Tag: EN

IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)

Yesterday, in my diary about the scans for “/proxy/” URLs, I noted how attackers are using IPv4-mapped IPv6 addresses to possibly obfuscate their attack. These addresses are defined in RFC 4038. These addresses are one of the many transition mechanisms…

Tracebit Raises $20M for Cloud-Native Deception Technology

The company plans to scale its products, expand to new markets, and grow its marketing and engineering teams. The post Tracebit Raises $20M for Cloud-Native Deception Technology appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Chainguard locks down CI/CD with secure-by-default actions

Chainguard has announced Chainguard Actions, secure-by-default workflows for CI/CD pipelines that allow developers and AI agents to ship quickly without introducing software supply chain risk. Using an agentic approach, Chainguard Actions provides a continuously secured catalog of workflows maintained by…

Imprivata enhances NHS access security with passwordless controls

Imprivata has introduced new capabilities designed to help NHS organisations and UK healthcare providers meet the unique demands of the UK’s evolving compliance, cybersecurity, data protection landscape, including the Cyber Assessment Framework (CAF)-aligned Data Security and Protection Toolkit (DSPT) and…

Veritone secures AI data with automated PII removal

Veritone deploys Veritone Redact with Veritone Data Refinery (VDR) to remove personally identifiable information (PII) and sensitive data before processing, enabling AI-ready data while protecting intellectual property (IP) and data owner rights. As the scale and stakes for AI deployments…

China’s Hua Hong Develops 7nm Process For AI Chips

Hua Hong reportedly becomes second chip manufacturer in China to achieve advanced 7nm process capable of producing AI accelerator chips This article has been indexed from Silicon UK Read the original article: China’s Hua Hong Develops 7nm Process For AI…

CISA Flags Year-Old Wing FTP Vulnerability as Exploited

Tracked as CVE-2025-47813, the flaw leads to the disclosure of the full local installation path of the application. The post CISA Flags Year-Old Wing FTP Vulnerability as Exploited appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Jozu Agent Guard targets AI agents that evade controls

Jozu has announced the launch of Jozu Agent Guard, a zero-trust AI runtime that executes agents, models, and MCP servers in secure environments with built-in policy enforcement and guardrails that cannot be disabled. As enterprises adopt AI agents, MCP servers,…

Proofpoint addresses AI threats with intent-based security

Proofpoint has announced Proofpoint AI Security, the newest security solution that combines intent-based detection, multi-surface control points, and a comprehensive implementation framework to secure how humans and AI agents use AI across the enterprise. Based on the Agent Integrity Framework,…