Arcjet has introduced a new feature called AI Prompt Injection Protection aimed at defending production AI systems from prompt injection attacks. This capability identifies harmful prompts at the application's boundary, allowing developers to intercept and block malicious instructions before they can affect the AI model's inference process. As more companies rapidly deploy AI features, ensuring their security has become increasingly challenging. This solution is particularly relevant given that prompt injection attacks can manipulate AI systems, potentially leading to unauthorized access or misuse of sensitive data. By implementing this protection, organizations can better secure their AI applications against emerging threats.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
The European Union has imposed sanctions on several companies based in China and Iran due to their involvement in cyberattacks. These sanctions prevent the listed entities from entering or conducting business within the EU. The move is part of broader efforts to counteract malicious cyber activities that could threaten EU member states and their interests. By targeting these companies, the EU aims to hold them accountable for their actions and deter future cyber incidents. This decision underscores the EU's commitment to enhancing cybersecurity and protecting its digital infrastructure from foreign threats.
The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted government agencies about two significant security vulnerabilities affecting the Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint. Both flaws, identified as CVE-2025-66376 and another not specified in the article, have been found to be actively exploited by attackers. The CVE-2025-66376 vulnerability has a CVSS score of 7.2, indicating a moderate to high risk. Organizations using these platforms are urged to apply the necessary patches to protect against potential attacks. The exploitation of these vulnerabilities underscores the need for timely updates and vigilance in cybersecurity practices, especially for government entities.
Help Net Security
Akamai's latest security report reveals that internet-facing systems are facing increasing levels of malicious traffic, particularly targeting APIs, web applications, and DDoS channels. From January 2024 to December 2025, the number of web attacks aimed at applications and APIs has steadily risen, indicating a growing threat to organizations that rely on these technologies. This uptick in malicious activity suggests that attackers are honing their skills and strategies, making it crucial for companies to enhance their security measures. As APIs become more integral to business operations, understanding and mitigating these risks is essential for protecting sensitive data and maintaining service availability. Organizations should prioritize monitoring and defending their API infrastructures to counter these persistent threats.
SCM feed for Latest
The U.S. Department of Energy is preparing to release its first cybersecurity strategic plan aimed at strengthening the security of the nation's power grid. This move comes in response to a rise in cyber threats targeting critical infrastructure, highlighting the need for a more coordinated defense approach. The plan is expected to outline strategies for improving resilience against potential cyberattacks, which could disrupt energy supply and impact millions of Americans. By focusing on enhancing security measures, the Department of Energy aims to protect not just the grid itself, but also the broader economy and public safety. This initiative reflects growing concerns among government officials about the vulnerabilities in the energy sector and the increasing sophistication of cyber adversaries.
SCM feed for Latest
LangSmith, a platform for developing AI agents, and SGLang, a framework for serving large language models, have both been found to have significant security vulnerabilities. These flaws could allow attackers to take control of user accounts on LangSmith and execute code remotely on SGLang. The implications are serious, as these vulnerabilities could lead to unauthorized access and data breaches. Users of these platforms should be aware of the risks and take necessary precautions to secure their accounts. The discovery of these issues emphasizes the need for ongoing vigilance in the security of AI tools.
SCM feed for Latest
A significant vulnerability in Cisco's Catalyst SD-WAN, identified as CVE-2026-20133, poses a serious risk that some organizations may be overlooking. Cybersecurity experts have expressed concern that security teams are focusing their attention on another vulnerability, CVE-2026-20127, which is a zero-day exploit. This could lead to a dangerous situation where the high-severity flaw is not addressed, leaving systems vulnerable to potential attacks. Organizations using Cisco SD-WAN products should be aware of this oversight, as failing to remediate the CVE-2026-20133 vulnerability could expose critical data and systems to exploitation. The urgency of addressing this issue cannot be overstated, especially as cyber threats continue to evolve rapidly.
SCM feed for Latest
The University of Mississippi Medical Center and Passaic County in New Jersey have recently fallen victim to attacks from a ransomware group known as Medusa, which is believed to operate from Russia. This ransomware-as-a-service operation has claimed responsibility for the incidents, raising concerns about the security of healthcare and local government systems. The attacks can disrupt critical services and compromise sensitive data, which is particularly alarming in the healthcare sector where patient information is at stake. As ransomware attacks become increasingly common, organizations must prioritize their cybersecurity measures to protect against such threats and ensure they can continue to serve their communities effectively.
A new type of attack has been discovered that targets popular AI assistants like ChatGPT, Copilot, Claude, Grok, Perplexity, and Gemini. Researchers have shown that attackers can hide malicious commands within the HTML code of webpages using specialized font-rendering techniques. This method makes it difficult for these AI systems to recognize and flag the illicit code. The implications are significant, as it poses a risk to users who rely on these AI tools for safe browsing and information retrieval. If successful, this could allow malicious actors to execute harmful actions without detection, raising concerns about the security of AI-driven applications.
SCM feed for Latest
HPE has announced the launch of HPE Threat Labs, a new initiative that merges security resources from both HPE and Juniper Networks. This research unit aims to analyze and respond to cyber threats at an enterprise scale. Their first report, titled 'In the Wild,' examines 1,186 active cyber campaigns from 2025, providing insights into the tactics and strategies employed by attackers. This information is crucial for organizations looking to strengthen their cybersecurity posture in an increasingly hostile digital environment. By understanding current cyber threats, companies can better prepare and defend against potential attacks.
SCM feed for Latest
Security researchers have identified two new malware strains specifically targeting Linux-based network devices. These malicious programs are being used by financially motivated cybercriminals, marking a shift from their previous association with nation-state espionage. The malware can facilitate distributed denial-of-service (DDoS) attacks and enable unauthorized cryptocurrency mining. This development is concerning as it indicates that attackers are now exploiting vulnerabilities that were once primarily used for geopolitical purposes. Organizations using Linux network devices need to be vigilant and enhance their security measures to protect against these evolving threats.
SCM feed for Latest
The Department of Homeland Security (DHS) is set to significantly increase its surveillance spending, with plans to invest hundreds of millions of dollars in surveillance technology contracts by 2026. This spending is supported by a substantial funding boost from the 2025 'One Big Beautiful Bill,' which allocates $191 billion to various government initiatives. However, this expansion raises concerns regarding the adequacy of governance and oversight mechanisms in place to monitor how these surveillance technologies are implemented and used. Critics worry that without proper oversight, the increased surveillance could infringe on privacy rights and civil liberties. As the DHS ramps up its surveillance capabilities, it remains crucial for lawmakers and the public to ensure that effective checks and balances are established to prevent misuse.
SCM feed for Latest
The Vidar 2.0 malware campaign is specifically targeting gamers by disguising malicious links as attractive images on GitHub. These links lure users into downloading malware that can steal cryptocurrency and gaming account credentials. Gamers, who often seek an advantage in their online activities, are particularly vulnerable to this tactic. The campaign's use of a trusted platform like GitHub makes it even more deceptive. It's crucial for gamers to be cautious about the sources of the links they click and to verify the legitimacy of downloads to protect their accounts and digital assets.
BleepingComputer
The Cybersecurity and Infrastructure Security Agency (CISA) has directed U.S. federal agencies to address a vulnerability in the Zimbra Collaboration Suite (ZCS) that is currently being exploited in the wild. This flaw allows for cross-site scripting attacks, which can enable attackers to execute malicious scripts in the context of a user's session. Affected organizations need to act quickly to secure their servers to prevent unauthorized access and data breaches. The urgency of this directive underscores the importance of maintaining up-to-date security practices, especially for government entities that handle sensitive information. Users of ZCS should ensure their systems are patched as soon as possible to mitigate the risk posed by this vulnerability.
The article discusses the increasing speed at which attackers exploit vulnerabilities, suggesting that traditional predictive security methods are becoming ineffective. As vulnerabilities are now being exploited within days, cybersecurity professionals must shift to a preemptive security model to better protect systems. This change is crucial as organizations face growing pressure to defend against rapidly evolving threats. The article emphasizes the need for defenders to adapt their strategies and tools to stay ahead of attackers who use machine-speed tactics. This shift in approach affects all sectors, highlighting the urgency for companies to reassess their security measures.