Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names

Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names

The former heads of the leading cybersecurity government agencies in the US and UK have called for an overhaul in threat actor naming conventions. Cyber attribution and threat actor naming have sparked long-lasting debates in cyber spheres, at least since Mandiant’s 2013 APT1 report, Exposing One of China’s Cyber Espionage Units, which attributed a name to China’s People’s Liberation Army (PLA) Unit 61398 that the whole cyber community could refer to. From then on, each…

Read More

How Booking.com measures the impact of GenAI on developer productivity

How Booking.com measures the impact of GenAI on developer productivity

As an established name in online travel, Booking.com has long maintained its position as a global leader—today, they attract over 500 million monthly visitors and more than a billion annual bookings. But sustaining their market position going forward, in the increasingly fast-evolving travel industry, has required Booking.com’s leadership to shift its attention toward accelerating their pace of software delivery and innovation. To help achieve this, the company is heavily leaning into rolling out AI across…

Read More

How Booking.com measures the impact of AI on developer productivity

How Booking.com measures the impact of AI on developer productivity

As an established name in online travel, Booking.com has long maintained its position as a global leader—today, they attract over 500 million monthly visitors and more than a billion annual bookings. But sustaining their market position going forward, in the increasingly fast-evolving travel industry, has required Booking.com’s leadership to shift its attention toward accelerating their pace of software delivery and innovation. To help achieve this, the company is heavily leaning into rolling out AI across…

Read More

Pentagon’s $11B IT modernization struggles with cost overruns, delays, and cybersecurity gaps

Pentagon’s B IT modernization struggles with cost overruns, delays, and cybersecurity gaps

The US Department of Defense is struggling to adequately track performance and secure its major IT business systems despite planning to spend $10.9 billion on these programs through fiscal year 2025, according to a new Government Accountability Office assessment. The GAO’s sixth annual review of the DoD’s IT business programs found significant gaps in performance reporting and cybersecurity planning across the Pentagon’s 24 major IT investments, which support critical functions including healthcare, human resources, financial…

Read More

How emerging technologies are redefining enterprise architecture

How emerging technologies are redefining enterprise architecture

Process mining plays a crucial role in this phase. By leveraging process mining technologies, organizations can analyze how their current operations flow compared to industry benchmarks. This step reveals bottlenecks, unnecessary manual interventions and deviations from optimal paths. It offers clear, data-backed insights that can inform transformation efforts. Instead of merely replicating legacy processes in a modern system, organizations can pinpoint specific areas where AI, IoT or other emerging technologies can drive measurable improvements. This…

Read More

European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms

European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms

Researchers from the Citizen Lab have revealed the first forensic evidence that the iPhones of at least two European journalists were infected with Graphite, a piece of spyware developed by the Israeli company Paragon Solutions. In a June 12 post, Bill Marczak and John Scott-Railton, two researchers at the University of Toronto’s digital forensic research center, stated that they had found forensic evidence confirming, with high confidence, that the devices of both an anonymous European…

Read More

Custom AI models help MWAA deliver better airport experiences

Custom AI models help MWAA deliver better airport experiences

The use cases keep growing. “We are training the models for seasonal, hourly, and event-based patterns, holiday surges, and weather disruptions,” the CIDO says. “It collects raw data from all these sources based on context, harnesses it in real-time, and we put together these models on top of it to deliver a smarter, faster, and seamless experience for our partners.” Aside from data collection pipelines and recommendation models, Queue Hub is connected to myriad other…

Read More

Ransomware Gang Exploits SimpleHelp RMM to Compromise Utility Billing

Ransomware Gang Exploits SimpleHelp RMM to Compromise Utility Billing

Ransomware actors have compromised customers of a utility software billing software provider after exploiting a vulnerability in the SimpleHelp Remote Monitoring and Management (RMM) tool. A new advisory from the Cybersecurity and Infrastructure Security Agency (CISA) warned that the incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp RMM since January 2025. SimpleHelp versions 5.5.7 and earlier contain several vulnerabilities, including a path traversal vulnerability CVE-2024-57727. “Ransomware actors likely…

Read More

interview | “Technology is not a tool, it's a strategy”–OliveYoung COO Jinhee Lee on growing MAU 5X with online and offline integration

interview | “Technology is not a tool, it's a strategy”–OliveYoung COO Jinhee Lee on growing MAU 5X with online and offline integration

His first step toward achieving this balance was introducing the squad-tribe system. A squad is a small, cross-functional team focused on a specific feature or function within a product or service, bringing together planners, developers, designers, and others to collaborate organically. Multiple squads are then grouped into a tribe. To support fast and fluid collaboration within this new structure, Lee implemented tools like Slack and Jira, helping tech teams integrate their workflows more seamlessly with…

Read More

M365 Copilot: New Zero-Click AI Flaw Allows Corporate Data Theft

M365 Copilot: New Zero-Click AI Flaw Allows Corporate Data Theft

In a world first, researchers from Aim Labs have identified a critical zero-click vulnerability in Microsoft 365 Copilot that can lead to the exfiltration of sensitive corporate data with a simple email. The vulnerability, dubbed ‘EchoLeak,’ exploits design flaws typical of Retrieval Augmented Generation (RAG) Copilots, allowing attackers to automatically exfiltrate any data from M365 Copilot’s context, without relying on specific user behavior. It was discovered by the Aim Labs researchers while using a new…

Read More
1 2 3 2,808