnerabilities found recently in their products. The post Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD appeared first on SecurityWeek.

  • Google-Intel Security Audit Reveals Severe TDX Vulnerability Allowing Full Compromise

    Vulnerabilities · Cloud Security

    Dozens of vulnerabilities, bugs, and potential improvements have been identified by the tech giants’ security teams. The post Google-Intel Security Audit Reveals Severe TDX Vulnerability Allowing Full Compromise appeared first on SecurityWeek.

  • Backslash Raises $19 Million to Secure Vibe Coding

    Cybersecurity Funding · Application Security

    The company will use the investment to expand its R&D team and operations, deepen platform capabilities, and scale go-to-market presence. The post Backslash Raises $19 Million to Secure Vibe Coding appeared first on SecurityWeek.

  • New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices

    Mobile & Wireless · Malware & Threats

    Available via Telegram, researchers warn ZeroDayRAT is a ‘complete mobile compromise toolkit’ comparable to kits normally requiring nation-state resources to develop. The post New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices appeared first on SecurityWeek.

  • Organizations Urged to Replace Discontinued Edge Devices

    Network Security · Risk Management

    Edge devices that are no longer supported have been targeted in attacks by state-sponsored hackers, the US says. The post Organizations Urged to Replace Discontinued Edge Devices appeared first on SecurityWeek.

  • VS Code Configs Expose GitHub Codespaces to Attacks

    Vulnerabilities · Application Security

    VS Code-integrated configuration files are automatically executed in Codespaces when the user opens a repository or pull request. The post VS Code Configs Expose GitHub Codespaces to Attacks appeared first on SecurityWeek.

  • Vulnerabilities Allowed Full Compromise of Google Looker Instances

    Vulnerabilities · Cloud Security

    The flaws dubbed LookOut can be exploited for remote code execution and data exfiltration. The post Vulnerabilities Allowed Full Compromise of Google Looker Instances appeared first on SecurityWeek.

  • Microsoft Moves Closer to Disabling NTLM

    Identity & Access

    The next major Windows Server and Windows releases will have the deprecated authentication protocol disabled by default. The post Microsoft Moves Closer to Disabling NTLM appeared first on SecurityWeek.

  • Cyber Insights 2026: Zero Trust and Following the Path

    Network Security

    Zero Trust is not a thing; it is an idea. It is not a product; it is a concept – it is a destination that has no precise route and may never be reached. The post Cyber Insights 2026: Zero Trust and Following the Path appeared first on SecurityWeek.

  • PwC and Google Cloud Ink $400 Million Deal to Scale AI-Powered Defense

    Artificial Intelligence · Security Architecture

    The announcement comes just weeks after Palo Alto Networks and Google Cloud announced a multibillion-dollar AI and cloud security deal. The post PwC and Google Cloud Ink $400 Million Deal to Scale AI-Powered Defense appeared first on SecurityWeek.

  • Cyber Insights 2026: Offensive Security; Where It Is and Where It’s Going

    Network Security

    Malicious attacks are increasing in frequency, sophistication and damage. Defenders need to find and harden system weaknesses before attackers can attack them. The post Cyber Insights 2026: Offensive Security; Where It Is and Where It’s Going appeared first on SecurityWeek.

  • Rein Security Emerges From Stealth With $8M, Bringing Inside-Out AppSec Approach

    Cybersecurity Funding · Application Security

    Rein aims to close the production visibility gap by stopping attacks inside the application runtime. The post Rein Security Emerges From Stealth With $8M, Bringing Inside-Out AppSec Approach appeared first on SecurityWeek.

  • Upwind Raises $250 Million at $1.5 Billion Valuation

    Cybersecurity Funding · Cloud Security

    The CNAPP company will use the fresh investment to scale its runtime-first cloud security offering across data, AI and code. The post Upwind Raises $250 Million at $1.5 Billion Valuation appeared first on SecurityWeek.

  • Old Attack, New Speed: Researchers Optimize Page Cache Exploits

    Endpoint Security

    A team of researchers from the Graz University of Technology in Austria has revived page Linux page cache attacks. The post Old Attack, New Speed: Researchers Optimize Page Cache Exploits appeared first on SecurityWeek.

  • Why Identity Security Must Move Beyond MFA

    Identity & Access

    By integrating identity threat detection with MFA, organizations can protect sensitive data, maintain operational continuity, and reduce risk exposure. The post Why Identity Security Must Move Beyond MFA appeared first on SecurityWeek.

  • MITRE Launches New Security Framework for Embedded Systems

    IoT Security · ICS/OT

    The Embedded Systems Threat Matrix (ESTM) aims to help organizations protect critical embedded systems. The post MITRE Launches New Security Framework for Embedded Systems appeared first on SecurityWeek.

  • Cyber Insights 2026: API Security – Harder to Secure, Impossible to Ignore

    Application Security

    API cybersecurity will be a ping pong ball, battered between the rackets of AI-assisted attackers and AI-assisted defenders. The post Cyber Insights 2026: API Security – Harder to Secure, Impossible to Ignore appeared first on SecurityWeek.

  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior

    Identity & Access

    The most common stolen passwords in 2025 were 123456, admin, and password, according to a Specops study. The post Analysis of 6 Billion Passwords Shows Stagnant User Behavior appeared first on SecurityWeek.

  • WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking

    Mobile & Wireless

    The critical issue impacts Bluetooth audio accessories with improper Google Fast Pair implementations. The post WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking appeared first on SecurityWeek.

  • New ‘StackWarp’ Attack Threatens Confidential VMs on AMD Processors

    Endpoint Security · Vulnerabilities

    Researchers have disclosed technical details on a new AMD processor attack that allows remote code execution inside confidential VMs. The post New ‘StackWarp’ Attack Threatens Confidential VMs on AMD Processors appeared first on SecurityWeek.

  • Vibe Coding Tested: AI Agents Nail SQLi but Fail Miserably on Security Controls

    Artificial Intelligence · Application Security

    Vibe coding generates a curate’s egg program: good in parts, but the bad parts affect the whole program. The post Vibe Coding Tested: AI Agents Nail SQLi but Fail Miserably on Security Controls appeared first on SecurityWeek.

  • Aikido Security Raises $60 Million at $1 Billion Valuation

    Cybersecurity Funding · Application Security

    The developer security company has raised a total of more than $84 million in funding. The post Aikido Security Raises $60 Million at $1 Billion Valuation appeared first on SecurityWeek.

  • Cyber Insights 2026: External Attack Surface Management

    Network Security

    AI will assist companies in finding their external attack surface, but it will also assist bad actors in locating and attacking the weak points. The post Cyber Insights 2026: External Attack Surface Management appeared first on SecurityWeek.

  • Broadcom Wi-Fi Chipset Flaw Allows Hackers to Disrupt Networks

    Mobile & Wireless

    The vulnerability was discovered in Asus routers, but all devices using the affected chipset are susceptible to attacks. The post Broadcom Wi-Fi Chipset Flaw Allows Hackers to Disrupt Networks appeared first on SecurityWeek.

  • Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking

    IoT Security

    CISA advisory warns that unauthenticated Bluetooth access in WHILL devices allows for unauthorized movement. The post Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking appeared first on SecurityWeek.

  • Shai-Hulud Supply Chain Attack Led to $8.5 Million Trust Wallet Heist

    Supply Chain Security · Application Security

    The worm exposed Trust Wallet’s Developer GitHub secrets, allowing attackers to publish a backdoor extension and steal funds from 2,520 wallets. The post Shai-Hulud Supply Chain Attack Led to $8.5 Million Trust Wallet Heist appeared first on SecurityWeek.

  • Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal

    Cloud Security · Artificial Intelligence

    The agreement strengthens technical and commercial ties as Palo Alto migrates workloads and adopts Google’s Vertex AI and Gemini models. The post Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal appeared first on SecurityWeek.