Unplug Gemini from email and calendars, says cybersecurity firm
CSOs should consider turning off Google Gemini access to employees’ Gmail and Google Calendars, because the […]
Computer mice can eavesdrop on private conversations, researchers discover
High-end computer mice can be used to eavesdrop on the voice conversations of nearby PC users, […]
Open-source monitor turns into an off-the-shelf attack beacon
China-affiliated hackers have quietly turned a once-benign open-source network monitoring tool into a remote access beacon. […]
Salesforce AI agents set to assist enterprises with security and compliance
Salesforce has announced two new AI agents operating on its Agentforce platform: one agent that monitors […]
Autonomous AI hacking and the future of cybersecurity
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than […]
The Road Ahead: India’s Data Protection in 2026
Data is now being used as a strategic asset and a major vulnerability as global businesses […]
10.0-severity RCE flaw puts 60,000 Redis instances at risk
The popular Redis in-memory data store received a patch for a critical vulnerability that leads to […]
it-sa 2025: Fast 1.000 Security-Anbieter am Start
Weggefährten der it-sa auf der ersten Pressekonferenz (von links): Claudia Plattner, BSI-Präsidentin, Ralf Wintergerst, Präsident des […]
Google DeepMind launches an AI agent to fix code vulnerabilities automatically
Google DeepMind has introduced an AI agent that automatically found and fixed software vulnerabilities in open […]
Phishers turn 1Password’s Watchtower into a blind spot
Malwarebytes has flagged a new phishing campaign that weaponized user trust in 1Password’s breach notification system, […]