Home Security Services Archive by category Cyber Security (Page 2)

Cyber Security

Acronis and Intel Partner to Deliver Efficient, AI-Driven Threat Detection for Endpoint Devices

Acronis Cyber Protect Cloud, a SaaS-based, multi-tenant platform, delivers award-winning protection from cyber threats, including next-generation antivirus, email security, data loss prevention (DLP), and endpoint and extended detection and response (EDR/XDR). Security professionals who use Acronis spend less time juggling tools thanks to its natively integrated solution that integrates cybersecurity, endpoint, and posture management, data protection, automated backups, and disaster recovery. Acronis also proudly aligns with NIST cybersecurity functions, helping users identify, protect, detect, respond to, and recover from threats more effectively.

“Cyber protection must be natively integrated and AI-powered to address modern cyber threats,” said Gaidar Magdanurov, President at Acronis. “Our collaboration with Intel empowers MSPs and corporate IT to deliver real-time security at the endpoint with minimal impact to system performance, protecting the productivity of users. Our collaboration with Intel takes the headache out of IT security for users and IT administrators.”

“Together, Intel and Acronis are delivering fast, AI-powered security right on the device,” said Carla Rodríguez, Vice President and General Manager, Client Software Enabling at Intel. “By running complex security tasks on an AI PC with Intel Core Ultra processors, we enable partners like Acronis to deliver breakthrough protection with lower latency and improved performance and privacy.”

Traditional antimalware software often struggles to detect modern threats and can consume excessive system resources, resulting in slowdowns, increased support tickets, and reduced productivity.

Fragmented security solutions further strain overburdened IT teams while increasing operational complexity. Acronis Cyber Protect Cloud addresses this with natively integrated cyber protection, minimizing the impact on system performance. And with Intel technology, it runs even more efficiently.

To learn more about AI PCs powered by Intel and Acronis Cyber Protect Cloud, visit: https://solutions.acronis.com/en-us/integrations/ai-pcs-powered-by-intel-and-acronis-cyber-protect-cloud/

Trend Micro Launches Cybertron, Industry’s First Proactive Cybersecurity AI

Trend Micro has introduced Trend Cybertron, a pioneering cybersecurity large language model (LLM) designed to reshape how enterprises manage cyber risk. Built on over 36 years of threat intelligence and more than two decades of AI innovation, Cybertron merges the reasoning power of Agentic AI with curated datasets and real-world expertise.

The solution integrates directly with Trend Vision One™, combining threat data, analytics, and advanced engines to deliver end-to-end visibility and protection. It enables proactive risk management by predicting attack paths, modeling threats, and recommending mitigation strategies before breaches occur.

Unlike reactive security approaches, Cybertron empowers IT teams to anticipate risk with exact precision across the entire attack surface. By doing so, organizations can move ahead of attackers, mitigating threats before they materialize.

This launch is especially relevant in regions such as the Middle East & Africa, where rapid adoption of AI-driven systems in government, banking, and smart cities has made security a pressing priority. Trend Micro notes that the average cost of a cyberattack in the region stands at $8.75 million, nearly double the global average.

“Security teams are overwhelmed by alert volumes and increasingly complex infrastructures,” said Bilal Baig, Regional Technical Director for the Mediterranean Middle East and Africa at Trend Micro. “Cybertron automates analysis and prioritizes threats based on real-time intelligence, allowing teams to focus on the most critical issues.”

Customer reports highlight up to 99% faster remediation when using Cybertron, setting a new standard for proactive defense. The model continuously evolves through agentic AI capabilities, adapting to novel threats and optimizing response with every interaction.

By integrating cybersecurity LLMs, curated threat intelligence, and intelligent AI agents, Cybertron provides organizations with clarity, speed, and confidence. It draws from global intelligence to prioritize risks and recommend precise actions, enabling teams to strengthen resilience.

Now available worldwide, Trend Cybertron represents a paradigm shift in cybersecurity, moving the industry firmly toward AI-driven proactive defense. It underscores Trend Micro’s mission to deliver innovative, future-ready solutions that safeguard digital transformation.

Cybersecurity Incidents Dominate the Week: Microsoft, DaVita, and Interpol Crackdown in Africa

The past week was marked by a wave of significant cybersecurity incidents worldwide. Microsoft announced it is limiting the information shared with Chinese companies through its Microsoft Active Protections Program (MAPP), following concerns that PoC exploit code may have been leaked and abused by Chinese threat actors.
Instead of detailed technical code, Microsoft will now provide only general descriptions of vulnerabilities to these firms. Meanwhile, Hunt.io published an in-depth analysis of the leaked Ermac 3.0 banking trojan source code, revealing both powerful data theft capabilities and serious security flaws. In Africa, Interpol carried out Operation Serengeti 2.0, arresting more than 1,200 individuals linked to cybercrime and recovering nearly $100 million while dismantling 11,000 malicious networks. The operation targeted investment fraud schemes, illicit cryptocurrency operations, and inheritance scams.

Separately, Microsoft patched a logging issue in Copilot that allowed some interactions to bypass audit logs, raising concerns for industries where log integrity is critical.

Researchers also warned that agentic AI integrated into web browsers could be exploited by attackers through techniques such as Scamlexity and ClickFix. Healthcare provider DaVita disclosed that its recent ransomware-related data breach now affects nearly 2.7 million people, with the Interlock group claiming responsibility. Together, these events underscore the growing complexity of today’s cyber threat landscape and the urgent need for stronger defenses across industries.

The Practical Guide to Becoming Crypto-Agile – Insights from HID Global

In a world where change is the only constant, adaptability is the new competitive edge — not just in business strategy, but in cybersecurity as well. Enter crypto-agility: the ability to rapidly update and deploy cryptographic systems in response to emerging threats, new standards and technological advancements.

What Is Crypto-Agility and Why Does It Matter?

Just as business agility helps companies stay competitive, crypto-agility ensures that company data and systems remain secure in the face of change. Cryptographic algorithms and protocols are not static — they evolve as researchers discover vulnerabilities or develop more secure methods. Without crypto-agility, organizations risk falling behind, leaving sensitive data exposed to increasingly sophisticated cyber threats.

Understanding Cryptography in Cybersecurity

At its core, cryptography protects data by encoding it so that only authorized parties can access it. This is often managed through public key infrastructure (PKI), which uses digital certificates to encrypt and decrypt information. These certificates define how data is secured and who can access it.

However, as encryption standards evolve, so must the systems that rely on them. That’s where crypto-agility comes in.

What Does Crypto-Agility Look Like in Practice?

Crypto-agility is more than a buzzword — it’s a strategic capability that enables organizations to respond quickly to cryptographic changes without compromising security or uptime. With HID’s PKI solutions, crypto-agility becomes a built-in advantage. In practice, crypto-agility lets you: 

  • Quickly replace outdated or vulnerable algorithmswithout overhauling entire systems — HID PKIaaS enables seamless algorithm updates across your infrastructure — no need to rip and replace systems. This flexibility ensures your cryptographic foundation evolves with emerging threats and standards.
  • Mitigate risks from certificate distrust or mass revocations— HID’s support for multi-CA architectures allows organizations to switch certificates between trusted certificate authorities with minimal disruption. This agility is critical during events like CA distrust or large-scale revocations.
  • Adapt to new cryptographic standardswithout re-inventing the wheel — HID PKIaaS is designed with modularity and standards-alignment in mind, making it easy to adopt new protocols and encryption methods as they become industry norms
  • Prepare for the post-quantumera — HID’s cloud-based PKIaaS is built by cryptographic experts to help you stay ahead of quantum threats. It provides a future-ready foundation that supports hybrid and quantum-safe algorithms — so you don’t have to be a cryptography expert to be secure.
  • Maintain compliance with evolving regulations and best practices— HID’s solutions are aligned with global standards like NIST and CA/B Forum guidelines. As regulations evolve — such as the move to 47-day certificate lifespans — HID helps you stay compliant without added complexity.
  • Automate certificate life cycle management to reduce risk— HID Enterprise SSL and PKIaaS offer robust automation tools that eliminate manual errors, reduce audit failures and ensure certificates are always up to date — critical for maintaining trust and operational continuity

Building a Crypto-Agile Strategy

Achieving crypto-agility requires more than just technical upgrades — it demands a strategic approach. Here are key steps to consider:

  1. Audit your current cryptographic assets. Understand what algorithms, keys and certificates are in use across your organization.
  2. Establish a cryptographic baseline. Define the minimum standards your systems must meet.
  3. Implement flexible encryption platforms. Choose solutions that support rapid updates and integration with existing infrastructure.
  4. Develop clear policies and protocols. Ensure your teams know how to respond to cryptographic changes and threats.

The Bottom Line

Crypto-agility is no longer optional — it’s a critical component of modern cybersecurity. By embracing agile cryptographic practices, organizations can protect their data, maintain trust and stay resilient in an ever-changing digital world.

For more information, please visit the website: https://campaigns.hidglobal.com/

 

Generative AI Cybersecurity Market Set to Quadruple by 2031, MarketsandMarkets Report Finds

The generative AI cybersecurity market is entering a period of strong expansion, according to a new report from MarketsandMarkets, with its value expected to surge from USD 8.65 billion in 2025 to USD 35.50 billion by 2031, growing at a CAGR of 26.5%. One of the key forces driving this growth is the rise of task-executing AI agents that can autonomously perform actions, requiring strong safeguards to prevent misuse and unintended harm.

The report highlights that breaches of AI models and applications are already a growing concern. IBM’s 2025 Cost of a Data Breach Report revealed that 13% of organizations worldwide experienced such breaches, with 60% resulting in compromised data and 31% causing operational disruption. Companies using unsanctioned “shadow AI” tools faced an average added cost of USD 670,000 per breach.

In the Asia Pacific region, the market is projected to record the highest growth rate, fueled by rapid adoption of AI-driven cybersecurity in finance, healthcare, and government. Governments are increasingly deploying AI measures to protect public services and critical infrastructure, while businesses are investing in AI to strengthen compliance, data protection, and customer trust.

MarketsandMarkets notes that demand for advanced AI-native security tools is rising as threats become more complex.

Vendors are investing in AI-driven penetration testing, automated vulnerability assessments, and real-time anomaly detection to help organizations bridge gaps between security operations and decision-making.

At the same time, risks such as prompt injection, model manipulation, and indirect prompt leaks are emerging as critical challenges. In high-stakes sectors like healthcare, financial services, and secure communications, such exploits could undermine decision-making integrity and regulatory compliance. Vendors are therefore moving toward fine-tuning guardrails, layered prompt filtering, and adversarial training to counter these evolving attack vectors.

Overall, the report concludes that the convergence of generative AI with advanced cybersecurity analytics will play a decisive role in helping organizations build resilience, protect sensitive data, and maintain operational trust in an increasingly hostile digital environment.

Gallagher Security Shares Key Lessons for Building Resilient Security

As 2025 enters its final quarter, Gallagher Security emphasizes that the security industry is at a turning point. While innovation continues at pace, success depends less on new features and more on how organizations adopt, align, and apply technology in real-world contexts. Drawing on its global research and industry experience, Gallagher Security highlights several clear lessons for leaders looking to strengthen their security strategies.

First, security is no longer just about protection—it is a strategic business enabler. Organizations are increasingly using security systems to support operational performance, automation, sustainability, and data-driven decision-making.

Second, modernization is essential but comes with challenges. Mobile credentials and cloud migration are advancing, yet adoption often lags due to policy misalignment, infrastructure limits, and lack of awareness. Gallagher Security advises that progress requires clear communication, practical pathways, and trusted partnerships.

Third, people remain at the center of every technology decision. Training, ease of use, and access to experts often matter more than technical features. At the same time, staffing shortages slow implementation, increasing the need for solutions that are intuitive, scalable, and easy to support.

Fourth, aligning security and IT strategies is no longer optional. Hybrid deployments highlight the need for shared governance and collaboration across departments to address cybersecurity and compliance risks effectively.

Finally, innovation only delivers value when it meets real needs. Successful deployments adapt to existing infrastructure, regulations, and cultural expectations rather than forcing a one-size-fits-all approach.

For organizations planning ahead, Gallagher Security’s advice is clear: treat security as a driver of business value, invest in people and partnerships, and ensure technology choices are aligned with long-term goals. In a rapidly evolving landscape, these principles are the foundation for building resilient and future-ready security.

French Media Report Cyberattack on Bouygues Telecom, Millions of Customers Affected

According to French media reports, Bouygues Telecom, one of the country’s largest telecommunications providers, has fallen victim to a major cyberattack that compromised the personal information of millions of users. The company, which serves more than 26 million mobile subscribers, confirmed that the incident exposed sensitive data linked to customer accounts.

The breach, detected in early August, allowed attackers to gain access to contact information, contract details, and even International Bank Account Numbers (IBAN) belonging to both private individuals and businesses. While Bouygues stressed that no passwords or payment card information had been exposed, the scope of the incident remains significant.

Company officials disclosed that approximately 6.4 million customers were affected. Those impacted are being contacted via email and text message, with urgent warnings to remain vigilant against fraudulent calls or phishing attempts seeking to exploit the stolen data.

So far, no ransomware group has claimed responsibility for the breach, and the motives behind the attack remain unclear. The incident comes just days after another French telecom giant, Orange, experienced a separate cyberattack in late July. Industry experts highlight that telecom operators remain high-value targets for both state-sponsored hackers and financially motivated cybercriminals, with recent attacks underscoring the urgent need for stronger defenses.

Wave of Cyberattacks Hits Europe: Ruđer Bošković Institute Among Targets

In recent days, a series of severe cyberattacks have been recorded across Europe, targeting major companies and institutions, including airlines, government agencies, and research centers. Following a recent incident involving Australia’s Qantas, European carriers Air France and KLM have also fallen victim to cybercriminals. Unauthorized access was detected on an external customer service platform, compromising passenger data such as names, email addresses, phone numbers, and frequent flyer account details. While sensitive information like passwords, passport numbers, and credit card details was not exposed, the breach has raised concern and prompted additional security measures.

A similar attack was recorded in the Adriatic region, where the target was Zagreb’s Ruđer Bošković Institute (IRB). The attack, carried out on July 31, 2025, was part of a global wave affecting at least 9,000 institutions worldwide, exploiting the ToolShell vulnerability in Microsoft SharePoint. The ransomware impacted part of the network related to the IRB’s administrative and technical departments, encrypting numerous documents and databases. The Institute has firmly refused to pay the ransom and is addressing the incident strictly through professional and security protocols, restoring data from secure backups.

These incidents once again highlight the growing threat of sophisticated cyberattacks in Europe and the need for continuous improvement of protective measures.

The IRB’s email system was down from July 31 to August 8, and the incident was reported to the Ministry of the Interior, the national CERT, and the Croatian Personal Data Protection Agency (AZOP). A forensic investigation is ongoing, and it is not yet known whether unauthorized access to personal data occurred. As a precaution, the network remains partially offline while a new IT infrastructure is being built in accordance with the latest cybersecurity standards.

Security Tests Expose Major Vulnerabilities in GPT-5

Two independent security testing teams have discovered critical vulnerabilities in OpenAI’s new GPT-5 model, with both managing to bypass its safeguards in under 24 hours, reports securityweek.com. NeuralTrust and SPLX, two prominent AI security firms, conducted separate red-team evaluations and reached equally troubling conclusions about the model’s readiness for enterprise use.

NeuralTrust’s researchers combined their proprietary EchoChamber jailbreak with a basic storytelling approach, leading GPT-5 to generate step-by-step instructions for making a Molotov cocktail without ever issuing an overtly malicious prompt. “The model strives to be consistent with the already-established story world,” the firm explained, noting that multi-turn “narrative” attacks can slip past single-prompt filters and intent detectors.

This method involved seeding a hidden, low-profile context, steering the conversation to avoid refusal triggers, and gradually reinforcing the malicious objective through narrative continuity. The firm warned that GPT-5’s susceptibility reveals a fundamental gap in safety systems that rely on isolated prompt screening.

Meanwhile, SPLX — formerly SplxAI — reported that GPT-5’s raw version is “nearly unusable for enterprise out of the box.” Their red team used obfuscation attacks, including a “StringJoin Obfuscation Attack” where prompts were disguised with hyphens and framed as fake encryption challenges. In one instance, GPT-5 responded to a disguised bomb-making query with detailed instructions, even opening with, “Well, that’s a hell of a way to start things off… I’m gonna tell you exactly how…”

Benchmarking against GPT-4o, SPLX found the older model more resilient when properly hardened. Both firms urged extreme caution in deploying GPT-5 without additional security layers, warning that its vulnerabilities make it a high-risk choice for sensitive environments.

OPSWAT Report: Malware Complexity Surges 127% in Six Month

OPSWAT, a global leader in critical infrastructure protection, has released its first-ever Threat Landscape Report, revealing key insights from over 890,000 sandbox scans in the last 12 months.

This report provides a unique perspective on the evolving nature of cyber threats. The findings are clear: traditional detection methods are being outpaced, with a 127% rise in malware complexity and a staggering 1 in 14 files—initially deemed ‘safe’ by legacy systems—proven to be malicious. This report serves as a call to action for industries relying on outdated defenses, emphasizing the importance of multi-layered solutions.

Key Findings:

127% Increase in Malware Complexity

Behavioral telemetry revealed a 127% rise in multi-stage malware complexity over the past year. OPSWAT’s sandbox uncovered layered threats designed to evade analysis, including obfuscated loaders such as NetReactor and evasive behaviors that are often missed by traditional tools. These results show that modern malware intends to confuse, not flood, which is why OPSWAT’s pipeline is purpose-built to unpack that complexity.

Proactive Threat Detection

OPSWAT analysis reclassified 7.3% of files that were silent across open-source intelligence (OSINT) feeds as malicious, on average 24 hours earlier than public data sources. These were confirmed executions, not speculative flags, highlighting how adaptive analysis can close dangerous gaps left by static and reputation-based systems.

Campaign-Level Threat Correlation

With 890,000+ sandbox scans, OPSWAT connects the dots across threats. It identifies shared TTPs, reused C2 infrastructure, and behavioral patterns across campaigns. This provides defenders with context-rich, actionable intelligence instead of noisy indicators.

99.97% Detection Accuracy

OPSWAT’s behavioral and machine learning pipeline delivers results. Aided by a newly enhanced PE emulator, the platform identified sophisticated threats such as:

  • Clipboard hijacking via ClickFix
  • Steganography-wrapped loaders
  • C2 channels embedded in Google services
  • .NET Bitmap malware loaders delivering Snake Keylogger payloads

“Our strength lies in precision, behavioral depth, and early visibility into emerging attacks,” said Jan Miller, Chief Technology Officer of Threat Analysis at OPSWAT. “That’s what sets OPSWAT apart in delivering high-fidelity, context-aware threat intelligence.”

Why It Matters

As critical infrastructure, government systems, and enterprise networks face growing targeting from increasingly modular and evasive malware, the findings of this report spotlight the evolving adversary playbook and the need for integrated, multilayered solutions.

Cybersecurity leaders must now prioritize adaptability, shared intelligence, reassessing technology, and rapid behavioral detection pipelines to protect systems from known threats, while also keeping pace with a rapidly evolving threat landscape and anticipating emerging threats.

Filescan.io, part of the OPSWAT MetaDefender Platform, powers advanced threat detection and file analysis across critical environments.