See how three organizations strengthen security and accelerate AI innovation with Microsoft’s family of security products.
Explore rising AI security challenges—shadow and embedded AI, data privacy, and a zero-trust framework to secure AI in ...
Jan 09, 2026 - Viktor Markopoulos - We often trust what we see. In cybersecurity, we are trained to look for suspicious links, strange file extensions, or garbled code. But what if the threat looked ...
When a hospital or nonprofit falls victim to a cyberattack, it's hard to place blame. Cybersecurity isn't their strength, and many lack the budget for a dedicated security team, let alone a chief ...
Sathe says that Nightfall closes the real-time data exfiltration gap with an AI-native security architecture that operates directly at the browser, endpoint and SaaS layers i.e. where modern ...
In yet another "Your chatbot may be leaking" moment, researchers have uncovered multiple weaknesses in OpenAI's ChatGPT that could allow an attacker to exfiltrate private information from a user's ...
Learn the essentials of CIAM for modern software development. Explore passwordless authentication, mfa, and how to scale user management securely.
A cybersecurity incident at analytics provider Mixpanel announced just hours before the U.S. Thanksgiving holiday weekend could set a new standard for how not to announce a data breach. To recap: In a ...
Chinese AI startup DeepSeek left critical user data and internal secrets unprotected, raising alarms over security risks in the AI industry. A New York-based cybersecurity firm, Wiz, has uncovered a ...
Crypto giant Coinbase has confirmed its systems have been breached and customer data, including government-issued identity documents, were stolen. In a legally required filing with U.S. regulators, ...
Over the course of three months in 2025, hackers exploited vulnerabilities in Oracle E-Business Suite to exfiltrate Social ...
23andMe’s weekend bankruptcy filing has ignited concerns among consumers who provided the company with their genetic information and reignited discussions on data privacy among policymakers and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results