This post was written with Arun Sittampalam and Maxime Darcot from Swisscom.
As we navigate the constantly shifting AI ecosystem, enterprises face challenges in translating AI’s potential into …
This post was written with Bryan Woolgar-O’Neil, Jamie Cockrill and Adrian Cunliffe from Harmonic Security
Organizations face increasing challenges protecting sensitive data while supporting …
AIs Exploiting Smart Contracts I have long maintained that smart contracts are a dumb idea: that a human process is actually a security feature.
Here’s some interesting research on training AIs to …
**
Dec 11, 2025 **
Ravie Lakshmanan
This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software …
**
Dec 11, 2025 **
The Hacker News
Automation / Compliance
As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool …
**
Dec 11, 2025 **
Ravie Lakshmanan
Cyber Espionage / Windows Security
Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google …
MIT researchers have developed a new fabrication method that could enable the production of more energy efficient electronics by stacking multiple functional components on top of one existing circuit. …
As the scale and complexity of AI infrastructure grows, data center operators need continuous visibility into factors including performance, temperature and power usage. These insights enable data …
**
Dec 11, 2025 **
Ravie Lakshmanan
Cyberwarfare / Threat Intelligence
An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities …
**
Dec 11, 2025 **
Ravie Lakshmanan
Vulnerability / Cloud Security
A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances …
**
Dec 11, 2025 **
Ravie Lakshmanan
Zero-Day / Vulnerability
Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under …
**
Dec 11, 2025 **
Ravie Lakshmanan
Vulnerability / Encryption
Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use …
The NVIDIA accelerated computing platform is leading supercomputing benchmarks once dominated by CPUs, enabling AI, science, business and computing efficiency worldwide.
Moore’s Law has run its …
The world’s top-performing system for graph processing at scale was built on a commercially available cluster.
NVIDIA last month announced a record-breaking benchmark result of 410 trillion traversed …
Automated smoke testing using Amazon Nova Act headless mode helps development teams validate core functionality in continuous integration and continuous delivery (CI/CD) pipelines. Development teams …
**
Dec 10, 2025 **
Ravie Lakshmanan
Hardware Security / Vulnerability
Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data …
FBI Warns of Fake Video Scams The FBI is warning of AI-assisted fake kidnapping scams:
Criminal actors typically will contact their victims through text message claiming they have kidnapped their …
**
Dec 10, 2025 **
Ravie Lakshmanan
Enterprise Security / Web Services
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade …
React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of …
Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution.
The Fortinet …
**
Dec 10, 2025 **
The Hacker News
Cloud Security / Threat Detection
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your …
**
Dec 10, 2025 **
Ravie Lakshmanan
Vulnerability / Malware
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and …
Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild.
Of the 56 flaws, …
AI vs. Human Drivers Two competing arguments are making the rounds. The first is by a neurosurgeon in the New York Times . In an op-ed that honestly sounds like it was paid for by Waymo, the author …
Teams need instant access to enterprise data and intelligent guidance on how to use it. Instead, they get scattered information across multiple systems. This results in employees spending valuable …