Author: admin

Twenty-eight cybersecurity-related merger and acquisition (M&A) deals were announced in February 2025.  An analysis conducted by SecurityWeek shows that 405 cybersecurity-related mergers and acquisitions were announced in 2024. Check out the detailed report.  Here is a list of the most important cybersecurity M&A deals announced in February 2025: A10 Networks acquires ThreatX Protect Network security and application delivery solutions provider A10 Networks has acquired ThreatX Protect to expand its cybersecurity portfolio with web application and API protection (WAAP) capabilities. A10 has acquired the ThreatX brand and the TX Protect WaaP solution, and the remaining ThreatX assets will be rebranded as…

Read More

President Donald Trump was poised to impose 25% taxes on imports from Canada and Mexico Tuesday and to double to 20% his levies on Chinese products. All three countries — America’s top trading partners — are threatening retaliation.The United States last year did nearly $2.2 trillion in the trade of goods — exports plus imports — with the countries the president is targeting: $840 billion with Mexico, $762 billion with Canada and $582 billion with China.Trump has declared an economic emergency in order to justify the duties, marking the most aggressive use of tariffs by the United States since the…

Read More

Volker Turk tells the UN Human Rights Council that policies meant to protect marginalised people are being called ‘discriminatory’.The United Nations human rights chief has expressed deep concern about a “fundamental shift in direction” by the United States under President Donald Trump, warning that divisive rhetoric is being used to deceive and polarise people. “We have enjoyed bipartisan support from the US on human rights over many decades. … I am now deeply worried by the fundamental shift in direction that is taking place domestically and internationally,” UN High Commissioner for Human Rights Volker Turk told the UN Human Rights…

Read More

Ransomware operators have been observed deploying a vulnerable Paragon Hard Disk Manager driver in attacks and exploiting it to elevate their privileges to System. The driver, Biontdrv.sys, which is part of Hard Disk Manager and other products that rely on it, such as Paragon Partition Manager and Backup and Recovery, contains five vulnerabilities that allow attackers to elevate privileges or cause a denial-of-service (DoS) condition. “Additionally, as the attack involves a Microsoft-signed driver, an attacker can leverage a Bring Your Own Vulnerable Driver (BYOVD) technique to exploit systems even if Paragon Partition Manager is not installed,” a CERT/CC advisory reads.…

Read More

Indian stock brokerage firm Angel One on Friday disclosed a data breach impacting client information stored in its Amazon Web Services (AWS) account. The incident, the company said, was discovered after it received an email alert from a ‘dark web monitoring partner’ on February 27, regarding a ‘data leakage post’. “After analyzing the post, it was ascertained that some of Angel One’s AWS resources were compromised,” the company said. Angel One says it immediately changed the passwords for its AWS cloud and related applications, and that it retained external experts to investigate the incident, assess the scope of the data…

Read More

A massive hoard of internal chats has been leaked from the Black Basta ransomware group, rivalling the Conti leaks of late February 2022. A 47 Mb JSON file of internal Black Basta chat logs was leaked by an actor named ExploitWhispers on February 11, 2025. Its existence did not become general knowledge until February 20, when the threat intelligence firm Prodaft posted brief details. The post included a note from ExploitWhispers, written in Russian, suggesting the leak happened because Black Basta had ‘hacked domestic banks’ (that is, Russian banks) and in doing so they had crossed the line. Prodaft also…

Read More

DISTOMO, Greece (AP) — Feeling overwhelmed by everyday obligations or doom-scrolling? The ancient Greeks had a remedy for burnout still practiced annually by their rural descendants.In the mountain village of Distomo, the “Koudounaraioi” — literally, the “Bell People” — transform themselves into half-human, half-beast revelers in a ritual dating back to pre-Christian times.Clad in sheep and goatskins with heavy hand-forged bronze bells chained to their waists, the Bell People danced through the streets Monday of this red-roofed village, a two-hour drive northwest of Athens.The deafening clatter the dancers make and their profanity-filled chants as they bound around a fire in…

Read More

In the realm of modern enterprise IT, which thrives on seamless integration across various platforms such as security, identity, and analytics, one aspect lags conspicuously behind: compliance. As enterprises increasingly operate on SaaS-based API-driven infrastructure, the necessity for compliance systems to evolve becomes undeniable.For IT and Unified Communications heads, transforming compliance should be a straightforward extension of the existing infrastructure, akin to security monitoring or identity management. Unfortunately, compliance often remains a rigid, isolated element that introduces operational challenges, compliance gaps, and significant costs, according to Theta Lake.Historically, compliance solutions have been crafted for slower, less dynamic environments. These legacy…

Read More

The intersection of cybersecurity and financial crime has emerged as a pivotal area of concern for both regulators and businesses globally.According to Arctic Intelligence, in an era where digital threats are increasingly complex, the necessity to merge cybersecurity protocols with financial crime risk assessments is more crucial than ever.Cyber threats such as ransomware attacks, where cybercriminals lock digital systems and demand a ransom, often paid in cryptocurrencies, are becoming a mainstream tactic for perpetrating financial crimes. These payments can be used to further finance illicit activities like money laundering. Business Email Compromise (BEC) and data breaches are other avenues through…

Read More

AI Agents, also known as Artificial Intelligence Agents, are software programs that harness technologies such as ML and NLP.According to Moody’s, these agents are not just tools; they are revolutionizing how tasks are performed in sectors like regulatory technology (RegTech). For instance, in due diligence processes, an AI Agent can autonomously conduct investigations, providing insights into entities by analyzing extensive global datasets. This capacity to manage complex tasks enhances productivity and efficiency in compliance operations.The role of GenAI in risk and compliance is transformative, primarily by building efficiency into routine and complex processes. A typical example is the daily screening…

Read More