5 Best Practices for Bolstering Physical Access Security in Data Centers in 2025

While cybersecurity threats dominate discussions about data protection, physical access security remains a critical, often overlooked aspect of safeguarding data centers. Even the most advanced firewalls and encryption protocols cannot prevent a breach if unauthorized people can directly access servers, networking equipment, or storage devices. As data centers become increasingly …

Massive Cyberattack Exploits Legacy Windows Driver to Evade Detection 

Check Point Research (CPR) has uncovered a sophisticated cyber campaign leveraging a vulnerable Windows driver to disable security protections, evade detection, and deploy malicious payloads.  They identified a large-scale, ongoing attack campaign that abuses a legacy version of the Truesight.sys driver to disable endpoint detection and response (EDR) and antivirus …

Windows CE and ICS Security: A Ticking Time Bomb?

Windows CE, a decades-old operating system originally designed for embedded systems, remains a crucial component of industrial control systems (ICS) and supervisory control and data acquisition (SCADA) environments.  However, despite its widespread use in human-machine interfaces (HMI), kiosks, and even vehicle infotainment systems, its legacy nature presents significant cybersecurity risks.   …

The First International AI Safety Report: A Call to Action

The inaugural International AI Safety Report provides a comprehensive insight into General-purpose AI’s current state, future potential, and associated risks. General-purpose AI refers to AI models or systems that can perform a wide variety of tasks, as opposed to Specialized AI.  Synthesizing insights from over 90 independent international AI experts, …

Misconfigured Access Systems Expose Hundreds of Thousands of Employees and Organizations

Vast numbers of misconfigured Access Management Systems (AMS) across the globe are exposed to the public Internet, researchers from Internet Index Search Solution provider Modat have revealed.  The vulnerabilities, which span a wide range of industries—including critical sectors like construction, healthcare, oil, and government—have exposed hundreds of thousands of sensitive …

‘Auto-Color’ Linux Malware Uses Advanced Stealth Tactics to Evade Detection

Researchers at Palo Alto Networks have identified a new Linux malware strain dubbed Auto-Color, which uses cunning, advanced stealth techniques to slip through the security nets and maintain persistence on compromised systems.   The malware, first detected in early November last year, mainly targets universities and government offices across North America …

Expert Feature: Securing Passwords and Endpoints in the Age of AI

At a time when artificial intelligence (AI) is reshaping cybersecurity, conventional approaches to passwords and endpoint management are increasingly vulnerable. AI-powered threats are rapidly evolving, leveraging automation and deep learning to crack passwords, slip past authentication measures, and exploit weaknesses in endpoints at an unrivaled scale.   Entities that once relied …

Ghostwriter Campaign Targets Ukrainian Government and Belarusian Opposition 

Cybersecurity researchers at SentinelLABS have uncovered a new campaign linked to the long-running Ghostwriter operation, targeting Belarusian opposition activists and Ukrainian military and government entities.   The campaign, which entered its active phase in late 2024, is ongoing, with recent malware samples and command-and-control (C2) activity indicating continued threats.  A Persistent …

Trump’s Reckless NIST Purge Puts US Semiconductors, AI Safety at Risk 

The Trump administration is set to significantly weaken the CHIPS Act by terminating hundreds of employees at the National Institute of Standards and Technology (NIST), the agency responsible for administering the semiconductor incentive program.    President Biden signed the bipartisan CHIPS and Science Act two years ago, investing $53 billion to …

What’s Superalignment and Why Is It Critical to Address with AI Regulation in the U.S.?

AI has become stronger each year as more industries adopt this technology. Superintelligence is on the horizon, so industry professionals must be one step ahead through superalignment. How could U.S. regulations factor into the equation? Here’s what you should know about the future of AI. How Far Away Is Superintelligence? …