Alcatraz raises $50 million for AI-powered physical security
Alcatraz develops physical security systems utilizing AI-powered facial recognition to control access to critical infrastructure like data centers and airports.
20 articles
Alcatraz develops physical security systems utilizing AI-powered facial recognition to control access to critical infrastructure like data centers and airports.
ThreatLocker's reinvention of zero-trust network access shifts access control from credential verification to the endpoint itself.
The acting head of ICE, Todd Lyons, approved the use of Paragon's spyware by Homeland Security Investigations (HSI) to combat the exploitation of encrypted p...
ShinyHunters alleges access to data from three breach paths: UNC6040, Salesforce Aura, and compromised AWS accounts, claiming over three million Salesforce r...
Researchers at watchTowr identified an authentication bypass (CVE-2026-2699) and a remote code execution flaw (CVE-2026-2701) within the Storage Zones Contro...
The future of the web belongs to the companies that can manage AI traffic without killing growth.
The breach was a result of a social engineering attack, where hackers tricked employees into granting system access.
The campaign leverages a newly-discovered phishing kit called VENOM.
Updates have been issued by Google to fix 21 vulnerabilities in its Chrome browser, including the actively exploited high-severity zero-day flaw, tracked as ...
North Dakota's Minot Water Treatment Plant, which serves roughly 80,000 people in Minot and surrounding communities, had its SCADA system impacted by a ranso...
Suspected Iran-linked hacktivist operation Nasir Security, also known as Nasir Resistance, has commenced exposing data allegedly pilfered following a months-...
Major Japanese multinational automaker Nissan has confirmed having its data compromised in a cyberattack against a third-party vendor earlier this year after...
Cisco had over three million Salesforce records with personal information, AWS buckets, GitHub repositories, and other corporate information allegedly stolen...
Solana-based decentralized finance exchange Drift Protocol was assessed by PeckShield to have had up to $285 million stolen in an Apr. 1 crypto heist believe...
BleepingComputer reports that organizations around the world, particularly in the U.S.
Chinese state-sponsored threat operation TA416 has reemerged from a two-year hiatus to compromise European governments in a series of cyberespionage campaign...
Dependent on logs and telemetry, EDR may not provide enough data to thwart a real-time attack. Autonomous IT management can fill the gap.
Craig Sanderson dives into the newly finalized NIST SP 800-81 as it marks a pivotal shift in DNS security.
It's time to leave the credential vault and move on from privileged access management.