• This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Jan. 5, 2026

    Read the press release in EIN Presswire

    The editors at Cybercrime Magazine named Nir Zuk, founder and Chief Technology Officer and board member at Palo Alto Networks (NASDAQ: PANW) “Cybersecurity Person of the Year” for his outstanding contributions to the industry in 2025.

    On Aug. 18 of this year, PAN announced that Zuk has retired after more than 20 years of contributing to the company’s success. He founded PAN in 2005, pioneering the next-generation firewall and revolutionizing the cybersecurity industry.

    Zuk said he could step away because the original blueprint he drew 20 years earlier of a single, unified cybersecurity platform spanning every major defensive category an enterprise might need, was finally complete, reports Calcalist, Israel’s premier daily financial newspaper and online media platform.

    PAN’s founder can retire in peace after his company announced its intention to acquire CyberArk for approximately $25 billion, which added to a long list of acquisitions in Israel (and globally), joining the likes of Talon Cyber Security and Dig Security, which were acquired for a combined $1 billion in 2023, according to Calcalist.

    “Nir is a legend in cybersecurity, and his contributions are forever etched in our history books,” said PAN’s Chairman and CEO Nikesh Arora.

    n a PAN blog post late last year, Zuk predicted that “The cybersecurity industry will experience tectonic shifts in 2025, unlike any we’ve seen in years past. These historic transformations will see the convergence of AI, data and platform unification, altogether changing how both cybersecurity defenders and attackers will operate and innovate.” In retrospect, Zuk was spot-on.

    “Nir Zuk is a once-in-a-generation founder whose innovation has redefined cybersecurity and elevated the entire industry. His achievements will resonate for decades,” said Richard Seewald, Founder & Managing Partner at Evolution Equity Partners, a prominent venture capital firm and lead investor in Talon Cyber Security and Protect AI, two companies who were acquired by PAN.

    Prior to co-founding PAN, Zuk was CTO at NetScreen Technologies, which was acquired by Juniper Networks in 2004. Prior to NetScreen, Zuk was co-founder and CTO at OneSecure, a pioneer in intrusion prevention and detection appliances. Zuk was also a principal engineer at Check Point Software Technologies, and was one of the developers of stateful inspection technology.

    “Nir Zuk is a hero, someone who young technologists and aspiring entrepreneurs look up to as a role model for what they might accomplish in the future,” said Steve Morgan, founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine. “He may not realize it, but in 2025 Zuk’s retirement announcement shined a light on the enormous opportunity that lies ahead for our next generation of cybersecurity leaders.”

    Previous recipients of the “Cybersecurity Person of the Year” include: George Kurtz, CEO and Co-Founder of CrowdStrike (2024); General Paul Nakasone, commander, U.S. Cyber Command and director, National Security Agency/Chief, Central Security Service (2023); Claire O’Neill, Australia’s Minister for Cyber Security (2022); Jen Easterly, Director of (U.S.) Cybersecurity and Infrastructure Security Agency (2021); Dr. Ambareen Siraj, founder of WiCyS (Women In Cybersecurity) (2020); Craig Newmark, philanthropist and founder of craigslist (2019); and Sylvia Acevedo, rocket scientist and former CEO at Girl Scouts of the USA (2018).

    Read the Press Release



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post 2025 Cybersecurity Person Of The Year: Nir Zuk, Palo Alto Networks Founder & CTO appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The year opened without a reset. The same pressure carried over, and in some places it tightened. Systems people assume are boring or stable are showing up in the wrong places. Attacks moved quietly, reused familiar paths, and kept working longer than anyone wants to admit. This week’s stories share one pattern. Nothing flashy. No single moment. Just steady abuse of trust — updates, extensions,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Modern enterprises depend on AI data pipelines for analytics and automated decision-making. As these pipelines become more integrated…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Featuring: Cybersecurity is being reshaped by forces that extend beyond individual threats or tools. As organizations operate across cloud infrastructure, distributed endpoints, and complex supply chains, security has shifted from a collection of point solutions to a question of architecture, trust, and execution speed. This report examines how core areas of cybersecurity are evolving in

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Russian cybercriminals have laundered over $35 million in stolen cryptocurrency linked to the devastating 2022 LastPass breach, according to new forensic analysis by blockchain intelligence firm TRM Labs. The 2022 attack exposed encrypted password vaults belonging to roughly 30 million customers worldwide. While the vaults were initially protected by encryption, attackers who downloaded them could […]

    The post Hackers Steal $35M in Cryptocurrency Following LastPass Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat researchers have uncovered a sophisticated attack campaign targeting FortiWeb web application firewalls across multiple continents, with adversaries deploying the Sliver command-and-control framework to establish persistent access and establish covert proxy infrastructure. The discovery came from analyzing exposed Silver C2 databases and logs found during routine open-directory threat hunting on Censys, revealing a well-orchestrated operation […]

    The post Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Disney agrees to a $10M settlement with the DOJ and FTC over YouTube privacy violations. Learn how the COPPA ruling affects kids’ data and Disney’s new rules.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ilya Lichtenstein, who was sentenced to prison last year for money laundering charges in connection with his role in the massive hack of cryptocurrency exchange Bitfinex in 2016, said he has been released early. In a post shared on X last week, the 38-year-old announced his release, crediting U.S. President Donald Trump’s First Step Act. According to the Federal Bureau of Prisons’ inmate locator

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A massive new botnet dubbed “Kimwolf” has infected over 2 million devices globally, transforming innocent users’ home internet connections into secret proxy nodes for cybercriminals. According to a new report by security firm Synthient, the botnet has grown explosively by exploiting unsecured Android TV boxes and a critical vulnerability in major residential proxy networks. The […]

    The post Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments. The tool addresses a critical gap in red-team reconnaissance by enumerating domain user profiles stored on compromised machines, enabling operators to make data-driven decisions about which systems warrant focused exploitation.​ The fundamental innovation behind ProfileHound […]

    The post ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶