Microsoft unveils Project Ire: AI that autonomously detects malware

Microsoft’s Project Ire uses AI to autonomously reverse engineer and classify software as malicious or benign. Microsoft announced Project Ire, an autonomous artificial intelligence (AI) system that can autonomously reverse engineer and classify software. Project Ire is an LLM-powered autonomous malware classification system that uses decompilers and other tools, reviews their output, and determines the […]

Meta illegally collected Flo users’ menstrual data, jury rules

A California jury has found that Meta illegally collected user health data from the Flo period-tracking app, violating the state’s wiretap law. The verdict concludes a lawsuit filed against Flo, Google, Meta, and app analytics company Flurry in 2021, in which Flo app users accused the companies of collecting their private menstrual health data without […]

China Accuses Nvidia of Putting Backdoors into Their Chips

The government of China has accused Nvidia of inserting a backdoor into their H20 chips: China’s cyber regulator on Thursday said it had held a meeting with Nvidia over what it called “serious security issues” with the company’s artificial intelligence chips. It said US AI experts had “revealed that Nvidia’s computing chips have location tracking … Read more

The lawyer who beat Tesla is ready for ‘round two’

The day after he won an unprecedented $243 million verdict in a wrongful death case against Tesla, attorney Brett Schreiber posted a reel on Instagram celebrating the victory. His song pick: 1992’s “Damn It Feels Good To Be a Gangsta” by the Geto Boys. “This is a verdict that will change the world,” Schreiber wrote […]

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that could allow an attacker to gain elevated privileges under certain conditions. The vulnerability, tracked as CVE-2025-53786, carries a CVSS score of 8.0. Dirk-jan Mollema with Outsider Security has been acknowledged for reporting the bug. “In an Exchange hybrid … Read more

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

Ukraine’s CERT-UA warns of phishing attacks by UAC-0099 targeting defense sectors, using malware like MATCHBOIL, MATCHWOK, and DRAGSTARE. Ukraine’s CERT-UA warns of phishing attacks by threat actor UAC-0099 targeting government and defense sectors, delivering malware like MATCHBOIL and DRAGSTARE. The National Cyber Incident, Cyber Attack, and Cyber Threat Response Team CERT-UA investigated multiple attacks against […]

Approach, Focuspoint, and Essentials for Effective Watchlists

In complex cloud environments, maintaining a strong security posture begins with understanding what is important. Watchlists provide a strategic approach to monitoring critical infrastructure, allowing security teams to concentrate their efforts on the most sensitive and high-impact assets. The process begins by identifying critical cloud assets, those essential for operations, compliance, or data integrity. Once … Read more