Microsoft fixes bug causing Outlook freezes when copying text
Darktrace to Acquire Incident Investigation Firm Cado Security
Darktrace has announced the proposed acquisition of UK-based incident investigation firm Cado Security, reportedly for up to $100 million.
The post Darktrace to Acquire Incident Investigation Firm Cado Security appeared first on SecurityWeek.
New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption
“Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple’s XProtect,” Check Point Research said in a new analysis shared with The Hacker News. “This development allows it to
Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People
Medical billing solutions provider Medusind has revealed that a data breach discovered in December 2023 impacts over 360,000 individuals.
The post Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People appeared first on SecurityWeek.
GFI KerioControl Firewall Vulnerability Exploited in the Wild
Threat actors are exploiting a recent GFI KerioControl firewall vulnerability that leads to remote code execution.
The post GFI KerioControl Firewall Vulnerability Exploited in the Wild appeared first on SecurityWeek.
SonicWall Patches Authentication Bypass Vulnerabilities in Firewalls
SonicWall has released patches for multiple vulnerabilities in SonicOS, including high-severity authentication bypass flaws.
The post SonicWall Patches Authentication Bypass Vulnerabilities in Firewalls appeared first on SecurityWeek.
The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say
Some of the innovative products presented at CES can pose a serious risk to data and privacy.
The post The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say appeared first on SecurityWeek.
From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025
In the face of ever-growing threats and adversaries, organizations must break down the silos between ALL teams involved in security.
The post From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025 appeared first on SecurityWeek.
Product Review: How Reco Discovers Shadow AI in SaaS
Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson downloading an AI-powered meeting transcription tool, or a
