Tag: EN

Cybersecurity M&A Roundup: 40 Deals Announced in September 2025

Significant cybersecurity M&A deals announced by Check Point, CrowdStrike, F5, Mitsubishi Electric, and SentinelOne.  The post Cybersecurity M&A Roundup: 40 Deals Announced in September 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Discord Reveals Data Breach Following Third-Party Compromise

Discord said a third-party customer services provider was compromised to access user data, with the attackers aiming to extort a financial ransom This article has been indexed from www.infosecurity-magazine.com Read the original article: Discord Reveals Data Breach Following Third-Party Compromise

From Ransom to Revenue Loss

Discover how ransomware attacks go beyond ransom payments, impacting your company’s bottom line through recovery costs, lost revenue and damaged trust. The post From Ransom to Revenue Loss appeared first on Palo Alto Networks Blog. This article has been indexed…

Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk

A sophisticated cyberattack has compromised Red Hat Consulting’s infrastructure, potentially exposing sensitive data from over 5,000 enterprise customers worldwide. The breach, executed by the extortion group Crimson Collective, has raised serious concerns about the security of critical business documentation and…

AI-Enabled Influence Operation Against Iran

Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel. Key Findings A coordinated network of more than 50 inauthentic X profiles is conducting an AI-enabled influence operation. The network, which we refer…

Filigran Raises $58 Million in Series C Funding

The company plans to expand to new markets, fuel the development of a new module for its platform, and accelerate AI integration. The post Filigran Raises $58 Million in Series C Funding appeared first on SecurityWeek. This article has been…

Understanding Eye Vein Biometrics

Explore eye vein biometrics for authentication. Learn about its technology, security, development aspects, and how it compares to passwordless authentication methods. The post Understanding Eye Vein Biometrics appeared first on Security Boulevard. This article has been indexed from Security Boulevard…