How Cisco plans to stop rogue AI agent attacks inside your network

As AI agents grow more powerful and unpredictable, Cisco unveils tools to lock down networks, track agent behavior, and prevent chaos before it spreads through your infrastructure.

Latest stories for ZDNET in Security – ​Read More

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks to an

The Hacker News – ​Read More

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

The post Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud appeared first on SecurityWeek.

SecurityWeek – ​Read More

Sensitive Information Stolen in Sensata Ransomware Attack

Sensor manufacturer Sensata said a ransomware group had access to its network for more than a week and stole personal information.

The post Sensitive Information Stolen in Sensata Ransomware Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Getty Images Sues Stability AI for Using Its Photos to Train AI Models

Getty Images accuses Stability AI of illegally using its content to train AI models in a high-stakes London…

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

Critical Vulnerability Patched in SAP NetWeaver

SAP has fixed a critical NetWeaver vulnerability allowing attackers to bypass authorization checks and escalate their privileges.

The post Critical Vulnerability Patched in SAP NetWeaver appeared first on SecurityWeek.

SecurityWeek – ​Read More

Exploited Vulnerability Impacts Over 80,000 Roundcube Servers

Exploitation of a critical-severity RCE vulnerability in Roundcube started only days after a patch was released.

The post Exploited Vulnerability Impacts Over 80,000 Roundcube Servers appeared first on SecurityWeek.

SecurityWeek – ​Read More

Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises

The threat actor known as Rare Werewolf (formerly Rare Wolf) has been linked to a series of cyber attacks targeting Russia and the Commonwealth of Independent States (CIS) countries.
“A distinctive feature of this threat is that the attackers favor using legitimate third-party software over developing their own malicious binaries,” Kaspersky said. “The malicious functionality of the campaign

The Hacker News – ​Read More

Vulnerabilities Exposed Phone Number of Any Google User

Google has awarded $5,000 to a researcher who found security holes that enabled brute-forcing the phone number of any user. 

The post Vulnerabilities Exposed Phone Number of Any Google User appeared first on SecurityWeek.

SecurityWeek – ​Read More

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerabilities in question are listed below –

CVE-2025-32433 (CVSS score: 10.0) – A missing authentication for a critical

The Hacker News – ​Read More