How Industrial AI Is Transforming Operations in 2026
Wednesday, March 25, 2026 by Richard Harris
A new global study of industrial decision makers shows that artificial intelligence has moved from experimentation to meaningful deployment, bringing clear expectations for business outcomes and a sharper focus on the networks and security foundations that make those outcomes possible. Respondents represent firms with annual revenues over one hundred million dollars, op...
UNESCO AI initiatives driving sustainable development in Africa
Tuesday, March 24, 2026 by Trey Abbe
Artificial intelligence in Africa is often framed through big promises and global headlines, but the most important work is happening at a much more practical level. Across the continent, developers, educators, and institutions are focusing on what actually makes systems useful: reliable data, resilient infrastructure, and tools that fit local constraints. This is not a...
Tenstorrent and Infinia launch Abu Dhabi based Sovereign AI Initiative
Wednesday, March 4, 2026 by Brittany Hainzinger
Tenstorrent USA, Inc. and Infinia Technologies Limited are excited to announce a strategic partnership agreement to co-develop and commercialize sovereign AI infrastructure solutions from Abu Dhabi, with an initial focus on government, financial services, and critical infrastructure customers across the GCC. The agreement was signed by Jim Keller, CEO of Tenst...
Cloudbrink expands secure connectivity platform
Wednesday, March 4, 2026 by Brittany Hainzinger
Cloudbrink announced expanded security and performance benefits for AI agents and online AI services. The new AI capabilities are available on the same platform as Cloudbrink’s award-winning secure connectivity, allowing companies to secure users, apps, and AI in a more unified way.
According to a McKinsey report, 88 percent of enterprises globally are using AI...
Splunk and cisco unveil a suite of innovations
Friday, February 13, 2026 by Richard Harris
What if you could see every corner of your AI powered systems, predict issues before they arise, and deliver seamless digital experiences, all while fortifying your cybersecurity defenses? Splunk and Cisco are bringing that outcome within reach through a suite of platform, observability, and security advancements that help teams move faster with confidence in an agentic...
What's in Store for Open Source in 2026
Wednesday, January 21, 2026 by Mike Milinkovich
As 2025 draws to a close, many of us find ourselves reflecting on a year of remarkable change and looking ahead to what lies beyond the horizon. The end of the year often brings a mix of reflection and anticipation, a time when the open source ecosystem pauses to take stock and to imagine what the next chapter might bring.
In that spirit, I'd like to share a few ...
2026 Cybersecurity Predictions: Identity Becomes the Interface
Monday, December 22, 2025 by Austin Harris
Dwayne McDaniel, Senior Developer Advocate at GitGuardian, offers his perspective on how the focus of AI-driven security is shifting from rapid innovation to governance, accountability, and human oversight as organizations head into 2026.
In 2025, nearly every security conversation circled back to AI. In 2026, the center of gravity will shift from raw innovation to g...
DoubleVerify detects hidden iOS ad fraud
Wednesday, December 3, 2025 by Trey Abbe
DoubleVerify’s Fraud Lab has discovered a new fraud scheme lurking on customers’ mobile devices. It uses innocent-seeming iOS gaming apps to charge advertisers for phony ad impressions.
Operated by independent cybercriminals using a shared framework called UniSkyWalking, the scheme, which our Fraud Lab has dubbed SkyWalk, is sophisticated, coordinated and...
Airline data breach hits WestJet exposing over 1M passengers
Thursday, October 30, 2025 by Russ Scritchfield
Canada’s second-largest airline, WestJet, disclosed that a data breach earlier this year compromised the personal information of approximately 1.2 million passengers. The airline reported the incident in a filing with Maine’s attorney general, confirming that 240 residents in the state were affected.
Details of the information compromised
The informati...
Nvidia results highlight AI's strength as stocks hit records
Monday, October 20, 2025 by Austin Harris
Nvidia has reported earnings and revenues that exceeded analysts’ expectations, with sales guidance of $54 billion for the current quarter. The results underscore the ongoing expansion of infrastructure driven by artificial intelligence, as demand for AI-powered computing continues to accelerate.
The company’s earnings announcement arrived as the S&P ...
AI skills required for app development according to App Builder report
Monday, October 13, 2025 by Richard Harris
App Builder has released the second part of findings from its two-part 2025 App Development Trends Report. The new research reveals that close to 90% of tech leaders are using AI in app development––and they expect developers to have a skill set to match. Nearly three-fourths (71%) of tech leaders say AI and machine learning skills are now non-negotiables fo...
Llama approved for federal use as Meta expands AI reach
Wednesday, October 8, 2025 by Austin Harris
U.S. government agencies have been cleared to use Meta Platforms’ artificial intelligence system, Llama, signaling a broader adoption of commercial AI tools across federal operations. The General Services Administration (GSA) added Llama to its list of approved AI systems, ensuring that the technology meets federal security and legal standards.
Agencies can tes...
Russian airport hacked as St. Petersburg website reports cyberattack
Monday, October 6, 2025 by Trey Abbe
Pulkovo airport, the primary international gateway for St. Petersburg, reported that its official website had been compromised in a cyberattack. The airport serves millions of passengers annually, making secure digital operations essential for timely flight information and passenger services. Officials confirmed that the attack temporarily disrupted access to the websit...
Phishing sites seized by Microsoft in major crackdown
Tuesday, September 23, 2025 by Richard Harris
Microsoft has intensified its efforts to combat cybercrime by targeting Raccoon0365, a subscription-based phishing service that enabled wide-scale credential theft. Working through the U.S. District Court in Manhattan, the company successfully obtained approval to seize nearly 340 internet domains associated with fraudulent login pages.
The campaign represents one of...
Push for FTC to Investigate Microsoft
Monday, September 22, 2025 by Austin Harris
U.S. Senator Ron Wyden has formally requested the Federal Trade Commission to examine Microsoft for what he describes as significant cybersecurity shortcomings. The request cites repeated security incidents and raises questions about the company’s role in safeguarding critical infrastructure.
Senator highlights cybersecurity risks
In a letter addressed to FT...
Salesforce data breach linked to Tenable via Salesloft Drift
Friday, September 12, 2025 by Richard Harris
A recent Salesforce data breach involving the Salesloft Drift integration has affected multiple organizations, including cybersecurity company Tenable. The company confirmed that limited customer contact and support case data were exposed but emphasized that no core product data was compromised.
Scope of exposed information
Tenable reported that information access...
Hackers steal cryptocurrency using fake job offers report reveals
Tuesday, September 9, 2025 by Trey Abbe
A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...
Tea App cybersecurity incident update
Thursday, August 14, 2025 by Russ Scritchfield
The Tea App has issued an update regarding the cybersecurity incident that occurred on July 25, 2025. During the course of an ongoing investigation, it was discovered that some users’ direct messages (DMs) were accessed as part of the initial breach. As a precautionary measure, the company has disabled DM functionality and taken the affected system offline.
Tea...
Microsoft at Black Hat USA 2025
Monday, August 11, 2025 by Russ Scritchfield
Microsoft will participate in Black Hat USA 2025, scheduled for August 5-7 in Las Vegas, offering attendees a practitioner-driven experience centered on real-world threat intelligence, incident response, and applied AI expertise. The company emphasizes that cybersecurity is most effective when intelligence, tools, and domain expertise are tightly integrated. To that end...
KNP ransomware attack
Wednesday, August 6, 2025 by Russ Scritchfield
One of the UK's oldest transport companies, KNP Logistics Group, collapsed under the weight of a ransomware attack that began with a single guessed password. The company, founded in 1865 and known primarily through its “Knights of Old” fleet, had survived world wars, economic upheavals, and generational shifts in the freight industry. But it could not su...
CoinDCX launches bounty after security breach
Friday, August 1, 2025 by Richard Harris
CoinDCX, one of the largest cryptocurrency exchanges in India, has issued an official statement following a sophisticated security incident on July 19, 2025, which affected one of its internal operational accounts used solely for liquidity provisioning on a partner exchange. The company emphasized that no customer funds were impacted and that all assets remain secure in...
Microsoft SharePoint hit by widespread zero-day attacks
Wednesday, July 30, 2025 by Austin Harris
The Cybersecurity and Infrastructure Security Agency (CISA) has reported active exploitation of a newly identified remote code execution (RCE) vulnerability affecting on-premise Microsoft SharePoint servers. The vulnerability, cataloged as CVE-2025-53770, is a variant of the previously known CVE-2025-49706 and presents significant risks to organizations by enabling unau...
DOGE API key leak
Wednesday, July 23, 2025 by Austin Harris
Marko Elez, a 25-year-old employee at Elon Musk’s Department of Government Efficiency (DOGE), inadvertently exposed a private API key for xAI, Musk’s artificial intelligence company, in a public GitHub repository over the weekend. The leak granted potential access to over 50 large language models (LLMs) developed by xAI, raising serious concerns about operat...
McDonalds AI Hiring Bot Breach
Thursday, July 17, 2025 by Russ Scritchfield
Security researchers uncovered a critical vulnerability in McDonald’s AI-powered hiring system, McHire, revealing how a simple password flaw could have exposed applicant data, but importantly, no candidate information was leaked or made publicly available, and only five records were briefly accessed by researchers who responsibly reported the issue.
In a supers...
Cribl Copilot Editor brings AI-driven telemetry
Wednesday, June 18, 2025 by Richard Harris
Cribl announced Copilot Editor, an advancement in Cribl’s AI-powered telemetry management solution that significantly increases productivity for IT and security professionals, reduces manual effort, all while preventing critical errors through human-in-the-loop controls.
Copilot Editor uses AI to help IT and security teams more easily do schema mapping, t...
Index Engines wins prestigious industry recognitions
Wednesday, June 11, 2025 by Austin Harris
Cyber Resilience company Index Engines, announced that it received two major industry honors for its flagship product, CyberSense, recognizing the company’s innovation and impact in the cybersecurity space.
Index Engines received the 2025 Fortress Cybersecurity Award in the "Artificial Intelligence - Product or Service" category and was named a S...
Universities fighting cybercrime with students
Thursday, April 24, 2025 by Richard Harris
Universities, one of the most popular targets for cybercriminals, are employing a new tool in the fight against cybercrime, their own students.
Over the past few years, universities and colleges around the U.S. have been increasingly hiring students and training them to become analysts in their security operations centers, known as SOCs. Students work alongside...
Security trade-offs and Xs vulnerabilities
Friday, March 21, 2025 by Richard Harris
The latest cyberattack on X raises an important question: Was this an external attack or a result of internal instability? While hacktivist group Dark Storm has claimed responsibility for the distributed denial-of-service (DDoS) attack, it is just as crucial to examine X’s own security posture, particularly in light of the drastic staffing cuts that followed Elon ...
Red Hat Device Edge deployed to space station
Thursday, March 13, 2025 by Richard Harris
Red Hat, Inc. and Axiom Space, will collaborate on Axiom Space’s Data Center Unit-1 (AxDCU-1), targeted to launch in spring 2025 to the International Space Station. Powered by Red Hat Device Edge, the data processing prototype will conduct tests on the space station and demonstrate initial Orbital Data Center (ODC) capabilities.
The prototype will te...
AI virtual escape room challenge
Friday, March 7, 2025 by Austin Harris
Pangea recently announced the general availability of AI Guard and Prompt Guard to secure AI, defending against threats like prompt injection and sensitive information disclosure. Alongside the company’s existing AI Access Control and AI Visibility products, Pangea now offers the industry’s most comprehensive suite of guardrails to secure AI applications.&nb...
Cybersecurity in 2025
Tuesday, February 4, 2025 by Richard Harris
Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...
Cybersecurity supply chain risk management predictions for 2025
Thursday, January 16, 2025 by Austin Harris
DTS CEO and President Edward Tuorinsky shares his cybersecurity prediction for shaping the 2025 business landscape.
Cybersecurity in 2025 is like that party game where you whisper a phrase to the person next to you. One mistake is passed along to others, with funny outcomes. The stakes are higher, and the results are less amusing when data breaches or hacks travel al...
The rise of quantum computing in 2025
Tuesday, January 14, 2025 by Austin Harris
As we march towards the new year of 2025, it's incredible to see how many technologies once considered "emerging" are now on the brink of becoming mainstream.
2025: All About Movement
Raji Bezwada, CEO of JCS Solutions LLC, a premier provider of cybersecurity and technology services, examines 2025 trends and how government organizations can leverage ...
NetLib Security predictions 2025
Thursday, January 2, 2025 by Richard Harris
The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy rights. In many ways, this is a twist on the typical cybersecurity problem. Rather than a hacker or a bad actor breaking in to steal your data, we are being asked to hand our keys to the companies we often trust the most: Microsoft, Apple, Dropbox, and Google!
NetLib Secu...
API Security Perspectives 2025 report from Kong Inc
Monday, December 30, 2024 by Richard Harris
Kong Inc. released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report which highlights today’s API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern a...