Month: August 2025
Microsoft unveils Project Ire: AI that autonomously detects malware
Meta illegally collected Flo users’ menstrual data, jury rules
China Accuses Nvidia of Putting Backdoors into Their Chips
The government of China has accused Nvidia of inserting a backdoor into their H20 chips: China’s cyber regulator on Thursday said it had held a meeting with Nvidia over what it called “serious security issues” with the company’s artificial intelligence chips. It said US AI experts had “revealed that Nvidia’s computing chips have location tracking … Read more
The lawyer who beat Tesla is ready for ‘round two’
Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups
Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that could allow an attacker to gain elevated privileges under certain conditions. The vulnerability, tracked as CVE-2025-53786, carries a CVSS score of 8.0. Dirk-jan Mollema with Outsider Security has been acknowledged for reporting the bug. “In an Exchange hybrid … Read more
The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense
Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both a weapon and a shield. As AI rapidly changes how enterprises innovate, security teams are now tasked with a triple burden: Secure AI embedded in every part of the business. Use AI to defend faster … Read more
CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector
Our Brains Contain Lithium—and Its Loss Might Help Drive Alzheimer’s, Study Finds

Harvard researchers have found evidence in mice and human brains that the element lithium could be key to a healthy brain.
Approach, Focuspoint, and Essentials for Effective Watchlists
In complex cloud environments, maintaining a strong security posture begins with understanding what is important. Watchlists provide a strategic approach to monitoring critical infrastructure, allowing security teams to concentrate their efforts on the most sensitive and high-impact assets. The process begins by identifying critical cloud assets, those essential for operations, compliance, or data integrity. Once … Read more