

Editor picks
Palo Alto Networks buys CyberArk for 25 billion dollars: why?
Update, 3:50 PM: Palo Alto Networks has now officially confirmed it i...
Cisco donates AGNTCY to Linux Foundation: what does that mean for Internet of Agents?
Dell, Oracle, and Google Cloud are also joining the effort
Cybercrime trendsetter Scattered Spider rarely needs to hack
We hear all the time that cyber attackers no longer hack, but simply ...
Intel to fire 24,000 employees, no new factories in Europe
Intel announced during the presentation of its quarterly figures that...
"*" indicates required fields
Story timeline

Arctic Wolf integrates with Databricks for SecOps at scale
Arctic Wolf has integrated the Databricks Data Intelligence Platform into its own Aurora Platform. The new co...

Cyber threats hide among millions of detections
How does your SOC know which threats are real? Reducing noise is essential, according to Vectra AI. New findi...

Vulnerability discovered in Google Gemini CLI, patch required
Google's Gemini CLI tool was found to be seriously vulnerable within 48 hours of its launch. Researchers disc...

Palo Alto Networks buys CyberArk for 25 billion dollars: why?
Update, 3:50 PM: Palo Alto Networks has now officially confirmed it is buying CyberArk. The acquisition fee h...

Commvault reports strong numbers, announces Satori Cyber acquisition
Commvault has closed its first quarter of fiscal 2026 with strong results. At the same time, the company has ...

Groq aims to raise $600 million in new investment round
US AI chip developer Groq is in talks to raise approximately $600 million in a new round of financing. This w...

Microsoft Authenticator loses autofill for passwords this week
The end of support for Windows 10 is big news, but there are more changes afoot at Microsoft: the autofill fe...

Social engineering: an increasingly serious security problem
Social engineering is now responsible for 39% of all successful attempts to gain access to organizations, wit...

Developers frustrated with AI-generated code
76 percent of developers do not use vibe coding, whereby entire pieces of code are automatically generated by...

Security teams miss threats due to data overload
No less than 82 percent of security professionals say their teams may be missing critical threats due to an o...

New ransomware group Chaos poses serious threat
The new Chaos RaaS group is emerging as a dangerous player in the ransomware landscape. Cisco Talos Incident ...

With Windows 10 ending, Microsoft hopes to boost Autopatch adoption
With the end of support for Windows 10 on October 14, 2025, in sight, Microsoft has published a guide for org...

Cybercrime trendsetter Scattered Spider rarely needs to hack
We hear all the time that cyber attackers no longer hack, but simply log in. This is because it is true. Howe...

Ransomware groups snap up to 238 TB a year, Zscaler reports
Instead of encryption, ransomware deployment is increasingly relying on extortion, according to a new report ...

NiCE acquires German AI startup Cognigy for $955M
US software supplier Nice is acquiring German AI company Cognigy for $955 million. Cognigy, based in Düsseld...

Tonic Security emerges from stealth mode to offer AI-driven exposure management
Tonic Security, a cybersecurity start-up from Tel Aviv, is emerging from stealth mode. It is doing so with $7...

JetBrains details deeper mechanics of Junie coding agent
Coding agents are coming and software application developers are variously concerned, perniciously perturbed ...

Intel may yet extinguish its Foundry efforts
Intel is in the midst of a strategic repositioning. This became apparent last week when the company announced...

The challenges for European data sovereignty
New revelations about US cloud providers are confronting Europe with an uncomfortable truth. The continent ha...

As expected, Microsoft cannot guarantee data sovereignty in the EU
Microsoft has admitted under oath that it cannot guarantee that European users' data will remain within Europ...

Slack is evolving into a work operating system
Slack wants to be the glue that ties organizations together

Tesla signs mega deal with Samsung for chip production
Tesla and Samsung Electronics have signed an agreement whereby Samsung will supply $16.5 billion worth of chi...

Linux 6.16 released, Torvalds fears delay for 6.17
The stable version of Linux 6.16 has been released. According to Linus Torvalds (photo), the last week of the...

Critical vulnerability discovered in Copilot Enterprise
Dutch cybersecurity company Eye Security has discovered a security vulnerability in Microsoft Copilot Enterpr...

Anthropic unveils audit agents to detect AI misalignment
Anthropic is developing AI agents that independently perform alignment audits on language models. This signif...

Broadcom customers with perpetual VMware license face patching issues
VMware customers who use perpetual licenses but no longer have an active support contract will not have acces...

Intel to fire 24,000 employees, no new factories in Europe
Intel announced during the presentation of its quarterly figures that it will lay off approximately 24,000 em...

Alphabet under fire for violating the Digital Markets Act
Alphabet is under fire from six European digital and human rights organizations. They have filed a complaint ...

Illegal Nvidia chips repaired en masse in China
Despite a strict US export ban on Nvidia's most powerful AI hardware, a lively market is growing in China for...

EU Court examines Broadcom’s dominant position after VMware deal (update)
Following a complaint from industry organization CISPE, Broadcom's acquisition of VMware is once again under ...

Oklo and Vertiv are working on a nuclear energy solution for data centers
US nuclear energy company Oklo and Vertiv have announced a partnership to jointly develop solutions for the p...

Microsoft SharePoint zero-day: what we know so far
Major threat to on-prem SharePoint explained

Alphabet, IBM, and SAP results fail to impress investors
Major tech companies are reporting solid quarterly results, mainly thanks to their investments in artificial ...

Compumatica and NTT DATA enter into partnership
Cybersecurity company Compumatica and IT service provider NTT DATA have signed an official partnership agreem...

Significant increase in global IT spend in 2025
Global IT spending is expected to rise by 7.9 percent to a total of $5.43 trillion in 2025. This is according...

Hackers carry out ransomware attacks via SharePoint zero-day
The story surrounding the zero-day in Microsoft SharePoint continues to unfold. It is now clear that ransomwa...

Comeback of LTO tape: market grew significantly in 2024
After several years of minimal progress, the market for LTO tapes showed strong growth in 2024. According to ...

Oracle Database@AWS: best of both worlds?
How can customers benefit from partnership between Oracle and AWS?

Dynatrace makes Grail the core of latest generation of platform
Dynatrace has announced a new generation of its observability platform. With this third iteration, the compan...

DeepL Voice expands: new languages and Zoom Meetings integration
DeepL is significantly expanding its real-time translation solution DeepL Voice. The company is adding additi...

Hackers linked to China behind Microsoft SharePoint attack (update)
It's not really a surprise, but at least one of the actors behind the first attacks via the Microsoft SharePo...

Scale-up inforcer raises $35 million for growth in SME market
US scale-up Inforcer has raised $35 million in a Series B funding round. The investment is led by Dawn Capita...

Microsoft commits to European AI language models
Microsoft is investing in European language technology with new AI initiatives focusing on multilingual model...

Update for Windows 11 brings more resilience (and Recall)
The optional update KB5062660 for Windows 11 version 24H2 is now available. Microsoft is introducing several ...

CM.com lowers expectations for 2025 after flat gross profit growth
CM.com is lowering its expectations for the full 2025 financial year. This is due to the development of gross...

Nexla CTO: How to put MCP into a data product
Data integration platform company Nexla has been implementing native support for Model Context Protocol (MCP)...

Thinking too long makes AI models dumber
New research shows that longer reasoning processes in large AI models do not always lead to better performanc...

Datadog wants to acquire Upwind Security for $1 billion
Upwind Security has not been around for very long. It was only founded at the end of 2022. Yet it could alrea...

Nvidia expands CUDA support to RISC-V
Nvidia is finally taking the plunge into the open-source world with CUDA support for RISC-V processors. This ...

Dutch Department of Justice offline after Citrix vulnerability
The Department of Justice shut down all internet connections on Friday morning after a serious security threa...