Category: EN

France Blames Russia for Cyberattacks on Dozen Entities

France says the Russian state-sponsored group APT28 is responsible for targeting or compromising a dozen French entities. The post France Blames Russia for Cyberattacks on Dozen Entities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Frontegg releases identity management platform for AI agent builders

Frontegg launched Frontegg.ai, an identity management platform purpose-built for developers building AI agents. As AI agents move beyond experiments to becoming critical internal and market-facing enterprise products, secure, scalable identity infrastructure becomes essential to achieve market-readiness. While standards like Anthropic’s…

JPMorgan CISO Urges SaaS Security Reset

JPMorgan’s CISO has argued that SaaS apps represent a growing risk to businesses, “quietly enabling cyber attackers” This article has been indexed from www.infosecurity-magazine.com Read the original article: JPMorgan CISO Urges SaaS Security Reset

CISA Warns SAP 0-day Vulnerability Exploited in the Wild

CISA has added a critical SAP NetWeaver vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on April 29, 2025.  The zero-day flaw, tracked as CVE-2025-31324, carries a maximum CVSS score of 10.0 and has been actively exploited in the wild…

WhatsApp Introduces AI Tools With Promise of Full Message Secrecy

WhatsApp, the world’s largest messaging platform, has announced a major leap in privacy-preserving artificial intelligence (AI) with the introduction of its new “Private Processing” system.  This technology enables users to access advanced AI features-such as message summarization and writing suggestions-while…

Hackers Leveraging GetShared to Deploy Malware Bypassing Defenses

Cybercriminals have discovered a new attack vector utilizing the legitimate file-sharing service GetShared to distribute malware and conduct phishing campaigns. This emerging threat allows attackers to circumvent traditional email security measures by exploiting the trusted status of notifications from recognized…