Cybersecurity
-
Trend Micro: A Leader in Exposure Management, According to IDC MarketScape
Trend Micro has been named a Leader in the IDC MarketScape for Worldwide Exposure Management 2025 for its Cyber Risk Exposure Management offering. Trend Micro’s solution unifies security posture management and third-party integrations, providing comprehensive exposure telemetry and automated remediation. The integrated GenAI assistant helps users understand and address exposures. The report highlights Trend Micro’s suitability for enterprises seeking to consolidate security tools, automate remediation, and report on compliance, ultimately reducing operational silos and improving risk reduction.
-
Arch Linux Under Two-Week DDoS Attack, Impacting SteamOS Foundation
Arch Linux, the foundation of SteamOS, is experiencing a persistent DDoS attack since August 2025. The attack is primarily affecting the main website, Arch User Repository (AUR), and forums, causing intermittent outages. The Arch Linux team is working to mitigate the effects and restore full functionality, while investigating the origin of the attack. Users are advised to monitor the service status page for updates. The incident highlights cybersecurity threats to open-source projects and their downstream impacts.
-
AI-Powered Cybersecurity for the Enterprise
AbbVie’s Rachel James discusses leveraging AI, specifically Large Language Models, to enhance cybersecurity by analyzing security alerts, identifying patterns, and uncovering vulnerabilities. AbbVie uses OpenCTI to transform unstructured threat data using AI. James, a contributor to ‘OWASP Top 10 for GenAI’, highlights risks like inherent unpredictability, transparency challenges, and ROI assessment. She emphasizes understanding attacker mindsets and advocates for integrating data science and AI into cybersecurity, capitalizing on intelligence data sharing. Professionals are encouraged to embrace AI.
-
Security Chiefs Urge Immediate AI Regulation Following DeepSeek’s Rise
A recent report reveals that 81% of UK CISOs believe AI chatbots like DeepSeek require urgent government regulation due to cybersecurity risks. 34% have already banned AI tools, and 30% halted specific deployments over escalating concerns. CISOs fear data exposure, weaponization by cybercriminals, and increased attacks. 42% now view AI as a greater threat than a help. Many feel unprepared to manage AI-driven threats, prompting investment in AI specialists and C-suite training while urging for a national regulatory framework.
-
Password Reuse Rampant: Despite Rising Phishing, Half of Americans Still Sharing Their Logins
A Yubico survey reveals significant cybersecurity habit disparities across major U.S. cities. Nearly half of Americans reuse passwords, while only 3% favor hardware security keys. Seattle and San Francisco lead in MFA and passkey adoption, while Denver lags. The survey exposes a disconnect between perceived and actual security, with many experiencing cyber incidents despite believing they can identify phishing. Yubico advocates for robust, phishing-resistant authentication methods like YubiKeys.
-
Childcare Benefit Scams Emerge: WeChat Warns of Fraudulent Notices
China’s new parental subsidy program (¥3,600 annually per child under three) is set to launch in 2025. However, scammers are already exploiting the initiative, using deceptive tactics on social media to lure parents with fake notifications. WeChat warns against clicking suspicious links or downloading files from unsolicited messages, as they may contain malware granting remote access for data theft. Official application portals will be available in late August; verify information through official government channels.
-
360 Celebrates 20th Anniversary, Announces “All In Agent” Strategy
To mark its 20th anniversary, 360 Group announced its “All In Agent” strategy, shifting focus to AI and intelligent agents. Founder Zhou Hongyi emphasized AI’s transformative power, highlighting 360’s developed AI search engine and Nano AI Multi-Agent Swarm. The company launched the “Intelligent Agent Factory” and aims to reshape its products and processes with intelligent agents, encouraging employees to develop AI literacy. 360 also updated its mission, vision, and core values to align with its AI-driven future.
-
NIH Contract Expands DLH’s Leadership in Digital Transformation and Cybersecurity
DLH Holdings (DLHC) secured a task order worth up to $46.9 million to provide IT services to the NIH’s Office of Information Technology. The three-year contract includes enterprise IT systems management, cybersecurity, software development, and cloud computing, supporting around 7,000 end-customers. DLH will implement a cloud migration strategy leveraging partnerships with Azure, AWS, and Google, focusing on digital transformation and system modernization. This strengthens DLH’s position in federal health IT and highlights its expertise in cloud and AI.
-
US Chip Backdoor Techniques Exposed: Soft and Hard Methods Target Intel, AMD, and NVIDIA
Following U.S. approval of NVIDIA’s H20 AI chip export to China, Beijing reportedly summoned the company to discuss potential security risks, including alleged “backdoors.” NVIDIA denies these claims, but Chinese state media demands irrefutable proof of security. An exposé details potential hardware and software backdoor methods for remote shutdown and tracking, highlighting concerns over U.S. control of AI chip technology and its implications for Chinese data security and energy efficiency goals. The report suggests the H20 chip is neither secure nor environmentally friendly for China.
-
2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize AI for Large-Scale Attacks
CrowdStrike’s 2025 report reveals that adversaries are weaponizing GenAI to scale attacks, targeting AI agents and autonomous systems. DPRK-linked hackers infiltrated over 320 companies using GenAI. Cybercriminals are exploiting AI agent vulnerabilities to steal credentials and deploy malware. Cloud attacks, especially from Chinese groups, surged by 136%. The report emphasizes securing AI systems against these emerging threats as the cyber battleground evolves.