Tag: technology
-
F5 Buys Startup Fletch to Automate Security With Agentic AI
by
in SecurityNewsContext-Driven Insights, Automation Fuel Faster, Clearer Decisions for Cyber Teams. With its acquisition of San Francisco-based startup Fletch, F5 is embedding agentic AI into its security platform to automate threat detection and response. The technology provides real-time context, filters irrelevant alerts and helps security teams prioritize urgent risks and mitigation tasks. First seen on govinfosecurity.com…
-
US Sanctions Philippines’ Funnull Technology Over $200M Crypto Scam
by
in SecurityNewsThe US Department of the Treasury has taken action against Funnull Technology Inc. for enabling massive pig butchering… First seen on hackread.com Jump to article: hackread.com/us-sanctions-philippines-funnull-technology-crypto-scam/
-
Launch of e92spark extends distie’s options
by
in SecurityNewsDistributor establishes fresh division to enable the business to capture emerging vendors bringing innovative technology to market First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366625159/Launch-of-e92spark-extends-disties-options
-
AI-Powered Drones: Ukraine’s Historic Strikes on Russian Aircraft
by
in SecurityNewsUkraine’s AI-powered FPV drones redefine warfare, featuring advancements in military technology and cost-effective strategies. Learn more! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/ai-powered-drones-ukraines-historic-strikes-on-russian-aircraft/
-
Hart 4 Technology vertreibt Apricorn-Produkte jetzt auch in der DACH-Region
by
in SecurityNewsSeit 2015 vertreibt Hart 4 Technology exklusiv Apricorn-Produkte in den Benelux-Staaten und verfügt über tiefgreifendes Know-how im Bereich ‘Data-at-Rest”-Sicherheit von USB-Speichern bis zu komplexen Netzwerklösungen auf Sicherheitsniveaus von SECRET bis RESTRICTED. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/hart-4-technology-vertreibt-apricorn-produkte-jetzt-auch-in-der-dach-region/a40987/
-
Top Cloud Vulnerabilities in Fintech and How to Fix Them
by
in SecurityNews
Tags: banking, cloud, computing, cyber, finance, fintech, international, mobile, service, technology, threat, vulnerabilityFor financial technology (FinTech) organizations, cloud security is both a top priority and a significant concern, as highlighted by a study conducted by McKinsey and the Institute of International Finance (IIF). FinTech companies increasingly rely on cloud computing to power services such as mobile banking, digital payments, and investment platforms. However, as cyber threats grow……
-
US Sanctions Romance Bait Scam Digital Infrastructure Host
by
in SecurityNewsFunnull Technology Is Content Delivery Network for Criminals, Says US Treasury. The U.S. government sanctioned a Philippine firm linked to romance bait scam websites. The Department of Treasury cut off Funnull Technology from the U.S.-dominated international monetary system for acting as a content delivery network for scam platforms. First seen on govinfosecurity.com Jump to article:…
-
FBI Warns of Filipino Tech Company Running Sprawling Crypto Scams
by
in SecurityNewsThe US Treasury said cryptocurrency investment schemes like the ones facilitated by Funnull Technology Inc. have cost Americans billions of dollars annually. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/fbi-warns-tech-company-crypto-scams
-
Beware: Weaponized AI Tool Installers Infect Devices with Ransomware
by
in SecurityNewsCisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers, targeting unsuspecting users and businesses across multiple industries. These threats, including the CyberLock and Lucky_Gh0$t ransomware families, along with a newly identified destructive malware dubbed “Numero,” exploit the growing popularity of AI solutions in sectors like B2B sales, technology, and…
-
US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator
by
in SecurityNewsThe U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major crypto losses through fraud infrastructure. The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Philippines-based company Funnull Technology Inc. and its admin Liu Lizhi for enabling romance scams, causing $200M in U.S. victim losses. A romance scam…
-
U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud
by
in SecurityNewsThe U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based company named Funnull Technology Inc. and its administrator Liu Lizhi for providing infrastructure to conduct romance baiting scams that led to massive cryptocurrency losses.The Treasury accused the Taguig-headquartered company of enabling thousands of websites involved in First seen…
-
Securing Windows 11 and Server 2025: What CISOs should know about the latest updates
by
in SecurityNewsSusan Bradley / CSOYou can prevent Recall use by turning off the saving of snapshots and also disabling Click to Do. Alternatively, if you want to enable the service, I recommend setting a list of applications that you want filtered as well as excluding a list of URLs.In addition, you can set policies for Copilot.…
-
Feel Supported by Your NHI Security Team
by
in SecurityNewsHave You Considered the Strategic Importance of NHI Management? Consider this: The evolving technology has caused a seismic shift in how businesses protect their IT infrastructure. A crucial part of this protection is the effective management of Non-Human Identities (NHIs) and secrets. The emerging challenges in securing the cloud have emphasized the need for robust……
-
Getting Ahead of AI Risk: What Comes Next for Tenable
by
in SecurityNewsThe acquisition of Apex Security adds a powerful new layer of visibility, context and control to the Tenable One Exposure Management Platform to govern usage, enforce policy and control exposure across both the AI that organizations use and the AI they build. Over the past 25 years, we’ve seen the attack surface shift dramatically, from…
-
Southeast Asian provider of ‘infrastructure laundering’ for scams is sanctioned by US
by
in SecurityNewsFunnull Technology supports “hundreds of thousands of websites” dedicated to the scams, otherwise known as pig butchering, according to the sanctions announcement by the Treasury Department’s Office of Foreign Assets Control. First seen on therecord.media Jump to article: therecord.media/southeast-asian-provider-of-scam-infrastructure-sanctioned
-
US sanctions firm linked to cyber scams behind $200 million in losses
by
in SecurityNewsThe U.S. Treasury Department has sanctioned Funnull Technology, a Philippines-based company that supports hundreds of thousands of malicious websites behind cyber scams linked to over $200 million in losses for Americans. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-sanctions-company-linked-to-hundreds-of-thousands-of-cyber-scam-sites/
-
Windows 11 File Explorer Vulnerability Enables NTLM Hash Theft
by
in SecurityNewsA newly disclosed vulnerability, CVE-2025-24071, has been identified in Windows File Explorer, specifically affecting Windows 11 (23H2) and earlier versions that support .library-ms files and the SMB protocol. This flaw enables attackers to capture NTLM (New Technology LAN Manager) authentication hashes simply by tricking a user into extracting a malicious ZIP archive”, no further interaction…
-
Even $5M a year can’t keep top CISOs happy
by
in SecurityNewsSome are unhappy with budgets too: : Not all CISOs working at large enterprises are happy with their six-figure salaries. According to the survey, only 55% of respondents working for $20 billion-plus firms were satisfied with what they were being paid and that group was the least satisfied of all questioned with what they were…
-
New Microsoft Entra Connect Update Replaces Legacy Login Methods
by
in SecurityNewsQuantum computing is rapidly emerging as one of the most transformative technology trends of 2025, promising to revolutionize industries by solving complex problems that are currently beyond the reach of classical computers. Unlike traditional computers that process information in binary code”, using bits that represent either 0 or 1″, quantum computers use qubits, which can…
-
New ChoiceJacking Exploit Targets Android and iOS via Infected Charging Ports
by
in SecurityNewsA team of cybersecurity researchers from the Institute of Information Security and A-SIT Secure Information Technology Centre Austria has unveiled a new class of USB-based attacks on mobile devices, dubbed “ChoiceJacking.” This attack revives and surpasses the notorious “juice jacking” threat from a decade ago, which prompted Apple and Google to introduce user confirmation prompts…
-
Separating hype from reality: How cybercriminals are actually using AI
by
in SecurityNews
Tags: ai, attack, automation, cyber, cyberattack, cybercrime, cybersecurity, data, defense, exploit, framework, group, incident response, malicious, mitre, strategy, technology, threat, vulnerability, zero-dayThe evolution of AI: Preparing defenders for tomorrow’s threats: As security professionals chart their defensive strategies, we must consider how AI will reshape cybercrime in the coming years. We also need to anticipate the fundamental pivots attackers will make, and what this evolution means for our entire industry. AI will inevitably impact vulnerability discovery, enable…
-
95% of Organizations Lack a Quantum Computing Strategy
by
in SecurityNewsISACA Survey: 51% See Cyber Risk Hike; 46% Expect Regulatory, Compliance Challenges. Quantum technology is still emerging, but experts warn that failing to act now could jeopardize future data security. To safeguard tomorrow’s information, organizations must start developing a post-quantum cryptography strategy and upskill their workforce today. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/95-organizations-lack-quantum-computing-strategy-a-28501
-
NSFOCUS Recognized by Forrester in The Network Analysis and Visibility (NAV) Solution Landscape
by
in SecurityNewsSanta Clara, Calif. May 28, 2025 Recently, global research and advisory firm Forrester released The Network Analysis and Visibility (NAV) Solutions Landscape, Q2 2025, offering a comprehensive analysis of market dynamics, technology trends, and product capabilities. NSFOCUS has once again [1] been included in this report. Forrester’s reports on specific technical fields are highly recognized worldwide….The…
-
Will AI agent-fueled attacks force CISOs to fast-track passwordless projects?
by
in SecurityNews
Tags: access, ai, api, attack, authentication, breach, business, ciso, cloud, credentials, cyber, cybersecurity, data, fido, finance, framework, google, Hardware, identity, login, metric, microsoft, okta, passkey, password, phishing, privacy, risk, risk-management, service, technology, threat, tool, update, zero-trustPasswordless options: In retiring passwords, security leaders will need to consider their options, passkeys, biometrics, and third-party login services, looking for the best technical, usability, and security fit. There are pros and cons for each option, and in many cases CISOs may be guided towards one based on their existing environment.Passkeys, used by Microsoft, Samsung,…