Category: EN

Augmented Empathy: How AI is Redefining Human-Centric CX (Part 1)

Explore how AI is powering emotion-aware CX, enabling hyper-personalisation, and supporting humans to create more empathetic customer experiences. This article has been indexed from Silicon UK Read the original article: Augmented Empathy: How AI is Redefining Human-Centric CX (Part 1)

Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations

The Post SMTP email delivery WordPress plugin is affected by a critical vulnerability and half of websites using it remain unpatched. The post Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations appeared first on SecurityWeek. This article…

Why this $300 Lenovo is the tablet I recommend to most people – including iPad users

The Lenovo Idea Tab Pro stands out as one of the best midrange Android tablets I’ve reviewed this year, with its competitive price and useful features. This article has been indexed from Latest news Read the original article: Why this…

I replaced my Apple Watch with the Samsung Galaxy Watch 8 for a week – and didn’t mind it

The new Samsung Galaxy Watch 8 is an innovative fitness tracker that I’d recommend to most people – even if a few features are a little convoluted. This article has been indexed from Latest news Read the original article: I…

My search for the ultimate car charger is over – and this one has a flexible superpower

The PrimeTrip VR2 Max is hands down the most impressive car charger I’ve tested yet. Here’s what makes it stand out. This article has been indexed from Latest news Read the original article: My search for the ultimate car charger…

Bitcoin Encryption Faces Future Threat from Quantum Breakthroughs

  In light of the rapid evolution of quantum computing, it has become much more than just a subject for academic curiosity—it has begun to pose a serious threat to the cryptographic systems that secure digital currencies such as Bitcoin,…

Leak Zone Dark Web Forum Breach Exposes 22 Million User IPs and Locations

A significant data breach has exposed sensitive information about users of Leakzone, a prominent dark web forum known for trading hacking tools and compromised accounts. Security firm UpGuard discovered an unprotected Elasticsearch database containing approximately 22 million web request records,…

SHUYAL Emerges: Stealing Login Credentials from 19 Major Browsers

A sophisticated new information stealer named SHUYAL was recently discovered by Hybrid Analysis. It has demonstrated extensive capabilities in credential extraction from 19 different web browsers, including popular ones like Google Chrome, Microsoft Edge, Opera, Brave, and Yandex, as well…

NASCAR announces breach, Plankey for CISA, 365 Admin outage

NASCAR announces data breach following March cyberattack Plankey appears to be on track to lead CISA Microsoft investigates another outage affecting 365 admin center Huge thanks to our sponsor, Dropzone AI Today’s sponsor is Dropzone AI, the leader in AI-powered…

Amazon AI Tool Hacked, Scattered Spider Attacks VMware, and Major Ransomware Takedown | Cybersecurity Today

In this episode of Cybersecurity Today, host David Shipley covers several key incidents impacting the cybersecurity landscape. Amazon’s generative AI coding assistant ‘Q’ was compromised by a hacker who injected data-wiping code into the tool’s GitHub repository. Scattered Spider, a…

LG Innotek Camera Flaws Could Give Hackers Full Admin Access

A critical security vulnerability has been discovered in LG Innotek’s LNV5110R CCTV camera model that could allow remote attackers to gain complete administrative control over affected devices. The vulnerability, designated as CVE-2025-7742, represents a significant authentication bypass flaw that poses…

New “ToolShell” Exploit Targets SharePoint Servers for Full Takeover

FortiGuard Labs has identified a critical new exploit chain dubbed “ToolShell” that is actively being used by multiple threat actors to target on-premises Microsoft SharePoint servers. This sophisticated attack combines two previously patched vulnerabilities with two fresh zero-day variants to…

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America. “The group’s core tactics have remained consistent and do not rely on software exploits. Instead, they…

Critical Salesforce Tableau Flaws Allow Remote Code Execution – Patch Immediately!

Salesforce has disclosed a series of critical security vulnerabilities in its Tableau Server platform that could allow attackers to execute remote code and gain unauthorized access to production databases. The vulnerabilities, announced on June 26, 2025, affect multiple versions of…

Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely

Multiple critical security vulnerabilities affecting Salesforce’s Tableau Server that could allow attackers to execute remote code, bypass authorization controls, and access sensitive production databases.  The vulnerabilities, revealed through a security advisory published on June 26, 2025, impact Tableau Server versions…

Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm

An Arizona woman received a significant federal prison sentence for orchestrating a sophisticated cybercrime operation that enabled North Korean Information Technology (IT) workers to infiltrate hundreds of American companies while generating millions in revenue for the Democratic People’s Republic of…

Your supply chain security strategy might be missing the biggest risk

Third-party involvement in data breaches has doubled this year from 15 percent to nearly 30 percent. In response, many organizations have sharpened their focus on third-party risk management, carefully vetting the security practices of their vendors. However, a critical gap…

The legal minefield of hacking back

In this Help Net Security interview, Gonçalo Magalhães, Head of Security at Immunefi, discusses the legal and ethical implications of hacking back in cross-border cyber incidents. He warns that offensive cyber actions risk violating international law, escalating conflicts, and harming…

Critical Salesforce Flaws Allow Remote Code Execution – Patch Immediately!

Salesforce has disclosed a series of critical security vulnerabilities in its Tableau Server platform that could allow attackers to execute remote code and gain unauthorized access to production databases. The vulnerabilities, announced on June 26, 2025, affect multiple versions of…

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application, from user input to server output. This helps it spot complex, multi-step vulnerabilities that traditional…

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide

Cybersecurity researchers have discovered over a dozen security vulnerabilities impacting Tridium’s Niagara Framework that could allow an attacker on the same network to compromise the system under certain circumstances. “These vulnerabilities are fully exploitable if a Niagara system is misconfigured,…

How to fight document fraud with the latest tech tools

In this Help Net Security video, Thomas Berndorfer, CEO of Connecting Software, explores cutting-edge technologies designed to detect and prevent document forgery and digital fraud. He presents four key approaches to verifying document authenticity: IDVT, PKI, AI-based methods, and blockchain,…

ISC Stormcast For Monday, July 28th, 2025 https://isc.sans.edu/podcastdetail/9544, (Mon, Jul 28th)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Monday, July 28th, 2025…

US spy satellite agency breached, but insists no classified secrets spilled

Plus, leak site for BlackSuit seized, Tea spilt, and avoid crime if you’ve got a famous dad Infosec in brief  A computer intrusion hit the US spy satellite agency, but officials insist no classified secrets were lost – just some…

Interlock Ransomware Targets Healthcare in Stealth Attacks, Say U.S. Cyber Agencies

Federal agencies warn of rising Interlock ransomware attacks targeting healthcare and critical sectors using double extortion and advanced social engineering. The post Interlock Ransomware Targets Healthcare in Stealth Attacks, Say U.S. Cyber Agencies appeared first on eSecurity Planet. This article…

Arizona Woman Jailed for Helping North Korea in $17M IT Job Scam

Arizona woman jailed 8.5 years for aiding North Korea’s $17 million IT job scam, defrauding over 300 US companies. Learn how to protect your business from such sophisticated cybersecurity threats. This article has been indexed from Hackread – Latest Cybersecurity,…

Wi-Fi Routers Can Now Sense Movement — What That Means for You

  Your Wi-Fi router might be doing more than just providing internet access. New technology is allowing these everyday devices to detect movement inside your home without using cameras or microphones. While this might sound futuristic, it’s already being tested…

Allianz Life data breach exposed the data of most of its 1.4M customers

Allianz Life data breach exposed data of most of 1.4M customers via third-party CRM hack using social engineering. Allianz Life confirmed a data breach exposing personal information of most of its 1.4 million customers. On July 16, 2025, a threat…

Weekly Cybersecurity News Recap : Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks

Welcome to this week’s Cybersecurity Recap. We’re looking at important updates from July 21-27, 2025, in the world of digital threats and defenses. This week has seen significant developments that highlight the ongoing risks of cyber attacks and the need…

AI-Powered Malware ‘LameHug’ Attacks Windows PCs via ZIP Files

  Cybersecurity researchers have discovered a new and alarming trend in the world of online threats: “LameHug”. This malicious program distinguishes out because it uses artificial intelligence, notably large language models (LLMs) built by companies such as Alibaba.  LameHug, unlike…

UK Army Probes Leak of Special Forces Identities in Grenadier Guards Publication

  The British Army has initiated an urgent investigation following the public exposure of sensitive information identifying members of the UK Special Forces. General Sir Roly Walker, Chief of the General Staff, has directed a comprehensive review into how classified…

Allianz Life Insurance Data Breach – 1.4 Million Customers’ Data at Risk

Major U.S. insurance provider Allianz Life Insurance Company confirmed on Saturday that hackers compromised the personal information of the “majority” of its 1.4 million customers following a sophisticated cyberattack on July 16, 2025. The breach, disclosed in a mandatory filing…

SharePoint Exploit Emerges as Root of Global Cyber Threat

  A global cybersecurity crisis has been triggered by a newly discovered and unpatched vulnerability in Microsoft SharePoint Server, prompting the Governments of the United States, Canada, and Australia to conduct urgent investigations. In what experts are calling a coordinated…

I found cheap accessories that made my AirTags twice as useful (and secure)

AirTags are the top tracking tags on the market right now, and these unique holders make them far more practical to carry despite their quirky UFO-like shape. This article has been indexed from Latest news Read the original article: I…

I spent a weekend with Meta’s new Oakley smart glasses – they beat my Ray-Bans in every way

Meta’s new Oakley smart glasses offer an impressive eight hours of battery life and can record 3K video, all while maintaining a stylish design. This article has been indexed from Latest news Read the original article: I spent a weekend…

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft pins on-prem SharePoint attacks on Chinese threat actors As Microsoft continues to update its customer guidance for protecting on-prem SharePoint servers against the latest…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict Uncovering a Stealthy WordPress Backdoor in mu-plugins      NPM…

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Law…

Allianz Life Insurance Data Breach – 1.4 Million Customers Data at Risk

Major U.S. insurance provider Allianz Life Insurance Company confirmed on Saturday that hackers compromised the personal information of the “majority” of its 1.4 million customers following a sophisticated cyberattack on July 16, 2025. The breach, disclosed in a mandatory filing…

Stop! Don’t Let That AI App Spy on Your Inbox, Photos, and Calls

  Artificial intelligence is now part of almost everything we use — from the apps on your phone to voice assistants and even touchscreen menus at restaurants. What once felt futuristic is quickly becoming everyday reality. But as AI gets…

AI-Driven Phishing Threats Loom After Massive Data Breach at Major Betting Platforms

  A significant data breach impacting as many as 800,000 users from two leading online betting platforms has heightened fears over sophisticated phishing risks and the growing role of artificial intelligence in exploiting compromised personal data. The breach, confirmed by…

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

An international law enforcement operation seized the dark web data leak site of the BlackSuit ransomware group. A banner on the BlackSuit ransomware group’s TOR data leak sites informs visitors that they were seized by U.S. Homeland Security Investigations in…

Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack

Exclusive: Allianz Life said the “majority” of its customers and employees had data stolen in the July cyberattack. The company said it has notified the FBI. This article has been indexed from Security News | TechCrunch Read the original article:…

Congress tries to outlaw AI that jacks up prices based on what it knows about you

Surveillance-based pricing? Two lawmakers say enough Two Democratic members of Congress, Greg Casar (D-TX) and Rashida Tlaib (D-MI,) have introduced legislation in the US House of Representatives to ban the use of AI surveillance to set prices and wages.… This…

Security Alert as Malware Campaign Hits Widely Used E-commerce CMS

It has been discovered that a malicious program has been launched, posing a serious threat to thousands of online retailers worldwide, as it exploits vulnerabilities in widely used content management systems. According to security researchers, the attack primarily targets platforms…

Chinese Hacker Group Salt Typhoon Breaches U.S. National Guard Network for Nine Months

  An elite Chinese cyber-espionage group known as Salt Typhoon infiltrated a U.S. state’s Army National Guard network for nearly nine months, according to a classified Pentagon report revealed in a June Department of Homeland Security (DHS) memo. The memo,…

Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware

Gaming peripheral manufacturer Endgame Gear has disclosed a security incident involving malware-infected software distributed through their official website, affecting users who downloaded the OP1w 4k v2 mouse configuration tool between June 26 and July 9, 2025. The company has issued…

The best gaming speakers of 2025: Expert tested from SteelSeries and more

I teamed up with other ZDNET experts to test the best gaming speakers, from SteelSeries to Logitech, to help you level up your setup without breaking your budget. This article has been indexed from Latest news Read the original article:…

Researchers Expose Massive Online Fake Currency Operation in India

Cybersecurity researchers at CloudSEK’s STRIKE team used facial recognition and GPS data to expose a massive, over $2… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Researchers Expose…

You can download iOS 26 public beta right now – how to install (and which iPhones support it)

The iPhone’s public beta brings one of the boldest iOS redesigns yet. Here’s how to install it and see it in action for yourself. This article has been indexed from Latest news Read the original article: You can download iOS…

Muddled Libra: From Social Engineering to Enterprise-Scale Disruption

Unit 42’s latest research reveals how Muddled Libra (AKA Scattered Spider) has transformed into teams that pose risks to organizations worldwide. The post Muddled Libra: From Social Engineering to Enterprise-Scale Disruption appeared first on Palo Alto Networks Blog. This article…

Researchers Expose Online Fake Currency Operation in India

Cybersecurity researchers at CloudSEK’s STRIKE team used facial recognition and GPS data to expose a massive, over $2… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Researchers Expose…

How logic can help AI models tell more truth, according to AWS

Linking AI models to formal verification methods can correct LLM shortcomings such as false assertions. Amazon’s Byron Cook explains the promise of automated reasoning. This article has been indexed from Latest news Read the original article: How logic can help…

I tested the best video editing laptops in 2025: Here’s what I recommend for your next project

I tested the best video editing laptops of 2025 to find the top machines for 4K workflows, creative projects, and professional post-production. This article has been indexed from Latest news Read the original article: I tested the best video editing…

Blame a leak for Microsoft SharePoint attacks, researcher insists

MAPP program to blame? A week after Microsoft told the world that its July software updates didn’t fully fix a couple of bugs, which allowed miscreants to take over on-premises SharePoint servers and remotely execute code, researchers have assembled much…

Infamous BreachForums Is Back Online With All Accounts and Posts Restored

BreachForums, the notorious cybercrime discussion board that vanished from the clearnet after a law-enforcement seizure in, quietly re-opened this week under its original administrators and with the entire historical archive of user accounts, posts, and private messages intact. The unexpected…

Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware

Gaming peripheral manufacturer Endgame Gear has confirmed that hackers successfully compromised its official software distribution system, using the company’s OP1w 4K V2 mouse configuration tool to spread dangerous Xred malware to unsuspecting customers for nearly two weeks. The security breach,…

20 Best SNMP Monitoring Tools in 2025

SNMP (Simple Network Management Protocol) monitoring tools are essential for managing and monitoring network devices. They collect and organize information from various network devices, such as routers, switches, servers, and printers. These tools provide real-time data on device performance, network…

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

Arizona woman gets 8 years for helping North Korea-linked threat actors to infiltrate 309 U.S. firms with fake IT jobs. Christina Marie Chapman (50) from Arizona, was sentenced to 102 months in prison for aiding North Korean IT workers in…

Microsoft Investigates Leak in Early Warning System Used by Chinese Hackers to Exploit SharePoint Vulnerabilities

Chinese laws requiring vulnerability disclosure to the government create transparency issues and potential conflicts for international cybersecurity efforts. Microsoft is probing whether a leak from its confidential early warning system enabled Chinese state-sponsored hackers to exploit significant flaws in its…

Own a OnePlus phone? I changed 10 settings to significantly improve the user experience

Are you making the most of your OnePlus device? Tweaking these settings and features should give it a noticeable performance boost. This article has been indexed from Latest news Read the original article: Own a OnePlus phone? I changed 10…

Arizona Woman Sentenced for Aiding North Korean IT Workers in Cyber Operations

Christina Marie Chapman, a 50-year-old Arizona woman, has been sentenced to 102 months in prison for her role in an elaborate fraud scheme that helped North Korean IT workers pose as U.S. citizens to obtain remote positions at over 300…

The best password managers for Android of 2025: Expert tested

My favorite password managers for Android provide secure and streamlined logins, safe credential storage, encrypted sharing, passkey support, and more. This article has been indexed from Latest news Read the original article: The best password managers for Android of 2025:…

I tested Panasonic’s new affordable LED TV model – here’s my brutally honest buying advice

Panasonic’s W70B series offers a budget-friendly TV experience and is one of the lightest models I’ve ever set up. But is that enough to win you over? This article has been indexed from Latest news Read the original article: I…

Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Microsoft Corp. is investigating whether a leak from its Microsoft Active Protections Program (MAPP) enabled Chinese state-sponsored hackers to exploit critical SharePoint vulnerabilities before patches were fully deployed, according to sources familiar with the matter. The investigation comes as cyber…

Finally, a Bluetooth speaker that sounds great and is built to last

The Bose SoundLink Max is a portable speaker with great battery life, true sound clarity, plenty of loudness, and a durable design. This article has been indexed from Latest news Read the original article: Finally, a Bluetooth speaker that sounds…

This 4K projector changed the way I watch TV at home (no keystone adjustment needed)

Jmgo’s N1S Ultimate 4K projector is a high-end flagship capable of casting a massive 180-inch image – provided you’ve got the wall space to match. This article has been indexed from Latest news Read the original article: This 4K projector…

New VOIP-Based Botnet Attacking Routers Configured With Default Password

A sophisticated global botnet campaign targeting VOIP-enabled routers and devices configured with default credentials.  The discovery began when analysts noticed an unusual cluster of malicious IP addresses concentrated in rural New Mexico, leading to the identification of approximately 500 compromised…

SharePoint under fire: ToolShell attacks hit organizations worldwide

The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks This article has been indexed from WeLiveSecurity Read the original article: SharePoint under fire: ToolShell…

Cisco Patches Three Critical Vulnerabilities – Here are the Products Affected

Three separate vulnerabilities impact Cisco’s identity services. All have been patched. The post Cisco Patches Three Critical Vulnerabilities – Here are the Products Affected appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…

Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated July 25)

Unit 42 has observed active exploitation of recent Microsoft SharePoint vulnerabilities. Here’s how you can protect your organization. The post Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated July 25) appeared first on Unit 42. This article has been…

BreachForums Resurfaces on Original Dark Web (.onion) Address

BreachForums resurfaces on its original .onion domain amid law enforcement crackdowns, raising questions about its admin, safety and future. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: BreachForums…

Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

Threat actors exploit SharePoint flaws to access internal systems, steal sensitive data, and carry out surveillance, impersonation, and extortion. This article has been indexed from Security | TechRepublic Read the original article: Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

Operation CargoTalon targets Russia’s aerospace and defense sectors with EAGLET malware, using TTN documents to exfiltrate data. SEQRITE Labs researchers uncovered a cyber-espionage campaign, dubbed Operation CargoTalon, targeting Russia’s aerospace and defense sectors, specifically Voronezh Aircraft Production Association (VASO), via malicious…

The Ηоmоgraph Illusion: Not Everything Is As It Seems

A subtle yet dangerous email attack vector: homograph attacks. Threat actors are using visually similar, non-Latin characters to bypass security filters. The post The Ηоmоgraph Illusion: Not Everything Is As It Seems appeared first on Unit 42. This article has…

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

Hundreds of LG LNV5110R cameras are affected by an unpatched auth bypass flaw that allows hackers to gain admin access. US Cybersecurity and Infrastructure Security Agency warns that hundreds of LG LNV5110R cameras are impacted by an unpatched authentication bypass…

The best Android phones of 2025: Expert tested and reviewed

The top Android phones we’ve evaluated feature vibrant and clear displays, extended battery life, a flexible camera system, and distinctive hardware capabilities. This article has been indexed from Latest news Read the original article: The best Android phones of 2025:…

Week in Review: Aruba’s hardcoded passwords, Clorox wipes supplier’s mess, AI tool deletes everything

Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Nudge Security Nudge Security discovers new apps,…

CoSyn: The open-source tool that’s making GPT-4V-level vision AI accessible to everyone

Researchers at the University of Pennsylvania and the Allen Institute for Artificial Intelligence have developed a groundbreaking tool that allows open-source AI systems to match or surpass the visual understanding capabilities of proprietary models like GPT-4V and Gemini 1.5 Flash,…

Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide

Microsoft is currently facing an outage that affects the Microsoft 365 Admin Center, preventing administrators from accessing essential management tools. The issue, which emerged prominently on July 24, 2025, has persisted into the following day, marking the second such incident…

Operation Checkmate: BlackSuit Ransomware’s Dark Web Domains Seized

International law enforcement agencies, including the FBI and Europol, have successfully seized the infrastructure of the notorious BlackSuit ransomware gang in Operation Checkmate. This article details the takedown, BlackSuit’s origins, and the ongoing fight against evolving cyber threats. This article…

11 IoT security challenges and how to overcome them

<p>From smartwatches to smart streetlights, smart home devices to smart manufacturing, the internet of things has revolutionized how people and organizations operate, improving efficiencies and optimizing processes.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

Senator to Google: Give us info from telco Salt Typhoon probes

AT&T and Verizon refused to hand over the security assessments, says Cantwell US Senator Maria Cantwell (D-WA) has demanded that Google-owned incident response firm Mandiant hand over the Salt Typhoon-related security assessments of AT&T and Verizon that, according to the…