Cloud CISO Perspectives: Data-driven insights into AI and cybersecurity

Source

Welcome to the second Cloud CISO Perspectives for April 2025. Today, Sandra Joyce, vice president, Google Threat Intelligence, will talk about the practical applications of AI in both attack and defense, adapted from her RSA Conference keynote. As with all Cloud CISO Perspectives, the contents of this newsletter are …

WhatsApp Case Against NSO Group Progressing

Source

Meta is suing NSO Group, basically claiming that the latter hacks WhatsApp and not just WhatsApp users. We have a procedural ruling: Under the order, NSO Group is prohibited from presenting evidence about its customers’ identities, implying the targeted WhatsApp users are suspected or actual criminals, or alleging that …

AI-generated code could be a disaster for the software supply chain. Here’s why.

Source

AI-generated computer code is rife with references to non-existent third-party libraries, creating a golden opportunity for supply-chain attacks that poison legitimate programs with malicious packages that can steal data, plant backdoors, and carry out other nefarious actions, newly published research shows. The study, which used 16 of the most …

Applying Security Engineering to Prompt Injection Security

Source

This seems like an important advance in LLM security against prompt injection: Google DeepMind has unveiled CaMeL (CApabilities for MachinE Learning), a new approach to stopping prompt-injection attacks that abandons the failed strategy of having AI models police themselves. Instead, CaMeL treats language models as fundamentally untrusted components within …

‘Source of data’: are electric cars vulnerable to cyber spies and hackers?

Source

British defence firms have reportedly warned staff not to connect their phones to Chinese-made EVs Mobile phones and desktop computers are longstanding targets for cyber spies – but how vulnerable are electric cars? On Monday the i newspaper claimed that British defence firms working for the UK government have warned …

Windscribe Acquitted on Charges of Not Collecting Users’ Data

Source

The company doesn’t keep logs, so couldn’t turn over data : Windscribe, a globally used privacy-first VPN service, announced today that its founder, Yegor Sak, has been fully acquitted by a court in Athens, Greece, following a two-year legal battle in which Sak was personally charged in connection …

From insight to action: M-Trends, agentic AI, and how we’re boosting defenders at RSAC 2025

Source

Cybersecurity is facing a unique moment, where AI-enhanced threat intelligence, products, and services are poised to give defenders an advantage over the threats they face that’s proven elusive — until now. To empower security teams and business leaders in the AI era, and to help organizations proactively combat evolving …

iOS and Android juice jacking defenses have been trivial to bypass for years

Source

About a decade ago, Apple and Google started updating iOS and Android, respectively, to make them less susceptible to “juice jacking,” a form of attack that could surreptitiously steal data or execute malicious code when users plug their phones into special-purpose charging hardware. Now, researchers are revealing that, for …

« newer articles | page 46 | older articles »