Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cybersecurity Clear Filter

HackEthix 2025: Training Kerala’s Next Generation of Cyber Defenders

The IEEE Student Branch of Mohandas College of Engineering and Technology (MCET) brought the tech community together with HackEthix 2025. The July 19, 2025, event at the MCET campus in Trivandrum was Kerala’s largest one-day cybersecurity workshop championed by the Computer Society Chapter Grant Initiative. It’s a crucial first step in training and equipping the next generation of cyber professionals. Cybersecurity already faces a talent shortage and skills gap. Global security job vacancies gr

Cybersecurity provider Netskope boosts IPO range as it tests tech hot streak

Sanjay Beri, CEO and founder of Netskope Inc., listens during a Bloomberg West television interview in San Francisco, California. Netskope is targeting a $7.3 billion valuation in its upcoming initial public offering, after lifting its planned price range. The cybersecurity company said it plans to sell 47.8 million shares at between $17 and $19 apiece. The deal would raise as much as $908 million at the top end. That's up from a previous range of $15 to $17 a share the company revealed in a

Cybersecurity provider Netskope boosts IPO range as it tests tech hotstreak

Sanjay Beri, chief executive officer and founder of Netskope Inc., listens during a Bloomberg West television interview in San Francisco, California. Netskope is targeting a $7.3 billion valuation in its upcoming initial public offering, after lifting its planned price range. The cybersecurity company said it plans to sell 47.8 million shares at between $17 and $19 apiece. The deal would raise as much as $908 million at the top end. That's up from a previous range of $15 to $17 a share the co

Crowdstrike and Meta just made evaluating AI security tools easier

fotograzia/Moment via Getty Images Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways AI is both a cybersecurity threat and a solution. Benchmarks will test LLMs for real-world cybersecurity tasks. The suite could help developers build better models. Overwhelmed with cybersecurity tool options? A new set of benchmark tests aims to help you evaluate them and find the right ones for you. Also: Navigating AI-powered cyber threats in 2025: 4 expert security tips for b

Computing’s Top 30: Nipun Jaswal

To keep his edge, international cybersecurity expert Nipun Jaswal does more than stay up on current security threats and trends; he literally keeps his hands in the game, regularly coding—in up to 10 different languages—and doing lab work including exploring attack vectors and hunkering down with disassemblers and debuggers. Remaining “deeply technical” is not just part of his practice, it’s also fundamental to his leadership philosophy, which centers on staying curious and “close to the core o

Ex-Meta employee files whistleblower suit for alleged security flaws at WhatsApp

An ex-Meta employee sued the social media company on Monday over allegations that its WhatsApp messaging service contained "systemic cybersecurity failures" that potentially compromise user privacy. Attaullah Baig, WhatsApp's former head of security, alleged that Meta retaliated against him after he notified leaders, including CEO Mark Zuckerberg, of security issues at the messaging app. The suit, filed in U.S. District Court for the Northern District of California, claims that after joining W

Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now “With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities,” states Forrester’s 2026 Budget Planning Guide, revealing a fundamental shift in how organizations allocate cybersecurity resources. Software now commands 40% of cybersecurity spending, exceeding har

Elastic rejects claims of a zero-day RCE flaw in Defend EDR

Enterprise search and security company Elastic is rejecting reports of a zero-day vulnerability impacting its Defend endpoint detection and response (EDR) product. The company's statement follows a blog post from a company called AshES Cybersecurity claiming to have discovered a remote code execution (RCE) flaw in Elastic Defend that would allow an attacker to bypass EDR protections. Elastic’s Security Engineering team "conducted a thorough investigation" but could not find "evidence supportin

Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World

The Trump administration's radical changes to United States fiscal policy, foreign relations, and global strategy—combined with mass firings across the federal government—have created uncertainty around US cybersecurity priorities that was on display this week at two of the country's most prominent digital security conferences in Las Vegas. “We are not retreating, we're advancing in a new direction,” Cybersecurity and Infrastructure Security Agency chief information officer Robert Costello said

Computing’s Top 30: Guowen Xu

Guowen Xu’s passion for cryptography was seeded in various courses throughout his undergraduate mathematics education. It was his experience as a doctoral student, however, that was truly transformative in terms of his learning how to navigate cryptographic security’s complexities and begin shaping his research directions and career. Today, Xu is a full professor in the School of Computer Science and Engineering at the University of Electronic Science and Technology of China, Chengdu. Xu’s wor

Researchers hacked Google Gemini to take control of a smart home

Wired reported on new cybersecurity research that demonstrated a hack of the Google Gemini artificial intelligence assistant. The researchers were able to control connected smart home devices through the use of indirect prompt injections in Google Calendar invites. When a user requested a summary of their calendar and thanked Gemini for the results, the malicious prompt ordered Google's Home AI agent to take actions such as opening windows or turning lights off, as demonstrated in the video abov

Citizen Lab director warns cyber industry about US authoritarian descent

The director of Citizen Lab, one of the most prominent organizations investigating government spyware abuses, is sounding the alarm to the cybersecurity community and asking them to step up and join the fight against authoritarianism. On Wednesday, Ron Deibert will deliver a keynote at the Black Hat cybersecurity conference in Las Vegas, one of the largest gatherings of information security professionals of the year. Ahead of his talk, Deibert told TechCrunch that he plans to speak about what

CISA open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. Thorium was developed in partnership with Sandia National Laboratories as a scalable cybersecurity suite that automates many tasks involved in cyberattack investigations, and can schedule over 1,700 jobs per second and ingest over 10 million files per hour per permission

Palo Alto Networks stock falls after announcing $25 billion Cyberark deal

Palo Alto Networks will take over Israeli identity security provider CyberArk in a deal valued at roughly $25 billion. The California-based cybersecurity company will pay shareholders $45 apiece for 2.2005 shares of CyberArk, representing a 26% premium to its share price Friday. The deal is expected to close during Palo Alto Networks' fiscal year 2026. Shares of Palo Alto fell 5% Wednesday, building on a 5% loss from Tuesday. CyberArk's stock whipsawed. Palo Alto CEO and chairman Nikesh Arora

Palo Alto Networks stock falls 7% after announcing $25 billion Cyberark deal

Palo Alto Networks will take over Israeli identity security provider CyberArk in a deal valued at roughly $25 billion. The California-based cybersecurity company will pay shareholders $45 apiece for 2.2005 shares of CyberArk, representing a 26% premium to its share price Friday. The deal is expected to close during Palo Alto Networks' fiscal year 2026. Shares of Palo Alto fell 7% Wednesday, building on a 5% loss from Tuesday. CyberArk's stock dipped about 1%. Palo Alto CEO and chairman Nikesh

Palo Alto Networks stock falls 8% after announcing $25 billion Cyberark deal

Palo Alto Networks will take over Israeli identity security provider CyberArk in a deal valued at roughly $25 billion. The California-based cybersecurity company will pay shareholders $45 apiece for 2.2005 shares of CyberArk, representing a 26% premium to its share price Friday. The deal is expected to close during Palo Alto Networks' fiscal year 2026. Shares of Palo Alto fell more than 8% Wednesday, building on a 5% loss from Tuesday. CyberArk's stock dipped about 2%. Palo Alto CEO and chair

Trump’s cybersecurity cuts putting nation at risk, warns New York cyber chief

During the first few months of the new Trump administration, the White House slashed cybersecurity budgets, staff, and initiatives. And some, including cybersecurity experts and legislators, are not happy about it. One of them is Colin Ahern, the chief cyber officer for the state of New York. In a recent interview with TechCrunch, Ahern said that both he and New York Governor Kathy Hochul are worried that the Trump administration’s cuts to cybersecurity are putting the country at risk. “We wor

New York state cyber chief calls out Trump for cybersecurity cuts

During the first few months of the new Trump administration, the White House slashed cybersecurity budgets, staff, and initiatives. And some, including cybersecurity experts and legislators, are not happy about it. One of them is Colin Ahern, the chief cyber officer for the state of New York. In a recent interview with TechCrunch, Ahern said that both he and New York Governor Kathy Hochul are worried that the Trump administration’s cuts to cybersecurity are putting the country at risk. “We wor

Microsoft just upgraded Sentinel with an AI-powered data lake - here's how it works

NurPhoto/Contributor/Getty Microsoft is launching a new agentic AI system to help cybersecurity professionals manage and protect their organizations' data, the company said Tuesday. Microsoft Sentinel, a proprietary Security Incidents and Event Management (SEIM) platform, which debuted in 2019, now comes with a data lake -- that is, a centralized repository that can store structured and unstructured data without any kind of reformatting. Also: Microsoft fixes two SharePoint zero-days under at

These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more

In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry’s growth, and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, have made cybersecurity and hacking

Cybersecurity’s Unsung Heroes: Elevating Neurodiverse Talent in the Digital Age

They aren’t your average hires. They don’t glide through job interviews or thrive in open-plan offices. But when it comes to pattern recognition, threat modeling, or zero-day hunting, neurodiverse individuals often outperform their peers. And yet, they remain largely untapped in the cybersecurity workforce. If we’re serious about fortifying digital defense systems, it’s time we stop overlooking the neurodiverse minds that already think in ways most cybersecurity frameworks are only beginning to

ICE Rolls Facial Recognition Tools Out to Officers' Phones

WIRED published a shocking investigation this week based on records, including audio recordings, of hundreds of emergency calls from United States Immigration and Customs Enforcement (ICE) detention centers. The calls—which include reports of incidents of staff sexual assaults, suicide attempts, and head injuries—indicate a system inundated by life-threatening incidents, delayed treatment, and overcrowding. In a 6-3 decision on Friday, the US Supreme Court upheld a Texas porn ID law, finding th

How vulnerable is critical infrastructure to cyberattack in the US?

is a senior science reporter covering energy and the environment with more than a decade of experience. She is also the host of Hell or High Water: When Disaster Hits Home , a podcast from Vox Media and Audible Originals. Our water, health, and energy systems are increasingly vulnerable to cyberattack. Now, when tensions escalate — like when the US bombed nuclear facilities in Iran this month — the safety of these systems becomes of paramount concern. If conflict erupts, we can expect it to be

Cybersecurity takes a big hit in new Trump executive order

Cybersecurity practitioners are voicing concerns over a recent executive order issued by the White House that guts requirements for: securing software the government uses, punishing people who compromise sensitive networks, preparing new encryption schemes that will withstand attacks from quantum computers, and other existing controls. The executive order (EO), issued on June 6, reverses several key cybersecurity orders put in place by President Joe Biden, some as recently as a few days before

So... You Want to Become a Penetration Tester?

Cybersecurity is a rapidly growing and evolving field with a wide range of subfields and specializations. One of these is penetration testing, a discipline within what's known as "red teaming," which seeks to actively find and exploit vulnerabilities within computer systems (with permission, of course). It's an exciting and rewarding career, and I'll show you how to become a penetration tester. Before I continue, however, let me be transparent about my own experience. While I have about three

So... You Want to Become a Penetration Tester?

Cybersecurity is a rapidly growing and evolving field with a wide range of subfields and specializations. One of these is penetration testing, a discipline within what's known as "red teaming," which seeks to actively find and exploit vulnerabilities within computer systems (with permission, of course). It's an exciting and rewarding career, and I'll show you how to become a penetration tester. Before I continue, however, let me be transparent about my own experience. While I have about three

DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online

When the so-called Department of Government Efficiency recently fired dozens of people from the US Digital Service—the agency DOGE subsumed last month—it may not have realized the extent of the collateral damage. The USDS doesn't operate in a vacuum; part of its longtime mandate is to consult with federal agencies to help improve their digital platforms and websites. So when DOGE terminated Jonathan Kamens in its agency purge, it may not have fully grasped that it was firing the security lead f

US healthcare org pays $11M settlement over alleged cybersecurity lapses

Health Net Federal Services (HNFS) and its parent company, Centene Corporation, have agreed to pay $11,253,400 to settle allegations that HNFS falsely certified compliance with cybersecurity requirements under its Defense Health Agency (DHA) TRICARE contract. The U.S. government contracted HNFS to provide managed healthcare support services for TRICARE's North region, covering 22 states. The contract required compliance with cybersecurity standards, specifically 48 C.F.R. § 252.204-7012 and 51

Researchers Find Elon Musk's New Grok AI Is Extremely Vulnerable to Hacking

Researchers at the AI security company Adversa AI have found that Grok 3, the latest model released by Elon Musk's startup xAI this week, is a cybersecurity disaster waiting to happen. The team found that the model is extremely vulnerable to "simple jailbreaks," which could be used by bad actors to "reveal how to seduce kids, dispose of bodies, extract DMT, and, of course, build a bomb," according to Adversa CEO and cofounder Alex Polyakov. And it only gets worse from there. "It’s not just ja