• Orem, United States, November 18th, 2025, CyberNewsWire SecurityMetrics, a leading innovator in compliance and cybersecurity, today announced that its Shopping Cart Inspect (SCI) solutions has been selected as winner of the “Data Leak Detection Solution of the Year” award in the 9th annual CyberSecurity Breakthrough Awards program. Conducted by CyberSecurity Breakthrough, an independent market intelligence […]

    The post SecurityMetrics Wins “Data Leak Detection Solution of the Year” in 2025 CyberSecurity Breakthrough Awards Program appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Orem, United States, November 18th, 2025, CyberNewsWire

    SecurityMetrics, a leading innovator in compliance and cybersecurity, today announced that its Shopping Cart Inspect (SCI) solutions has been selected as winner of the “Data Leak Detection Solution of the Year” award in the 9th annual CyberSecurity Breakthrough Awards program.

    Conducted by CyberSecurity Breakthrough, an independent market intelligence organization, the annual program recognizes the most innovative companies, products, and technologies driving progress in the global information security industry. 

    SCI reduces the chances of an e-commerce skimming attack through the inspection of a website’s shopping cart by a SecurityMetrics Forensic Investigator.

    The process involves the use of patented WIM Technology to determine if a website has fallen victim to JavaScript payment skimming.

    WIM technology can detect web skimming at the moment it is triggered and will alert a merchant if a webpage has been compromised, through tools like Shopping Cart Inspect and Shopping Cart Monitor.

    Using Inspect, SecurityMetrics Forensic Analysts review the rendered webpage code in a shopping cart URL to collect evidence of a skimming attack.

    Inspect is non-intrusive and website reviews are conducted without business interruption or merchant installation/intervention.

    Following the inspection, SecurityMetrics Forensic Analysts create a risk report illustrating a risk rating and include a list of vulnerabilities, ranking them from medium to high-risk based on the CVSS scale.

    The reports include a description of malicious JavaScript, identification of suspicious URLs on the website, a list of third-party domains participating in the e-commerce experience, and remediation recommendations.

    24/7 technical support is also available to help with remediation.

    “We understand how important it is to keep a business running as usual, so we designed SCI to discover website skimming attacks while still allowing business to continue uninterrupted. Our solution has been purpose-built to strengthen merchants, and our Forensic Analysts are at the forefront of emerging cyber threats,” said Brad Caldwell, CEO of SecurityMetrics.

    “Our e-commerce investigations conducted by our expert Forensics Investigators will continue to identify trends that we will meet head-on with solutions that prioritize security technology for our valued global customer base.”

    The 2025 awards program received thousands of nominations from more than 20 countries around the world, representing everything from disruptive startups to established global enterprises.

    This year’s winners embody the cutting edge of cybersecurity technology, delivering next-generation protection and resilience in today’s increasingly complex threat landscape.

    “SecurityMetrics knows that keeping your website up and running is vital to your business,” said Steve Johansson, managing director, CyberSecurity Breakthrough.

    “SCI from SecurityMetrics helps businesses tackle vulnerabilities confidently and gives them the tools and support they need to identify malicious scripts, protect their business, and ensure customer trust. That makes SCI our choice for 2025’s ‘Data Leak Detection Solution of the Year!’”

    About SecurityMetrics

    SecurityMetrics secures peace of mind for organizations that handle sensitive data. They have tested over 100 million systems for data security and compliance.

    Industry standards don’t keep up with the threat landscape, which is why SecurityMetrics hold their tools, training, and support to a higher, more thorough standard of performance and service.

    Never have a false sense of security.

    About CyberSecurity Breakthrough

    Part of Tech Breakthrough, a leading market intelligence and recognition platform for global technology innovation and leadership, the CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people.

    The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall and more.

    For more information, users can visit CyberSecurityBreakthrough.com.

    Tech Breakthrough LLC does not endorse any vendor, product or service depicted in our recognition programs, and does not advise technology users to select only those vendors with award designations.

    Tech Breakthrough LLC recognition consists of the opinions of the Tech Breakthrough LLC organization and should not be construed as statements of fact.

    Tech Breakthrough LLC disclaims all warranties, expressed or implied, with respect to this recognition program, including any warranties of merchantability or fitness for a particular purpose.

    Contact

    Corporate Communications Manager

    Landry French

    SecurityMetrics

    landry.french@securitymetrics.com

    +1 801-995-6431

    The post SecurityMetrics Wins “Data Leak Detection Solution of the Year” in 2025 CyberSecurity Breakthrough Awards Program appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • DoorDash has disclosed a cybersecurity incident where unauthorized actors gained access to user contact information following a social engineering attack targeting a company employee.

    The food delivery platform confirmed that personal data was compromised. However, it highlighted that no sensitive financial or government-issued identification information was accessed.

    On October 25, 2025, DoorDash identified unauthorized third-party access to its systems resulting from a social engineering scam targeting an employee.

    Social Engineering Attack Exposes Customer Contact Details

    The company’s security team quickly detected the intrusion, terminated the unauthorized access, and launched an investigation into the incident.

    Law enforcement authorities have been notified and are conducting an ongoing investigation. The breach affected user contact information, which varied by individual.

    Exposed data may have included first and last names, phone numbers, email addresses, and physical addresses. DoorDash stated that no sensitive information was accessed during the incident.

    Notably, Social Security numbers, government-issued identification numbers, driver’s license details, and bank or payment card information remained secure.

    DoorDash reported no evidence that the stolen data had been misused for fraud or identity theft purposes. DoorDash has implemented multiple security enhancements following the breach.

    The company deployed upgraded security systems designed to detect and prevent similar malicious activities.

    Additional employee training programs focusing on social engineering awareness have been introduced to strengthen defenses against future attacks.

    An external cybersecurity firm was brought in to support the investigation and provide specialized expertise. DoorDash focused on its commitment to continuous security improvement and protecting user privacy.

    DoorDash tells affected users to be careful about unexpected messages that ask for personal information.

    Users should avoid clicking unsafe links or downloading attachments from unknown sources and refrain from sharing personal data on unfamiliar websites.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post DoorDash Confirms Data Breach – Hackers Accessed Users Personal Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Austin, TX/USA, November 18th, 2025, CyberNewsWire Forecast report highlights surge in identity-based threats, evolving threat actor tactics, and increased risk from AI and insider threats. SpyCloud, the leader in identity threat protection, today released its report, The Identity Security Reckoning: 2025 Lessons, 2026 Predictions, outlining 10 of the top trends that will shape the cyber […]

    The post SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Austin, TX/USA, November 18th, 2025, CyberNewsWire

    Forecast report highlights surge in identity-based threats, evolving threat actor tactics, and increased risk from AI and insider threats.

    SpyCloud, the leader in identity threat protection, today released its report, The Identity Security Reckoning: 2025 Lessons, 2026 Predictions, outlining 10 of the top trends that will shape the cyber threat landscape in the coming year.

    The predictions, based on observed and analyzed cybercrime activities from the past year and SpyCloud’s proprietary research and recaptured identity intelligence, shed light on the evolving tactics of cybercriminals and the identity-based threats security teams need to anticipate.

    “Identity misuse is threaded throughout nearly every trend outlined in the report, from malware-driven session hijacking to synthetic identities and exposed non-human credentials,” said Damon Fleury, SpyCloud’s Chief Product Officer.

    “As attackers exploit this expanding footprint, organizations will be forced to rethink how they detect, respond to, and prevent identity threats across their entire ecosystem.”

    SpyCloud’s Top 10 Identity-Driven Threats That Will Shape 2026:

    1. The cybercriminal supply chain continues to transform: Malware-as-a-Service and Phishing-as-a-Service will remain core enablers of cybercrime, but 2026 will bring new “specialized roles” in the criminal economy that will make it easier for bad actors to operate at scale and with startup-like efficiency. These specialized roles include infrastructure providers, tool developers, access brokers, and even support services.
    2. Threat actor communities will fragment, evolve, and get younger: Law enforcement crackdowns and platform policy changes will continue pushing threat actors from darknet forums to mainstream apps. But perhaps more alarming is the influx of teen cybercriminals experimenting with plug-and-play attack kits for clout, profit, or curiosity. 2025 was also a big year for exposing Chinese cybercrime tactics, a trend expected to continue in 2026 alongside the rise of Latin America as a new hotbed for fraud and organized threat activity.
    3. The non-human identity (NHI) explosion will fuel hidden risks: Driven at least in part by the proliferation of AI tools and services, APIs, OAuth tokens, and service accounts, known as NHIs, are proliferating across cloud environments. These NHI’s often lack protections found more commonly in human-based credentials, like multi-factor authentication (MFA) and device fingerprinting. As these machine credentials quietly amass privileged access to critical systems, they create stealthy entry points for attackers and serious compliance gaps for enterprises.
    4. Insider threats will be fueled by M&A, malware, and missteps: In 2026, security teams will grapple with risks from compromised users, employment fraud from nation-state bad actors, and M&A activity that introduces inherited vulnerabilities and identity access sprawl. The “human element” will continue to be a weak point in proactive defense.
    5. AI-enabled cybercrime has only just gotten started: In 2026, AI will increasingly be used by bad actors to craft better malware, more believable phishing, and quickly triage vulnerable environments, increasing the overall risk to enterprises posed by this rapidly advancing technology
    6. Attackers will find creative ways around MFA: This year, SpyCloud found that 66% of malware infections bypassed endpoint protections. Expect to see more trending methods used to bypass MFA and other session defenses: residential proxies to spoof location authentication measures, anti-detect browsers to bypass device fingerprinting, Adversary-in-the-Middle (AitM) attacks used to phish credentials and steal valid cookies.
    7. Vendors and contractors will test enterprise defenses: Vendors and contractors continue to be a preferred attack vector to access enterprises. In 2026, organizations will need to treat third-party and contractor exposed identities with the same rigor as employee accounts – especially in tech, telecom, and software supply chains where threats are most acute and have a broader impact.
    8. Synthetic identities will get smarter and harder to spot: Criminals are assembling fake identities from real, stolen data and then enhancing them with AI-generated personas and deepfakes to defeat verification checks. With banks already flagging synthetic identity fraud as a top concern, expect this to become a front-page issue in 2026.
    9. Distractions like combolists and “megabreaches” will obscure real threats: Expect more viral headlines touting “billions of records leaked” even as many stem from recycled data found in combolists or infostealer logs – collections of already-exposed records repackaged by criminals to generate hype, fear, and clout. While older, unremediated data can still cause risk for organizations, these events often trigger widespread concern and divert attention away from more immediate, actionable threats.
    10. Cybersecurity teams will restructure to tackle new threat realities: As identity security becomes the common denominator across fraud, cyber, and risk workflows, teams will prioritize cross-functional collaboration, automation, and holistic identity intelligence to drive faster, more accurate decisions.

    “With the speed that technology moves, cybercrime evolves in lockstep and it’s equal parts fascinating to watch and challenging to keep up with,” said Trevor Hilligoss, SpyCloud’s Head of Security Research.

    “The commoditization and influence of the dark web will continue to complicate things, making 2026 another nonstop year for defenders. Understanding the TTPs of these cybercriminals and gaining insights into the data they find most valuable will help these defenders continue to stay one step ahead and positively impact these efforts in years to come. But you can be sure we’ll track these shifts in real time and enable our customers and partners to effectively combat identity misuse in all of its forms.”

    To explore the full report and see how SpyCloud’s holistic identity threat protection solutions help security teams prevent identity-based attacks like ransomware, account takeover, and fraud, users can click here.

    About SpyCloud

    SpyCloud transforms recaptured darknet data to disrupt cybercrime.

    Its automated identity threat protection solutions leverage advanced analytics and AI to proactively prevent ransomware and account takeover, detect insider threats, safeguard employee and consumer identities, and accelerate cybercrime investigations.

    SpyCloud’s data from breaches, malware-infected devices, and successful phishes also powers many popular dark web monitoring and identity theft protection offerings.

    Customers include seven of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide.

    Headquartered in Austin, TX, SpyCloud is home to more than 200 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now.

    To learn more and see insights on your company’s exposed data, users can visit spycloud.com.

    Contact

    Account Director

    Emily Brown

    REQ on behalf of SpyCloud

    ebrown@req.co

    The post SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026 appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google is taking a significant step to improve mobile user experience by introducing new tools to identify and flag apps that drain battery excessively.

    Starting March 1, 2026, applications that fail to meet battery efficiency standards could lose visibility on the Play Store and receive warning labels.

    The tech giant has launched a new core vitals metric, “excessive partial wake locks,” as part of its Android vitals program. This metric measures how long apps prevent devices from entering sleep mode, a primary cause of battery drain.

    Google Flag Apps on the Play Store

    The company defines excessive usage as sessions in which apps hold more than two cumulative hours of non-exempt wake locks within 24 hours.

    If an app exceeds this limit in 5% of user sessions within 28 days, it will be flagged. This initiative represents a collaborative effort between Google and Samsung, combining real-world user experience data with Android platform insights.

    Samsung’s deep knowledge of battery consumption patterns helped refine the algorithm to be more accurate and representative of actual user needs.

    Android Developers currently have until March 1, 2026, to address battery drain issues before facing consequences.

    Users may see a warning on your store
    Users may see a warning on your store 

    Apps that do not follow the rules may be removed from prominent places where users can easily find them, such as recommendations or personalized suggestions.

    In some cases, Google may display warning messages on app store listings that inform users the application may cause excessive battery drain. To help developers fix problems, Google is providing several resources.

    The Android vitals dashboard now includes an enhanced wake lock names table that breaks down sessions by specific tag names and durations.

    This detailed breakdown allows developers to identify long wake locks in their development environment and debug issues more effectively.

    This new rule is added to other essential quality rules that Google Play expects all apps to follow, such as keeping crash rates low and avoiding “App Not Responding” (ANR) issues.

    This comprehensive approach aims to ensure consistent quality across the entire Android ecosystem. Google emphasized that Android developers should review their apps’ performance immediately and consult technical documentation, blog posts, and videos to understand best practices for reducing wake lock usage.

    The company is committed to helping developers build efficient, stable applications that provide excellent user experiences while preserving device battery life.

    This initiative reflects growing user frustration with battery drain and demonstrates Google’s commitment to enforcing performance standards on its platform.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Google to Flag Apps on Play Store that Use Excessive Amount of battery appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Eurofiber France recently discovered a serious security incident that affected its ticket management platform and customer portal systems.

    On November 13, 2025, hackers exploited a software vulnerability in the platform used by Eurofiber France and its regional brands, including Eurafibre, FullSave, Netiwan, and Avelia.

    The attack also targeted the ATE customer portal, which serves the company’s cloud division operating under the Eurofiber Cloud Infra France brand.

    Through this exploit, the attackers managed to steal customer data from these platforms.

    The breach remained limited to Eurofiber France customers and did not spread to other Eurofiber entities operating in Belgium, Germany, or the Netherlands.

    The company immediately took action after detecting the intrusion. Within the first few hours, the ticketing platform and ATE portal were secured with stronger protections, and the exploited vulnerability was patched to prevent further unauthorized access.

    Fortunately, sensitive information like banking details remained safe, as these were stored in separate systems that the attackers could not reach.

    Security analysts at Eurofiber identified the breach quickly and activated their incident response procedures. The company worked alongside cybersecurity experts to contain the damage and secure affected systems.

    Services continued running normally throughout the attack, meaning customers experienced no downtime or service interruptions despite the ongoing breach.

    Eurofiber France followed all legal requirements by reporting the incident to French authorities. The company filed reports with CNIL, which is the French Data Protection Authority that enforces GDPR regulations, and notified ANSSI, France’s National Cybersecurity Agency.

    Additionally, Eurofiber filed a complaint for extortion, suggesting the attackers may have attempted to demand payment or threaten further action.

    Technical Response and Platform Security

    The attack vector involved exploiting a software vulnerability within the ticket management platform infrastructure.

    This type of vulnerability allowed the malicious actor to gain unauthorized access to the system and extract data without proper authentication.

    The specific vulnerability type was not disclosed, but the platform’s architecture enabled the attacker to bypass normal security controls.

    After detection, the security team implemented enhanced monitoring and access controls across both the ticketing platform and ATE portal.

    These measures included stronger authentication mechanisms, improved logging capabilities, and additional network segmentation to prevent lateral movement within the infrastructure.

    The rapid patching response demonstrates the importance of having incident response procedures ready to deploy when security incidents occur.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • President Trump suggested he would be okay ordering U.S. military strikes inside Mexico and Colombia as part of his administration’s ostensible war against fentanyl and cocaine, he told reporters Monday at the White House. 

    “Would I launch strikes in Mexico to stop drugs? OK with me. Whatever we have to do to stop drugs,” he said inside the Oval Office. “Colombia is—has cocaine factories, where they make cocaine. Would I knock out those factories? I would be proud to do it, personally.” NBC News and Bloomberg have a bit more. 

    Update: The U.S. Navy’s Caribbean Sea build-up now features at least a dozen ships, including the Gerald R. Ford aircraft carrier, which arrived in the region over the weekend, Dan Lamothe of the Washington Post wrote on social media Monday. Other vessels include the guided missile destroyers Mahan, Bainbridge, Winston S. Churchill, Stockdale and Gravely; the guided missile cruisers Lake Erie and Gettysburg; the amphibious assault ship Iwo Jima; amphibious transport dock ships Fort Lauderdale and San Antonio; and the littoral combat ship Wichita. 

    Developing: The State Department says it will designate Venezuela's Cartel de los Soles as a foreign terrorist organization beginning next Monday, CBS News reports. Trump and Secretary of State Marco Rubio allege the cartel is run by Venezuelan dictator and President Nicolás Maduro. CBS reports the group “is not known to be a traditional, hierarchical drug cartel like the Sinaloa or Tren de Aragua,” and that “The term is instead generally used to describe a loose, decentralized network of military and government officials within the Venezuelan state who are alleged to be involved in the illegal drug trade.”

    After the announcement, Trump told reporters Sunday evening, “We may be having some discussions with Maduro, and we'll see how that turns out. They would like to talk.” Trump repeated that somewhat on Monday when he said, “At a certain period of time, I'll be talking to [Maduro],” but he did not elaborate.  

    Related: Maduro said Monday he’s ready to speak “face to face” with anyone in the U.S. “who wants to talk to Venezuela,” Agence France-Presse reported.  

    And despite its coziness with the Trump administration, Trinidad and Tobago’s prime minister told AFP the country would not let the U.S. military use its soil to launch attacks on Venezuela. “The US has NEVER requested use of our territory to launch any attacks against the people of Venezuela,” Prime Minister Kamla Persad-Bissessar told AFP in a message, adding, “Trinidad and Tobago will not participate in any act that could harm the Venezuelan people.”

    Big-picture consideration: The New York Times explores “The ‘Donroe Doctrine’: Trump’s Bid to Control the Western Hemisphere,” reporting Monday. 

    Developing: A Tennessee state judge temporarily blocked Trump’s National Guard deployment to Memphis, saying it appears to violate the state's militia law, which instructs local lawmakers to call in such soldiers for matters of public safety. 

    Background: Memphis is one of several U.S. cities to which Trump has sent the National Guard, departing from norms against deploying troops on U.S. soil,” Reuters explains. “Trump has said they are needed to suppress civil unrest, support immigration enforcement and fight crime. Democrats have accused the Republican president of abusing military powers meant for grave emergencies such as an invasion.”

    The judge gave Trump officials five days to file an appeal, declaring Memphis crime rates—while among the top 10 in the nation—still do not constitute the “grave emergency” or “disaster” required to call in the National Guard, according to Tennessee’s state constitution. The Associated Press has a bit more.

    Additional reading:New York Officials to Team Up With Wall Street to Keep National Guard Out,” the Wall Street Journal reported Monday. 


    Welcome to this Tuesday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson and Bradley Peniston. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1978, the F/A-18 Hornet flew for the first time.

    Industry

    Happening today: Defense One’s State of Defense Business Acquisition Summit, with several panel discussions and featured guests scheduled between 1–5 pm ET, with a networking lunch beginning at noon. 

    Location: The River Birch Ballroom at the Westin Washington D.C Downtown (999 9th St NW, Washington, DC 20001).

    Guests include Rep. Rob Wittman, R-Va., chairman of the House Armed Services Subcommittee on Tactical Air and Land Forces. We’ll also hear from top officials at ScaleAI, Shield AI, HII, Anduril, Slingshot Aerospace, Oracle, Lockheed Martin and more. Panels discussions will span autonomy, U.S. munitions stockpiles, the future of the defense industrial base and more. 

    Registration and additional details, here

    Trump: U.S. will sell F-35s to Saudis, despite Pentagon concerns that the jet’s secrets might leak to China. New York Times: “Mr. Trump’s announcement came on the eve of a White House visit from Crown Prince Mohammed bin Salman of Saudi Arabia, during his first trip to the United States in more than seven years. Prince Mohammed, the kingdom’s de facto ruler, and U.S. officials are expected to discuss a Saudi purchase of 48 of the fighter jets and a potential mutual defense agreement.” Read on, here.

    The president’s insistence on the sale comes as his company pursues business deals in Saudi Arabia. Axios has the latest roundup of the Trump family’s pursuit of wealth in foreign lands, which continues to present unprecedented conflicts of interest. Read that, here.

    The “mixing of politics and profitmaking during President Trump’s second term has shattered American norms, shocking scholars who study ethics and corruption,” the Times writes in a separate article.

    The pilot of an F-22 recently controlled a drone wingman in flight. The pilot used a tablet to control a General Atomics MQ-20 Avenger over the Air Force’s Nevada Test and Training Range, according to Monday statements from General Atomics and Lockheed Martin’s Skunk Works; L3Harris was also part of the demonstration. The flight, apparently the first of its kind with an F-22, took place in October. Defense One’s Thomas Novelly has a bit more, here.

    Europe

    France, Germany are talking about scrapping their plans to jointly build a fighter jet, the Financial Times reported on Monday. Instead, they might focus on a command-and-control system, Reuters writes off the FT report.

    Europe hunts for ways to speed up defense innovation, production. Early next year, the EU Commission says it will “air a proposal” for a “pilot initiative that will allow companies to test and refine new technologies, aiming to turn projects into defence products ready for sale quicker,” Reuters reported on Tuesday.

    Also in the works: Proposals for “ways for different member countries to recognise each other's certifications for defence technologies, help companies access EU research facilities and encourage EU member governments to allocate at least 10% of arms budgets to emerging and disruptive technologies, according to the draft roadmap.” Read more, here.

    Ukraine

    France promises Ukraine 100 new Rafale warplanes, plus air defence systems, munitions and drones. On Monday, the presidents of France and Ukraine signed a letter of intent for the transfer of the arms; an actual purchase deal is planned later. The countries aim to finance the deal “with EU programmes and the planned use of frozen Russian assets, which the EU still has to agree,” Reuters reported.

    Background: “The announcement comes after a surge of Russian drone and missile attacks on Ukraine in recent weeks, and Moscow's reports of ground advances in the southeastern Zaporizhzhia region,” Reuters wrote, here.

    Additional reading: 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform’s network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a lucrative attack surface for state-sponsored actors and

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at HiddenLayer have uncovered a critical vulnerability that exposes fundamental weaknesses in the guardrails protecting today’s most powerful artificial intelligence models. The newly discovered EchoGram attack technique demonstrates how defensive systems safeguarding AI giants like GPT-4, Claude, and Gemini can be systematically manipulated to either approve malicious content or generate false security alerts. […]

    The post New EchoGram Trick Makes AI Models Accept Dangerous Inputs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶