After LLMs and agents, the next AI frontier: video language models
Tesla’s viral videos show its Optimus humanoid robot serving drinks to guests — a glimpse of AI in the real world that a new AI innovation, called world models, is expected to make more reliable. (For one, humanoid robots will do a better job in navigating and serving people their custom drinks.) World models — […] more…UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports
The British government is investigating a “cyber incident” following news reports that hackers linked to China have gained access to thousands of confidential documents. The post UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports appeared first on SecurityWeek. more…Thailand Conference Launches International Initiative to Fight Online Scams
Similar pledges to fight scam networks were made by members of the Association of Southeast Asian Nations in the months leading up to the Bangkok conference. The post Thailand Conference Launches International Initiative to Fight Online Scams appeared first on SecurityWeek. more…Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
Danish intelligence service said the attacks were part of Russia’s “hybrid war” against the West and an attempt to create instability. The post Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility appeared first on SecurityWeek. more…France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry
France’s counterespionage agency is investigating a suspected cyberattack plot targeting an international passenger ferry The post France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry appeared first on SecurityWeek. more…Microsoft warns MSMQ may fail after update, breaking apps
A warning from Microsoft that a Windows patch issued last week may cause the Message Queuing (MSMQ) function in the operating system to malfunction could be behind multiple reports of internet of things (IoT) applications failing. David Shipley, head of Canadian security awareness training provider Beauceron Security, says he saw a query on a Microsoft […] more…Enterprise Spotlight: Setting the 2026 IT agenda
IT leaders are setting their operations strategies for 2026 with an eye toward agility, flexibility, and tangible business results. Download the January 2026 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World and learn about the trends and technologies that will drive the IT agenda in the year […] more…Merriam-Webster names “slop” the word of the year 2025
Merriam-Webster, the US publisher of some of the world’s best-known encyclopedias, has named “slop” the word of the year for 2025. “We define slop as digital content of low quality that is produced usually in quantity by means of artificial intelligence.” All that stuff dumped on our screens, captured in just four letters: the English […] more…Hacker Conversations: Alex Hall, One-time Fraudster
A first-person journey from undetected fraud to defending trust—how life events, neurodiversity, and hard-won insight shaped a former fraudster into a fraud fighter. The post Hacker Conversations: Alex Hall, One-time Fraudster appeared first on SecurityWeek. more…Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking
The perimeter is gone. Credentials are no longer sufficient. And security can no longer rely on static controls in a dynamic threat environment. The post Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking appeared first on SecurityWeek. more…GhostPoster Firefox Extensions Hide Malware in Icons
The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA. The post GhostPoster Firefox Extensions Hide Malware in Icons appeared first on SecurityWeek. more…Apple in enterprise — industry execs on what works, and what they want in ’26
With Apple Silicon its current crown jewel, Apple has continued to rapidly build its presence in enterprise computing throughout 2025, generating significant market share gains as companies accelerate Apple deployments across their fleets. What’s driven Apple’s progress this year — and what should we expect from the company in the year ahead? To find out, […] more…Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw
Apple has released macOS and iOS updates to patch two WebKit zero-days exploited in an “extremely sophisticated” attack. The post Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw appeared first on SecurityWeek. more…Emerging cyber threats: How businesses can bolster their defenses
Enterprises leveraging our rapidly digitizing world must also have a robust understanding of how cyber threats are evolving. AI deepfakes are already becoming too convincing to be easily spotted by common sense approaches. Malicious actors are using AI to find vulnerabilities and to make their attacks harder to detect. And AI systems themselves pose security […] more…Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking
Notepad++ found a vulnerability in the way the software updater authenticates update files. The post Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking appeared first on SecurityWeek. more…MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations
Eleven companies took part in the evaluations and several have boasted 100% detection and coverage rates. The post MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations appeared first on SecurityWeek. more…More information
- How Japan’s Privacy Visor fools face-recognition cameras
- Resolved: WebMail Degradation – September 8
- ‘Massive’ data breach at Visa, MasterCard
- The Benefits of Red Zone Threat Intelligence
- Israeli Startup Empow Raises $9 Million for U.S. Expansion
- Why you may want to update your browser in the next 9 days
- Pixel 6 or Pixel 6 Pro? Some real-world guidance that might surprise you
- Report: Every company is compromised, but most infections not yet at critical stage
- Let’s Encrypt takes free “wildcard” certificates live
- Microsoft to Lay Off About 3% of Its Workforce