A newly revealed zero-day flaw in Microsoft SQL Server enables attackers with basic network access to seize full control of databases—no user interaction required. Organizations must act fast to patch and protect their most valuable data.
Jazz, a Tel Aviv-based cybersecurity startup founded by Israeli intelligence veterans, emerged from stealth with $61 million to tackle data loss prevention using AI that understands context, intent, and risk—promising to silence the DLP noise plaguing enterprises.
L-S-King-and-Associates, a regional accounting firm, has been struck by ransomware, resulting in encrypted files and compromised client data. This incident exposes the rising cyber risks for professional service firms and underlines the need for stronger digital defenses.
AI presentation tools now promise fully automated, audience-tailored storytelling. But as convenience grows, so do concerns: security gaps, data privacy, and the risk of generic, error-prone slides. Are we really in control of our message—or just along for the ride?
An in-depth look at the 'LeakyLooker' vulnerabilities in Google Looker Studio, which could have allowed cross-tenant data breaches and manipulation across major Google Cloud services.
Evervault lands $25M in fresh funding to build a developer-first platform where sensitive data stays encrypted—always. Is this the dawn of truly untouchable data?
AI-native browsers and embedded copilots are transforming how enterprises work—and exposing dangerous blind spots. Sensitive data is leaking, attackers are targeting browser sessions, and old security tools can’t keep up. Here’s why the browser is now the frontline of enterprise risk.
When organizations upgrade their tech, forgotten data on discarded PCs can become a security nightmare. Discover the risks, legal responsibilities, and best practices for secure asset disposal.
A breach at billing firm Catalyst RCM, not the diagnostic labs themselves, led to the exposure of nearly 140,000 US healthcare records, showing how third-party vendors can be the weakest link in medical data security.
A major flaw in MCP servers lets attackers exploit trusted AI integrations for remote code execution and data theft. Our investigation reveals how these attacks work—and what organizations must do to defend themselves.