Herd Security Raises $3 Million for AI-Powered Training Platform
Herd Security has raised $3 million to expand its AI-powered cybersecurity training platform and grow its partnership ecosystem.
Stories cluster related articles into a single narrative, linked to the underlying CVEs and affected products. 323 stories synthesized.
Herd Security has raised $3 million to expand its AI-powered cybersecurity training platform and grow its partnership ecosystem.
The Iranian threat actor MuddyWater is leveraging Microsoft Teams for social engineering in a new campaign that uses a false flag ransomware attack to mask its activities.
A new webinar explores the common causes of network incident escalation and provides strategies for fixing response gaps in triage and coordination.
Attackers have compromised the official Daemon Tools download site to distribute trojanized installers that deploy backdoors and information-stealing malware.
The Hacker News has launched the 'Cybersecurity Stars Awards 2026' to honor leaders, teams, and products that have made significant contributions to the security industry.
A 53-year-old Romanian national has been extradited to the United States to face charges for his alleged role in a hacking scheme that took place 17 years ago.
Gartner's latest market guide warns that enterprise adoption of AI agents is outpacing the maturity of governance and security controls.
Intel 471 has launched Retroactive Threat Detections (RTD) within its Verity471 platform to help security teams rapidly identify and remediate the impact of new threats.
Researchers have demonstrated a new Rowhammer attack targeting NVIDIA Ampere-generation GPUs that can lead to full system compromise if IOMMU is disabled.
Extreme Networks has introduced Extreme Agent ONE, an AI-powered solution designed to enable autonomous decision-making and network management for enterprises.
UiPath has integrated agentic AI capabilities into its Automation Suite, providing government agencies with secure, compliant tools for deploying large language models.
CISA has issued new guidance for critical infrastructure operators, focusing on the importance of network isolation and recovery strategies to defend against foreign threat actors.
8x8 has updated its CX platform with new AI, analytics, and management tools to help organizations bridge operational gaps and improve customer service.
Proton Mail has made post-quantum email encryption available to all users, allowing them to protect their communications against future quantum computing threats.
Cisco Talos researchers have uncovered how attackers are leveraging API-driven VoIP services to rotate through phone numbers in scam emails to evade detection.
New Relic has launched New Relic Knowledge, an AI-driven intelligence layer that integrates telemetry and operational data to improve system observability and incident resolution.
A sophisticated new Linux RAT is actively targeting software developers with advanced surveillance and credential-stealing capabilities.
groundcover has updated its observability platform with improved Synthetic Monitoring and RUM capabilities to provide better visibility into the end-to-end user experience.
ServiceNow has introduced Autonomous Security & Risk, a platform for governing AI agents, identities, and connected assets, integrating technology from Armis and Veza.
Google is expanding its Binary Transparency for Android to create a public ledger that helps safeguard the ecosystem against supply chain attacks.
Megaport has introduced integrated DDoS protection for its Internet service, allowing customers to filter malicious traffic directly within the Megaport network to maintain uptime and performance.
A new campaign is leveraging the CloudZ RAT and a custom 'Pheno' plugin to exploit Windows Phone Link for credential and OTP theft.
CrowdStrike has announced a broad range of updates, including new AI visibility tools, expanded cloud security integrations, and insights into evolving threat actor tactics.
Oracle is transitioning to a monthly security patch cycle to improve the speed and efficiency of addressing critical vulnerabilities.