Link to episode page This week’s Department of Know is hosted by Rich Stroffolino with guests Robb Dunewood, Host, Daily Tech News Show, and Howard Holton, CEO, GigaOm Thanks to our show sponsor, KnowBe4 Your email gateway isn’t catching everything…
What agentic AI means for cybersecurity
<p>Security practitioners are engaged in a battle against an enemy that sometimes seems to have all the ammunition.</p> <p>Case in point: Organizations worldwide field hundreds of millions of cyberattacks daily, according to the <a target=”_blank” href=”https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2024″ rel=”noopener”>Microsoft Digital Defense Report…
IT Security News Hourly Summary 2025-11-18 00h : 9 posts
9 posts were published in the last hour 23:4 : Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems 23:4 : Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts 23:4 : What…
Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems
Cyber threats are changing how they reach victims. A financially motivated criminal network called Payroll Pirates has been quietly attacking payroll systems, credit unions, and trading platforms across the United States since mid-2023. Their weapon of choice is malvertising, where…
Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts
Cybersecurity researchers have uncovered a dangerous new tool making waves across darknet forums and criminal communities. Xanthorox, a malicious artificial intelligence platform, has emerged as a serious concern for the security industry. The tool works like a regular chatbot, similar…
What future innovations excite leaders in Agentic AI security
How Are Non-Human Identities Transforming the Landscape of Cybersecurity? Have you ever considered what constitutes the “identity” of a machine where technology evolves at breakneck speed? The concept of Non-Human Identities (NHIs) is reshaping how organizations think about cybersecurity. More…
What makes an effective Secret Scanning solution
How Can Organizations Achieve Robust Cybersecurity with Effective Secret Scanning Solutions? Where cyber threats consistently challenge organizations, the focus on securing Non-Human Identities (NHIs) has become critical. NHIs, essentially machine identities, play a pivotal role in ensuring the safety of…
Are current IAM solutions capable of handling NHIs effectively
Can Your IAM Solutions Handle Non-Human Identities Efficiently? Where organizations are increasingly relying on digital frameworks, the role of Non-Human Identities (NHIs) has become pivotal, especially in cloud environments. But how can we ensure that our IAM solutions are genuinely…
How adaptable are AI-driven security systems to new threats
How Do AI-Driven Security Systems Keep Up with New Threats? How can organizations ensure their AI-driven security systems remain adaptable to new threats? With cyber threats grow in sophistication and frequency, the ability of security systems to adapt quickly becomes…
IT Security News Daily Summary 2025-11-17
136 posts were published in the last hour 22:36 : Iranian Hackers Use SpearSpecter to Target Senior Government Leaders 22:36 : Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered 22:4 : Bitsgap vs HaasOnline: Advanced Features vs…
Iranian Hackers Use SpearSpecter to Target Senior Government Leaders
An Iranian campaign called SpearSpecter is quietly targeting senior officials with tailored social engineering and fileless malware. The post Iranian Hackers Use SpearSpecter to Target Senior Government Leaders appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered
A new threat has emerged in the ransomware landscape with the discovery of Yurei ransomware, first publicly identified in early September 2025. This Go-based malware follows a typical ransomware operation model by infiltrating corporate networks, encrypting critical data, deleting backups,…
Bitsgap vs HaasOnline: Advanced Features vs Smart Simplicity
Power vs Practicality in Crypto Automation This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the original article: Bitsgap vs HaasOnline: Advanced Features vs Smart Simplicity
Pentagon and soldiers let too many secrets slip on social networks, watchdog says
Ready, aim, mire Loose lips sink ships, the classic line goes. Information proliferation in the internet age has government auditors reiterating that loose tweets can sink fleets, and they’re concerned that the Defense Department isn’t doing enough to stop sensitive…
‘Largest-ever’ cloud DDoS attack pummels Azure with 3.64B packets per second
Aisuru botnet strikes again, bigger and badder Azure was hit by the “largest-ever” cloud-based distributed denial of service (DDoS) attack, originating from the Aisuru botnet and measuring 15.72 terabits per second (Tbps), according to Microsoft.… This article has been indexed…
EchoGram: The Attack That Can Break AI Guardrails
EchoGram is a new attack that can silently flip AI guardrail decisions and bypass safety checks. The post EchoGram: The Attack That Can Break AI Guardrails appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Cisco Firewall, Unified CCX, and ISE Vulnerability Summary (Nov 2025)
CVE-2025-20333 and CVE-2025-20362 Details Cisco disclosed a new active attack variant targeting and exploiting the previously known vulnerabilities in the Cisco Secure Firewall ASA and FTD software (CVE-2025-20333 and CVE-2025-20362) leading to unpatched devices to reboot/reload unexpectedly creating the conditions…
When Machines Attack Machines: The New Reality of AI Security
Unlike conventional IT systems—with bounded entry points, predictable patch cycles, and known vulnerabilities—large language models (LLMs) and next-generation AI agents create an attack surface so broad, dynamic, and interconnected that comprehensively mapping or policing it becomes nearly impossible. Every new…
CISA, eyeing China, plans hiring spree to rebuild its depleted ranks
The agency will also change some of its workforce policies to avoid driving away talented staff. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: CISA, eyeing China, plans hiring spree to rebuild its…
Alice Blue Partners with AccuKnox for Regulatory Compliance
Menlo Park, CA, November 17th, 2025, CyberNewsWire. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the original article: Alice Blue Partners with AccuKnox for Regulatory Compliance
AI Pulse: The Rise of AI Search Crawlers
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: AI Pulse: The Rise of AI Search Crawlers
A Perfect Storm: DDoS Attack Hits Turkish Luxury Retailer During Fall Collection Launch
When high-stakes events meet unprecedented attack volumes, disruption can be devastating. A Turkish luxury retail platform experienced this firsthand when it was hit with a record-breaking application-layer DDoS attack, peaking at 14.2 million requests per second (RPS). This marks the…
Security researcher calls BS on Coinbase breach disclosure timeline
Claims he reported the attack in January after fraudsters tried to scam him A security researcher says Coinbase knew about a December 2024 security breach during which miscreants bribed its support staff into handing over almost 70,000 customers’ details at…
Post-quantum (ML-DSA) code signing with AWS Private CA and AWS KMS
Following our recent announcement of ML-DSA support in AWS Key Management Service (AWS KMS), we just introduced post-quantum ML-DSA signature support in AWS Private Certificate Authority (AWS Private CA). Customers can use AWS Private CA to create and manage their…