A Canvas hack has leaked nearly 280 million records from faculty, staff, and students across 8,809 colleges, online learning platforms, and school districts.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Shadow AI is the new “known unknown,” and it lives inside every modern enterprise. Legacy cyber products won't secure AI; only AI built to govern AI can.
A security flaw in “Claude in Chrome” enables any Chrome extension, including those without permissions, to execute privileged commands, steal data, and perform agentic actions.
A 23-year-old Taiwanese student halted four high-speed rail trains using software-defined radio equipment to trigger emergency braking by sending a high-priority signal.
Video hosting platform Vimeo has confirmed a data breach stemming from a third-party performance metrics platform, Anodot, affecting approximately 119,000 users and customers.
Though it is not yet a matter of official policy, inside sources indicate CISA is weighing a three-day deadline for fixing critical vulnerabilities in federal government systems that have been observed being exploited elsewhere.
Most of the conversation around AI in cybersecurity focuses on how attacks are getting faster and more sophisticated. That is true, but it misses a more immediate issue. Many security teams are still operating in ways that assume a much slower threat environment.
A ransomware attack on a healthcare IT solutions provider has disrupted access to patients’ electronic health records (EHRs) across numerous Dutch hospitals.
Cyber risk has become a barometer for corporate resilience and trust. As the landscape accelerates, boards are expanding how they engage with performance, talent, and technical insight to keep pace with rising expectations. In today’s environment, traditional rhythms are giving way to more dynamic approaches that reflect the speed of change.
Red Dead Redemption 2 and GTA 5 game maker Rockstar Games confirms a data breach stemming from a third-party cloud provider after hackers threatened to leak stolen information.










