Adopting AI is a major priority for businesses – but employees are falling behind on education

All worker types, including CEOs, are showing a lack of readiness when it comes to using AI in cybersecurity.

Sex toy firm hit by data breach – Tenga says hacker infiltrated systems, stole customer data

A Tenga employee fell for a phishing email, and gave away access to a company email account.

Pentagon may sever Anthropic relationship over AI safeguards – Claude maker expresses concerns over ‘hard limits around fully autonomous weapons and mass domestic surveillance’

The Pentagon is threating to cut a $200 million contract with Anthropic over a rift in how the Claude AI model should be used.

Google patches first Chrome zero-day of the year – so update now or face attack

An 8.3/10 use after free in CSS Google Chrome bug was patched after being abused by unnamed threat actors.

North Korean job scammers target JavaScript and Python developers with fake interview tasks spreading malware

Operation Dream Job is evolving once again, and now comes through malicious dependencies on bare-bones projects.

Canada Goose confirms data leak – around 600,000 customers thought to be affected

Luxury retailer Canada Goose confirms data was leaked, but argues it wasn’t breached, as hackers claim a third-party was hit instead.

Blockchain fintech giant Figure hit by data breach, says ‘limited number of files’ impacted

ShinyHunters claims responsibility, says Figure is part of the Okta single sign-on attacks.

The El Paso No-Fly Debacle Is Just the Beginning of a Drone Defense Mess

Fears over a drug cartel drone over Texas sparked a recent airspace shutdown in El Paso and New Mexico, highlighting just how tricky it can be to deploy anti-drone weapons near cities.

Homeland Security reportedly sent hundreds of subpoenas seeking to unmask anti-ICE accounts

The Department of Homeland Security has been increasing pressure on tech companies to identify the owners of accounts that criticize ICE.

Who remembers IRC? Clearly some hackers, as a new Linux botnet uses some incredibly old-school methods to cut costs

SSHStalker botnet uses old IRC communication, automated SSH brute-forcing, cron persistence, and cryptomining to efficiently exploit Linux servers.