Tag: EN

India Withdraws Order For Mandatory Government App

India scraps order for smartphone makers to include non-removable cyber-security app after backlash over security, privacy This article has been indexed from Silicon UK Read the original article: India Withdraws Order For Mandatory Government App

Incode Deepsight targets deepfakes and synthetic identity threats

Incode has launched Deepsight, an AI defense tool that detects and blocks deepfakes, injected virtual cameras, and synthetic identity attacks. As AI systems increasingly interact and transact autonomously, the ability to instantaneously separate real people from AI-generated fakes becomes critical.…

CIS, Astrix, and Cequence partner on new AI security guidance

The Center for Internet Security, Astrix Security, and Cequence Security announced a strategic partnership to develop new cybersecurity guidance tailored to the unique risks of AI and agentic systems. This collaborative initiative builds on the CIS Critical Security Controls (CIS…

SandboxAQ launches AI-SPM platform to expose shadow AI risks

SandboxAQ announced an AI-SPM offering that provides visibility into where AI is being used in organizations’ tech stacks and evaluates AI assets for exploitable weaknesses, insecure dependencies, and exposure risks such as prompt injection, data leakage, and unauthorized access. The…

What CISOs should know about SOC modernization

<p>Legacy SOC infrastructure can’t keep pace with the modern threat landscape, leaving SecOps teams overwhelmed and underprepared to face increasingly sophisticated and frequent cyber threats. Security alerts and malicious actors eventually slip through the cracks, putting organizations at risk of…

AI vs. you: Who’s better at permission decisions?

A single tap on a permission prompt can decide how far an app reaches into a user’s personal data. Most of these calls happen during installation. The number of prompts keeps climbing, and that growing pressure often pushes people into…

Hackers Actively Exploit New Windows LNK 0-Day Vulnerability

A newly discovered security flaw in Windows shortcut files is being actively used by hackers to target diplomatic organisations. The vulnerability allows attackers to conceal malicious commands within shortcut files (.lnk), making them invisible to users. The Discovery and Initial…

Malicious VSCode Extension Deploys Anivia Loader and OctoRAT

In late November 2025, a sophisticated supply-chain attack leveraging the Visual Studio Code extension ecosystem came to light, demonstrating how threat actors are increasingly targeting developer tools to gain persistent access to high-value systems. On November 21, a malicious extension…