Google’s Sec-Gemini v1 Takes on Hackers & Outperforms Rivals by 11%

Google’s Sec-Gemini v1 Takes on Hackers & Outperforms Rivals by 11%

Image: Sundry Photography/Adobe Stock In a bid to tilt the cybersecurity battlefield in favor of defenders, Google has introduced Sec-Gemini v1, a new experimental AI model designed to help security teams identify threats, analyze incidents, and understand vulnerabilities faster and more accurately than before. Announced by the company’s cybersecurity research leads, Elie Burzstein and Marianna Tishchenko, Sec-Gemini v1 is the latest addition to Google’s growing family of Gemini-powered tools — but this time, it is…

Read More

Video: Proofpoint Simplifies Security Solutions Sales For Partners Through Ingram Micro Xvantage Platform

Video: Proofpoint Simplifies Security Solutions Sales For Partners Through Ingram Micro Xvantage Platform

Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. View our editorial policy here. In this episode of Partner POV, host Katie Bavoso speaks with Chari Rhoades, Vice President of Americas Channel and Partner Sales at Proofpoint, and Eric Kohl, Vice President of Global Vendor Engagement, Security and Networking at Ingram Micro, about a major milestone in the channel:  ▶️ For the first…

Read More

Key Cybersecurity Challenges In 2025—Trends And Observations

Key Cybersecurity Challenges In 2025—Trends And Observations

Digital 2025 Sign on Computer Code. 3D Render getty In 2025, cybersecurity is gaining significant momentum. However, there are still many challenges to address. The ecosystem remains unstable in spite of investments and the introduction of new tools. In addition to adding my own findings, I have examined some recent statistics, trends, and remedies. Among the subjects covered are ransomware, DDoS attacks, quantum technology, healthcare breaches, artificial intelligence and AI agents, and cybersecurity for space…

Read More

Benchmarks Find ‘DeepSeek-V3-0324 Is More Vulnerable Than Qwen2.5-Max’ | TechRepublic

Benchmarks Find ‘DeepSeek-V3-0324 Is More Vulnerable Than Qwen2.5-Max’ | TechRepublic

With the latest stable release dated January 28, 2025, Qwen2.5-Max is classified as a Mixture-of-Experts (MoE) language model developed by Alibaba. Like other language models, Qwen2.5-Max is capable of generating text, understanding different languages, and performing advanced logic. According to recent benchmarks, it is also more secure than DeepSeek-V3-0324. Using Recon to scan for vulnerabilities A team of analysts with Protect AI, the company behind a red teaming and security vulnerability scanning tool known as…

Read More

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies

North Korean hackers who disguise themselves as IT workers are applying for work in the U.K., according to Google Threat Intelligence Group. Success in the U.S. is declining due to rising awareness of their tactics, indictments, and right-to-work verification challenges, prompting them to turn elsewhere. The attackers pose as legitimate remote workers, looking to generate revenue, access sensitive company data, or perform espionage operations through employment. Researchers observed them seeking out login credentials for job…

Read More

Mobile World Congress 2025: SOC in the Network Operations Center

Mobile World Congress 2025: SOC in the Network Operations Center

Mobile World Congress 2025 in Barcelona delivered on every promise – a record-breaking event with 109,000 attendees from 205 countries, with over 2,900 exhibitors, sponsors, and partners showcasing an impressive array of cutting‐edge topics, from 5G and IoT to Unified Security for the AI-driven Future. As always, Cisco’s presence showcased a suite of innovations, such as the latest secure connectivity solutions, demonstrated next‐gen wireless innovations, and made several high-profile media announcements that underscored our commitment…

Read More

Google DeepMind Proposes AI ‘Monitors’ to Police Hyperintelligent Models

Google DeepMind Proposes AI ‘Monitors’ to Police Hyperintelligent Models

Google DeepMind has introduced a new approach to securing frontier generative AI and released a paper on April 2. DeepMind focused on two of its four key risk areas: “misuse, misalignment, mistakes, and structural risks.” DeepMind is looking beyond current frontier AI to artificial general intelligence (AGI), human-level smarts, which could revolutionize healthcare and other industries or trigger technological chaos. There is some skepticism over whether AGI of that magnitude will ever exist. Asserting that…

Read More

Google's Present to Enterprise Gmail Users: End-to-End Encryption

Google's Present to Enterprise Gmail Users: End-to-End Encryption

Image: Google All enterprise users of Gmail can now easily apply end-to-end encryption to their emails. Prior to today, this was a luxury reserved for big businesses with significant IT resources, but Google recognises that email attacks are on the rise across the board. Starting today, Gmail users can send end-to-end encrypted emails to others within their organisation; in the coming weeks, they will also be able to send encrypted emails to Gmail inboxes outside…

Read More

Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection

Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection

This Motorola Moto G Power 5G shows the midnight blue color option. Image: Amazon New Android malware is using Microsoft’s .NET MAUI to fly under the radar in a new cybersecurity dust-up this week. Disguised as actual services such as banking and social media apps targeting Indian and Chinese-speaking users, the malware is designed to gain access to sensitive information. Cybersecurity experts with McAfee’s Mobile Research Team say that, while the threat is currently aimed…

Read More

Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings? | TechRepublic

Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings? | TechRepublic

Security engineer was the most common title in cybersecurity job listings in 2024, according to security and IT workforce management platform provider CyberSN. Its report “U.S. Cybersecurity Job Posting Data” was created by pulling together job postings from 30 major job boards and Fortune 500 companies’ job boards between January 2022 and December 2024. The report shows which roles are growing, which are decreasing in demand, and other hiring trends. Security engineer and security analyst…

Read More
1 2 3 4 30