• City officials rebuke OPB data center story, follow-up

    City officials rebuke OPB data center story, follow-up

    THE DALLES — On Jan. 15, Oregon Public Broadcasting (OPB) published an investigative article detailing The Dalles’ push to expand its water reservoir capacity in the Mount Hood National Forest through a bill sponsored by U.S. Rep. Cliff Bentz.

    Read More

  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

    Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

    Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech giant’s AI Security team said the scanner leverages three observable signals that can be used to reliably flag the presence of backdoors…

    Read More

  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

    China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

    Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia,

    Read More

  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

    Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

    An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access management tools were built to govern users and directories. Modern enterprises run on applications. Over time, identity logic has moved into application code, APIs, service accounts, and custom authentication

    Read More

  • Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

    Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

    Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant’s Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since

    Read More

  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

    Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

    The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository to combat supply chain threats. The move marks a shift from a reactive to a proactive approach to ensure that malicious extensions don’t end up…

    Read More

  • City officials rebuke OPB data center story

    City officials rebuke OPB data center story

    THE DALLES — On Jan. 15, Oregon Public Broadcasting (OPB) published an investigative article detailing The Dalles’ push to expand its water reservoir capacity in the Mount Hood National Forest through a bill sponsored by U.S. Rep. Cliff Bentz.

    Read More

  • Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

    Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

    Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data. The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed by

    Read More

  • [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

    [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

    Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to…

    Read More

  • When Cloud Outages Ripple Across the Internet

    When Cloud Outages Ripple Across the Internet

    Recent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on every day. For…

    Read More