Generative AI is moving from experimentation to everyday enterprise use, often faster than governance models were designed to support. As adoption accelerates, organizations are navigating the evolving landscape with new questions around security, data privacy, compliance, and control, all while…
Tenable unveils OT discovery engine to expose cyber-physical risks
Tenable unveiled a new OT asset discovery engine that enables security teams to bring risks associated with cyber-physical systems (OT, IoT, and shadow IT) into a unified view of cyber exposure. With instant deployment and no additional IT overhead required,…
Bitdefender extends GravityZone with continuous email threat protection
Bitdefender has launched GravityZone Extended Email Security, unifying email and endpoint protection in one platform. Built for organizations and MSPs, it uses an ICES approach to deliver continuous protection against modern email threats, including phishing, BEC, ransomware, impersonation, and insider…
MuddyWater-Style Hackers Probe 12,000+ Systems Ahead of Middle East
A threat group resembling MuddyWater has conducted a large-scale reconnaissance and intrusion operation targeting critical sectors in the Middle East, including aviation, energy, and government entities. The attackers reportedly scanned over 12,000 internet-facing systems before launching selective exploitation attempts that led to the confirmed theft…
Google, Microsoft, Meta Accused of Tracking Users Even After Privacy Opt-Out
A recent independent audit conducted by privacy technology firm webXray has revealed that major technology companies, including Google, Microsoft, and Meta, are actively tracking users who have explicitly opted out of data sharing. The findings suggest widespread, industrial-scale non-compliance with…
Top 10 Best Application Security Testing Companies in 2026
In the rapidly evolving digital landscape of 2026, applications are the backbone of every enterprise. From customer-facing web portals and mobile apps to intricate internal systems and APIs, software drives business operations, innovation, and customer engagement. However, this ubiquity also…
Top 10 Best API Security Providers Protecting Web Apps in 2026
In the intricate tapestry of the modern digital world, Application Programming Interfaces (APIs) are the invisible threads that connect everything. They power mobile applications, enable seamless third-party integrations, facilitate microservices communication, and drive the functionality of countless web applications. From…
AI Risk in Financial Services Starts at the Database
AI is accelerating database change in financial services. Learn why governance must extend to the database layer to protect data integrity and compliance. The post AI Risk in Financial Services Starts at the Database appeared first on Security Boulevard. This…
Axonius updates Asset Cloud with AI, exposure management, and asset trust standard
Axonius has expanded its Asset Cloud with AI-powered remediation in Axonius Exposures, added support for IoT and OT environments via Axonius Cyber-Physical Assets, and introduced a new data trust standard with Axonius Verified Assets. “Security environments have grown more distributed,…
Deterministic + Agentic AI: The Architecture Exposure Validation Requires
Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations to adopt it across operational and security functions. Pentera’s AI Security…
Nvidia launches Ising AI suite for quantum calibration
Nvidia has introduced Ising, a suite of open source quantum AI models designed to enhance the development and practical application of quantum processors. This article has been indexed from CyberMaterial Read the original article: Nvidia launches Ising AI suite for…
Cyberattacks on Manufacturing Sector Surge
The U.S. This article has been indexed from CyberMaterial Read the original article: Cyberattacks on Manufacturing Sector Surge
OpenAI Expands Cybersecurity AI Access
OpenAI has announced a significant expansion of its Trusted Access for Cyber (TAC) program, alongside the launch of GPT 5.4 Cyber, a model specifically designed for defensive cybersecurity applications. This article has been indexed from CyberMaterial Read the original article:…
$117.5M Comcast settlement after data breach
Comcast has reached a settlement agreement of $117.5 million in response to a data breach that compromised customer information. This article has been indexed from CyberMaterial Read the original article: $117.5M Comcast settlement after data breach
CISA Cancels CyberCorps Summer Internships
The Cybersecurity and Infrastructure Security Agency (CISA) has announced the cancellation of its summer internship programs for the CyberCorps: Scholarship for Service participants. This article has been indexed from CyberMaterial Read the original article: CISA Cancels CyberCorps Summer Internships
IT Security News Hourly Summary 2026-04-15 15h : 14 posts
14 posts were published in the last hour 12:34 : Threat landscape for industrial automation systems in Q4 2025 12:34 : Mirax RAT Targeting Android Users in Europe 12:34 : Capsule Security Emerges From Stealth to Secure AI Agents at…
Threat landscape for industrial automation systems in Q4 2025
The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and statistics by industry. This article has been indexed from Securelist Read the original article: Threat landscape for…
Mirax RAT Targeting Android Users in Europe
Offered as a MaaS to a small number of affiliates, mainly Russian speakers, the RAT can turn devices into residential proxy nodes. The post Mirax RAT Targeting Android Users in Europe appeared first on SecurityWeek. This article has been indexed…
Capsule Security Emerges From Stealth to Secure AI Agents at Runtime
Capsule Security emerges from stealth with a $7M seed round to launch a runtime security platform for AI agents. Featuring the open-source ClawGuard, the platform enforces governance and mitigates prompt injection risks like ShareLeak and PipeLeak without requiring SDKs or…
ShinyHunters Leak Rockstar Games Data, No Player Records Impacted
ShinyHunters hackers leak 7.54 GB of Rockstar Games data from Snowflake analytics systems, confirming no player records or personal information were exposed. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original…
Google Uses Rust-Based Firmware in Pixel 10 Modem to Improve Memory Safety
Google has officially integrated the memory-safe Rust programming language into the cellular baseband firmware of its Pixel 10 smartphones. According to a detailed technical breakdown published on the Google Online Security Blog on April 10, 2026, the engineering team has…
Mirax malware campaign hits 220K accounts, enables full remote control
Mirax, a new Android RAT, spread via Meta ads, infected 220,000 users and turns devices into SOCKS5 proxies, giving attackers full remote control. Mirax is a new Android remote access trojan spreading through ads on Meta platforms, targeting mainly Spanish-speaking…
Agentic LLM Browsers Expose New Attack Surface for Prompt Injection and Data Theft
Artificial intelligence is changing how people browse the internet. AI-powered browsers no longer just show web pages — they read content, take actions, and complete tasks for the user. These tools, called agentic LLM browsers, let users give simple commands…
Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails
Cybercriminals have found a quiet way to sit inside a corporate email account and read everything being sent and received — without the account owner ever knowing. Attackers are now abusing a built-in Microsoft 365 feature called mailbox rules to…