Texas sues TP-Link, alleging it allows China to hack into routers

Attorney General Ken Paxton announced the lawsuit on Monday and said it is the first of several that will be filed this week against companies affiliated with China’s government.

The Record from Recorded Future News – ​Read More

New Keenadu Android Malware Found on Thousands of Devices

The malware has been preinstalled on many devices but it has also been distributed through Google Play and other app stores.

The post New Keenadu Android Malware Found on Thousands of Devices appeared first on SecurityWeek.

SecurityWeek – ​Read More

This former Microsoft PM thinks she can unseat CyberArk in 18 months

Though crowded, the identity management market seems eager for new solutions, and Venice is finding traction.

Security News | TechCrunch – ​Read More

The Pixel 10a is the midrange phone to beat this year, starting at $499

The Pixel 10a arrives with a flatter design, new camera tricks, and satellite emergency support.

Latest news – ​Read More

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Novee researchers discovered 16 vulnerabilities in Foxit and Apryse PDF tools that could have been exploited via malicious documents or URLs.

The post Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration appeared first on SecurityWeek.

SecurityWeek – ​Read More

Audible’s new Read & Listen tool can double the number of books you finish – here’s how

In addition to listening to books, you can now also read them on the Audible app.

Latest news – ​Read More

3 Ways to Start Your Intelligent Workflow Program

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn’t enough. 88% of AI proofs-of-concept never make it to production, even though 70% of workers cite freeing time for high-value work as the primary AI automation motivation. Real impact comes

The Hacker News – ​Read More

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to a new report from Google Mandiant and Google Threat Intelligence Group (GTIG).
The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials

The Hacker News – ​Read More

Palo Alto Networks to Acquire Koi in Reported $400 Million Transaction

Koi has developed an endpoint security solution that Palo Alto will use to enhance its products.

The post Palo Alto Networks to Acquire Koi in Reported $400 Million Transaction appeared first on SecurityWeek.

SecurityWeek – ​Read More

90% of AI projects fail – here are 3 ways to ensure yours doesn’t

With AI spending forecast to reach $2.52 trillion in 2026, Gartner recommends focusing on building capacity, creating partnerships and avoiding random exploration.

Latest news – ​Read More