Google Workspace’s continuous approach to mitigating indirect prompt injections
Posted by Adam Gavish, Google GenAI Security Team Indirect prompt injection (IPI) is an evolving threat vector targeting users of complex AI applications wit...
Highly organized RaaS that leaked its own playbook in 2022. Responsible for attacks on the Irish Health Service and Costa Rican government.
Also known as: conti ransomware, conti gang, conti malware
Posted by Adam Gavish, Google GenAI Security Team Indirect prompt injection (IPI) is an evolving threat vector targeting users of complex AI applications wit...
Attackers continue to evade defenders by using legitimate platforms like AWS and Microsoft utilities.
A water treatment plant in the city of Minot, North Dakota, was hit with ransomware but city officials said it continues to operate normally.
CrowdStrike and HCLTech have expanded their partnership with a new continuous threat exposure management service combining CrowdStrike's Falcon platform with...
The FBI's public service announcement details how certain mobile apps may continuously collect user data, even when permissions are granted only for active use.
Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration
Secure your UK public sector digital estate. Cortex Xpanse delivers active External Attack Surface Management (EASM) with continuous monitoring, NCSC alignme...
TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s ...
Licensed malware with built-in persistence and automation enables attackers to continuously siphon credentials, session data, and cryptocurrency assets. The ...
Yet another critical flaw in a Fortinet product has come to light as attackers continue to target the company, this time by actively exploiting a critical SQ...
The rise of autonomous systems has created a critical need to secure AI agent identities with the same rigor used for human employees, Ping Identity CEO Andr...
The European Commission is continuing to investigate the theft of data from its cloud infrastructure earlier this week. On Thursday, the Commission revealed ...
Experts warn that the timeframe between disclosure and exploitation will continue to shrink, so teams must prepare.
A new AITM phishing campaign targets TikTok Business accounts to hijack them for malvertising, continuing tactics seen in earlier Google-themed scams. Push S...
Identity talks in San Francisco focused on new realities challenging traditional authentication schemes.
TeamPCP continues is supply chain compromise rampage, with telnyx on PyPI being the latest maliciously modified package. What happened?
Code keeps moving through pipelines, and credentials continue to surface alongside it. GitGuardian’s State of Secrets Sprawl 2026 puts the count at 28.
Chris Wallis explores whether AI can bridge the divide between finding vulnerabilities and understanding real-world attack context as exploit windows continu...
Travis Wong explores why measuring risk in dollars changes the conversation at the board level.
DataBahn.ai has announced Autonomous In-Stream Data Intelligence (AIDI), a new operating model for security data pipelines in which data is continuously inte...