Uncategorized

Security Compass brings policy-driven security and compliance to agentic AI development

Security Compass released SD Elements for Agentic AI Workflow, enabling organizations to stay in control of security and compliance as AI becomes part of software development. AI agents introduce an unprecedented opportunity to accelerate the velocity of software development, but concerns about security and compliance are holding back adoption in regulated industries. Emerging laws like

Security Compass brings policy-driven security and compliance to agentic AI development Read More »

Uncategorized

The CISO view of fraud risk across the retail payment ecosystem

In this Help Net Security interview, Paul Suarez, VP and CISO at Casey’s, explains how his team manages patching and upgrades for fuel payment systems with long hardware lifecycles. He also discusses risks tied to QR code payments and outlines why loyalty abuse can be hard to spot. Suarez shares how Casey’s monitors payment systems

The CISO view of fraud risk across the retail payment ecosystem Read More »

Uncategorized

Applying green energy tax policies to improve cybersecurity

For years, governments have focused only on the stick of compliance when they could leverage the carrot of tax incentives. Theoretically, compliance fines and penalties should act as a deterrent that improves accountability and reduces data breaches. However, many vendors often assume compliance risk rather than securing data effectively. For example, Meta has been the

Applying green energy tax policies to improve cybersecurity Read More »

Uncategorized

Man gets five years for aiding North Korean IT employment scam

Ukrainian national Oleksandr Didenko, 29, was sentenced in U.S. District Court to 5 years in prison for an identity theft scheme that enabled North Korean workers to secure fraudulent employment. He pleaded guilty in November 2025 to wire fraud conspiracy and aggravated identity theft and agreed to forfeit more than $1.4 million, including about $181,438

Man gets five years for aiding North Korean IT employment scam Read More »

Uncategorized

651 arrested, $4.3 million recovered in African cybercrime sweep

Operation Red Card 2.0, supported by INTERPOL and involving law enforcement agencies from 16 African countries, led to 651 arrests and the recovery of more than $4.3 million from online scams. In Nigeria police took down a fraud ring that used phishing, identity theft and social engineering to scam victims (Source: Interpol) Running from 8

651 arrested, $4.3 million recovered in African cybercrime sweep Read More »

Uncategorized

Ex-Google engineers charged with orchestrating high-tech secrets extraction

A federal grand jury has indicted three Silicon Valley engineers on charges in a scheme to steal trade secrets from Google and other leading technology companies. The indictment charges the three defendants with conspiracy to commit trade secret theft, theft and attempted theft of trade secrets, and obstruction of justice. Each could receive up to

Ex-Google engineers charged with orchestrating high-tech secrets extraction Read More »

Uncategorized

Google cleans house, bans 80,000 developer accounts from the Play Store

Google prevented more than 1.75 million policy-violating apps from being published on Google Play and banned over 80,000 developer accounts that attempted to publish harmful apps in 2025. Developer verification, mandatory pre-review checks, and testing requirements in the Google Play ecosystem have reduced entry points for bad actors. “User safety is at the core of

Google cleans house, bans 80,000 developer accounts from the Play Store Read More »

Uncategorized

Criminals create business website to sell RAT disguised as RMM tool

A RAT masquerading as legitimate remote monitoring and management (RMM) software is being sold to cybercriminals as a service, Proofpoint researchers recently discovered. The fake RMM tool, called TrustConnect, was being marketed via an LLM-created website parked on trustconnectsoftware[.]com, supposedly belonging to “TrustConnect Software PTY LTD”. “The malware creator uses the domain as the ‘business

Criminals create business website to sell RAT disguised as RMM tool Read More »

Uncategorized

Week in review: Firmware-level Android backdoor found on tablets, Dell zero-day exploited since 2024

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Security at AI speed: The new CISO reality The CISO role has changed significantly over the past decade, but according to John White, EMEA Field CISO, Torq, the most disruptive shift is accountability driven by agentic AI. In this Help

Week in review: Firmware-level Android backdoor found on tablets, Dell zero-day exploited since 2024 Read More »

Uncategorized

LLMs change their answers based on who’s asking

AI chatbots may deliver unequal answers depending on who is asking the question. A new study from the MIT Center for Constructive Communication finds that LLMs provide less accurate information, increase refusal rates, and sometimes adopt a different tone when users appear less educated, less fluent in English, or from particular countries. Breakdown of performance

LLMs change their answers based on who’s asking Read More »

Uncategorized