BlinkOps has announced a Series B funding round that brings the total raised by the company for its micro-agents builder to $90 million. The post BlinkOps Raises $50 Million for Agentic Security Automation Platform appeared first on SecurityWeek. This article…
Tag: securityweek
Legion Emerges From Stealth With $38 Million in Funding
Legion has raised $38 million in seed and Series A funding for its browser-native AI Security Operations Center (SOC) platform. The post Legion Emerges From Stealth With $38 Million in Funding appeared first on SecurityWeek. This article has been indexed…
Palo Alto Networks to Acquire CyberArk for $25 Billion
Strategic acquisitions marks Palo Alto Networks’ formal entry into Identity Security space and accelerates its platform strategy. The post Palo Alto Networks to Acquire CyberArk for $25 Billion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics
Multiple financially motivated threat actors are targeting backup systems and employing Scattered Spider’s social engineering techniques. The post Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Telecom Giant Orange Hit by Cyberattack
Orange was targeted by hackers in an attack that resulted in the disruption of services offered to corporate and individual customers. The post Telecom Giant Orange Hit by Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Cyata Emerges From Stealth With $8.5 Million in Funding
The Israeli startup helps organizations identify, monitor, and control AI agents across their environments. The post Cyata Emerges From Stealth With $8.5 Million in Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Minnesota Activates National Guard in Response to Cyberattack
Minnesota Governor Tim Walz called in the National Guard to assist the City of Saint Paul in responding to a cyberattack. The post Minnesota Activates National Guard in Response to Cyberattack appeared first on SecurityWeek. This article has been indexed…
Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications
Base44 owner Wix quickly patched a critical authentication bypass vulnerability discovered by researchers at Wiz. The post Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report
The global average cost of a breach fell to $4.44 million (the first decline in five years), but the average US cost rose to a record $10.22 million. The post Cost of Data Breach in US Rises to $10.22 Million,…
Tonic Security Launches With $7 Million in Seed Funding
Tonic Security has emerged from stealth mode to tackle the complexity of exposure and vulnerability management. The post Tonic Security Launches With $7 Million in Seed Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Apple Patches Safari Vulnerability Flagged as Exploited Against Chrome
Tracked as CVE-2025-6558, the flaw was found in Chrome’s ANGLE and GPU components and was flagged as exploited by Google TAG. The post Apple Patches Safari Vulnerability Flagged as Exploited Against Chrome appeared first on SecurityWeek. This article has been…
Axonius Acquires Medical Device Security Firm Cynerio in $100 Million Deal
Axonius has acquired Cynerio for $100 million in cash and stock to accelerate its expansion into the healthcare market. The post Axonius Acquires Medical Device Security Firm Cynerio in $100 Million Deal appeared first on SecurityWeek. This article has been…
Tea App Takes Messaging System Offline After Second Security Issue Reported
Tea has said about 72,000 images were leaked online in the initial incident, and another 59,000 images publicly viewable in the app from posts, comments and direct messages were also accessed. The post Tea App Takes Messaging System Offline After…
Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment
Vulnerabilities discovered by Binarly in Lenovo devices allow privilege escalation, code execution, and security bypass. The post Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Lenovo…
Seal Security Raises $13 Million to Secure Software Supply Chain
The open source security firm will use the investment to enhance go-to-market efforts and accelerate platform expansion. The post Seal Security Raises $13 Million to Secure Software Supply Chain appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Promptfoo Raises $18.4 Million for AI Security Platform
Promptfoo has raised $18.4 million in Series A funding to help organizations secure LLMs and generative AI applications. The post Promptfoo Raises $18.4 Million for AI Security Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Dropzone AI Raises $37 Million for Autonomous SOC Analyst
Dropzone AI has announced a Series B funding round led by Theory Ventures to boost its AI SOC solution. The post Dropzone AI Raises $37 Million for Autonomous SOC Analyst appeared first on SecurityWeek. This article has been indexed from…
Sploitlight: macOS Vulnerability Leaks Sensitive Information
The TCC bypass could expose information cached by Apple Intelligence, including geolocation and biometric data. The post Sploitlight: macOS Vulnerability Leaks Sensitive Information appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Sploitlight: macOS…
Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT
The need for secure encryption in IoT and IIoT devices is obvious, and potentially critical for OT and, by extension, much of the critical infrastructure. The post Order out of Chaos – Using Chaos Theory Encryption to Protect OT and…
From Ex Machina to Exfiltration: When AI Gets Too Curious
From prompt injection to emergent behavior, today’s curious AI models are quietly breaching trust boundaries. The post From Ex Machina to Exfiltration: When AI Gets Too Curious appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…