Ransomware attack on Texas gas station chain exposes 377,000 people's Social Security numbers and driver's licenses. Keep ...
The Reprompt Copilot attack bypassed the LLMs data leak protections, leading to stealth information exfiltration after the ...
The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) ...
Microsoft Copilot security vulnerability allows attackers to steal data through malicious links. Learn how the attack works ...
CrowdStrike's 2025 data shows attackers breach AI systems in 51 seconds. Field CISOs reveal how inference security platforms defend against prompt injection, model extraction, and 9 other runtime ...
Okta is warning about custom phishing kits built specifically for voice-based social engineering (vishing) attacks.
Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups are insufficient, as ...
Varonis found a “Reprompt” attack that let a single link hijack Microsoft Copilot Personal sessions and exfiltrate data; ...
Researchers found an indirect prompt injection flaw in Google Gemini that bypassed Calendar privacy controls and exposed ...
In 2025, data centers face a rapidly evolving security landscape, driven by technological advancements like artificial intelligence, cloud integration, the Internet of Things, and a rise in ...
Akshay Garkel, partner & leader at Grant Thornton Bharat LLP shares insights for founders navigating AI, cloud infrastructure, and India’s DPDP Act ...