Cisco Study Reveals Alarming Deficiencies in European Cybersecurity Readiness

Cisco Study Reveals Alarming Deficiencies in European Cybersecurity Readiness

According to Cisco’s 2025 Cybersecurity Readiness Index, only 3 percent of organizations in Europe have achieved the ‘Mature’ level of readiness required to effectively withstand today’s cyber threats, as hyperconnectivity and AI introduce new complexities. The European Union has adopted regulatory frameworks that address critical infrastructure security (NIS2) and product security (Cyber Resilience Act, CRA), but progress has been critically held back by inconsistent implementation and irregular roadmaps for compliance. The EU has signaled cybersecurity…

Read More

Defending Against HNDL Attacks Today

Defending Against HNDL Attacks Today

In the ever-evolving landscape of cybersecurity, HNDL (Harvest Now, Decrypt Later) is emerging as a silent but serious threat. It doesn’t require an attacker to break encryption today—it just bets that they will be able to do so tomorrow. What is HNDL? HNDL is a long-term data breach strategy in which adversaries intercept and store encrypted data today, with the intention of decrypting it in the future when computing power—particularly quantum computing—makes breaking current cryptography…

Read More

Revolutionizing AI Security and Cyber Resilience with Open-Source Innovation and Risk Management Solutions

Revolutionizing AI Security and Cyber Resilience with Open-Source Innovation and Risk Management Solutions

Foundation AI: Open-Source Innovations for Secure AI To address new and complex cybersecurity challenges introduced by the rapid adoption of artificial intelligence (AI), Cisco launches Foundation AI, a team of leading experts in AI and cybersecurity. This group is fully dedicated to solving major security challenges of the AI era by developing advanced tools and technologies that tackle these core issues. This new approach reflects the pressing need to balance rapid AI adoption with robust…

Read More

Proofpoint unveils unified platforms to combat data & cyber risks

Proofpoint unveils unified platforms to combat data & cyber risks

Proofpoint has introduced two new cybersecurity solutions aimed at unifying threat protection and data security across multiple digital channels and organisational environments. The first of these offerings, Proofpoint Prime Threat Protection, is described by the company as a unified, human-centric threat protection platform delivering multichannel, multistage defence across email, cloud applications, and collaboration tools. The second solution, a Unified Data Security Solution, brings together data loss protection, data security posture management, and insider threat management…

Read More

Apple Patches Two Zero-Days Used in ‘Extremely Sophisticated’ Attacks

Apple Patches Two Zero-Days Used in ‘Extremely Sophisticated’ Attacks

Image: ink drop/Adobe Stock Apple has rolled out emergency updates to patch two serious security flaws that were actively being exploited in highly targeted attacks on iPhones and other Apple devices. The fixes, released on April 16 as part of iOS 18.4.1 and macOS Sequoia 15.4.1, address zero-day vulnerabilities. Apple said these bugs were used in an “extremely sophisticated attack against specific targeted individuals on iOS.” Inside the iOS and macOS vulnerabilities The two bugs,…

Read More

Developers Beware: Slopsquatting & Vibe Coding Can Increase Risk of AI-Powered Attacks

Developers Beware: Slopsquatting & Vibe Coding Can Increase Risk of AI-Powered Attacks

Security researchers and developers are raising alarms over “slopsquatting,” a new form of supply chain attack that leverages AI-generated misinformation commonly known as hallucinations. As developers increasingly rely on coding tools like GitHub Copilot, ChatGPT, and DeepSeek, attackers are exploiting AI’s tendency to invent software packages, tricking users into downloading malicious content. What is slopsquatting? The term slopsquatting was originally coined by Seth Larson, a developer with the Python Software Foundation, and later popularized by…

Read More

Sign Up for a Tour at the SOC at RSAC™ 2025 Conference

Sign Up for a Tour at the SOC at RSAC™ 2025 Conference

Cisco and Endace are providing SOC Services to RSAC™ 2025 Conference, monitoring traffic on the Moscone wireless network for security threats. Experts will be using Cisco Security Cloud in the SOC, with the power of Cisco Breach Protection Suite and User Protection Suite, and Secure Firewall; with Splunk Enterprise Security as the platform. The SOC is also providing network observability with ThousandEyes. Incidents are investigated with Threat Intelligence, provided by Cisco Talos and other partners,…

Read More

Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware'

Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware'

Image: nicescene/Adobe Stock Microsoft has detected a zero-day vulnerability in the Windows Common Log File System (CLFS) being exploited in the wild to deploy ransomware. Target industries include IT, real estate, finance, software, and retail, with companies based in the US, Spain, Venezuela, and Saudi Arabia. The vulnerability, tracked as CVE-2025-29824 and rated “important,” is present in the CLFS kernel driver. It allows an attacker who already has standard user access to a system to…

Read More

Embracing the Quantum Era: Navigating the Quantum Shift With PQC

Embracing the Quantum Era: Navigating the Quantum Shift With PQC

The evolution of computing has always involved significant technological advancements. The latest advancements are a giant leap into quantum computing era. Early computers, like the ENIAC, were large and relied on vacuum tubes for basic calculations. The invention of transistors and integrated circuits in the mid-20th century led to smaller, more efficient computers. The development of microprocessors in the 1970s enabled the creation of personal computers, making technology accessible to the public. Over the decades,…

Read More
1 2 3 30