Cybersecurity
Search documents
Cyber giant F5 Networks says government hackers had ‘long-term' access to its systems, stole code and customer data
TechCrunch· 2025-10-15 15:50
Core Insights - F5 Networks experienced a significant cybersecurity breach, with government-backed hackers gaining long-term access to its network, leading to the theft of source code and customer information [1][2] - The company believes its containment actions have been successful after discovering the breach on August 9 [1] Company Overview - F5 Networks, based in Seattle, specializes in application security and cybersecurity defenses for large enterprises and government entities [2] - The company serves over 1,000 corporate customers, including more than 85% of the Fortune 500, which encompasses major banks, technology firms, and critical infrastructure companies [5] Nature of the Breach - Hackers accessed F5's BIG-IP product development environment and knowledge management systems, which included source code and undisclosed security vulnerabilities [2] - The hackers downloaded configurations and implementation information about some customers' systems, potentially enabling further exploitation [4] Response and Mitigation - F5 has not detected any modifications to its software during development nor any exploitation of the vulnerabilities while in the hackers' possession [3] - The company released updates for its BIG-IP platform to address the undisclosed security flaws and urged customers to apply these patches [3] Regulatory and Security Implications - The U.S. Department of Justice permitted F5 to delay public disclosure of the breach, citing potential risks to national security or public safety [5] - Following F5's disclosure, the U.K.'s National Cyber Security Centre warned that the breach could allow threat actors to exploit F5 devices and software [6] Context of Cybersecurity Threats - F5 is among several tech companies that have faced similar breaches by government-affiliated hackers in recent years, including notable incidents involving Microsoft and Hewlett Packard Enterprise [8]
T-Mobile Unveils New Cyber Defense and Executive Briefing Centers
Businesswire· 2025-10-15 15:00
Core Insights - T-Mobile has launched a new Cyber Defense Center and an Executive Briefing Center to enhance cybersecurity and showcase technological innovations [1][2][3] Cyber Defense Center - The Cyber Defense Center is designed for real-time detection, disruption, and response to cyber threats, reflecting T-Mobile's strategic investment in cybersecurity [2][3] - It includes a Cyber Command Center that operates 24/7, utilizing advanced analytics and machine learning to monitor global threats and protect customer data [3][4] - The Cyber Lab allows security experts to innovate and anticipate cyber threats, testing tools and developing defenses [3][4] - Incident Response War Room and Digital Forensics Room facilitate rapid response to cyber incidents, enabling teams to analyze threats and improve future defenses [3][4] Executive Briefing Center - The Executive Briefing Center serves as a platform for enterprise customers to experience T-Mobile's business solutions, featuring five immersive zones that address real-world business challenges [5] - It aims to demonstrate how T-Mobile's technology can drive impactful business outcomes across various industries [2][5] Business Operations Center - T-Mobile's existing Business Operations Center acts as a command hub for network health and crisis response, ensuring reliability and continuity for customers [6]
PayPal Alerts Consumers to Phishing Scams and Encourages Safety Tips
Prnewswire· 2025-10-15 15:00
Core Viewpoint - PayPal is actively promoting awareness of phishing scams during National Cybersecurity Awareness Month, emphasizing the importance of consumer education and vigilance to combat increasingly sophisticated fraud tactics [2][3]. Group 1: Phishing Scams - Phishing scams involve fraudsters impersonating well-known brands to deceive individuals into providing personal information or sending money through unsolicited messages [3]. - Scammers utilize social engineering tactics to create a sense of urgency and manipulate victims into compliance [3]. Group 2: Consumer Protection Measures - PayPal encourages consumers to be cautious of unexpected messages and provides best practices to identify potential scams, such as checking sender addresses and being wary of false urgency [4][5]. - The company emphasizes the importance of reporting scams and taking immediate action if one suspects they have been scammed, including contacting financial institutions and enabling multi-factor authentication [5][6]. Group 3: PayPal's Fraud Mitigation Strategy - PayPal employs a multi-faceted approach to fraud prevention, partnering with consumer protection organizations and investing in innovative detection technologies [6]. - The company combines manual investigations with advanced technology to protect customers, including limiting scam accounts and declining risky transactions [6]. Group 4: Company Overview - PayPal has been a leader in global commerce for over 25 years, providing secure and innovative payment solutions to consumers and businesses in approximately 200 markets [7].
Okta CEO on the hidden dangers of AI agents in the workplace
Yahoo Finance· 2025-10-15 13:34
Industry Trends & Dynamics - The current AI revolution is considered the biggest platform shift since the internet, surpassing mobile and social media in scale [10] - The rapid pace of innovation, particularly in AI, is both exciting and unnerving, requiring companies to balance their existing strengths with necessary changes [9][13] - Customers now expect innovation, security, and control when adopting new technologies like AI agents [21][22][23] - Voice technology is becoming increasingly important, especially in customer support, due to advancements in AI and voice models [27][28][29] Okta's Strategy & Focus - Okta is focused on the concept of an "identity security fabric" to comprehensively cover all identities, use cases, and resources within a company, ensuring security across the board [14][16][41] - Okta aims to consolidate the identity vendor landscape, arguing that companies can achieve cost reduction, improved security, and easier deployment of new technologies by consolidating on identity [36][37][39] - Okta is adapting to the agentic revolution by integrating agents into its identity security fabric, providing governance, visibility, and control for these agents [17][18] - Okta emphasizes the importance of a consistent strategy focused on identity, adapting to new technological revolutions while maintaining its core message [45][46] Cybersecurity & Risks - Cyberattacks are increasingly identity-based, highlighting the need for better identity systems and industry cooperation to mitigate risks [39][55] - Critical infrastructure and newly automated processes are particularly vulnerable to cyberattacks, requiring increased investment in security measures [57][59]
Tenable to Announce Fiscal Third Quarter Earnings Results on Wednesday, October 29, 2025
Globenewswire· 2025-10-15 13:00
Financial Results Announcement - Tenable Holdings, Inc. will release its financial results for the third quarter ended September 30, 2025, after the U.S. market close on October 29, 2025 [1] - A conference call will be held on the same day at 4:30 p.m. ET to discuss the results [1] Webcast and Dial-in Information - A live webcast of the conference call will be available on the Tenable Investor Relations website [2] - Domestic dial-in number is 1-877-407-9716 and international dial-in number is 1-201-493-6779 [2] - An archived replay of the call will be available following the event [2] Company Overview - Tenable is an exposure management company focused on closing cybersecurity gaps that affect business value, reputation, and trust [3] - The company offers an AI-powered exposure management platform that integrates security visibility, insight, and action across various attack surfaces [3] - Tenable serves approximately 44,000 customers globally, helping to reduce business risk associated with security exposure [3]
The Ottawa International Airport Authority Enhances Security with Calian's Digital Command Centre
Globenewswire· 2025-10-15 12:00
Core Insights - Calian Group Ltd. has secured a three-year contract with the Ottawa International Airport Authority (OIAA) to implement and manage a cyber-focused Security Operations Centre (SOC) to enhance cybersecurity measures in response to increasing digital needs [1][3][4] - The partnership aims to strengthen network security and support future growth after a successful IT modernization project [3][4] - OIAA generates over $2.2 billion annually in total economic activity in Ottawa and Gatineau, highlighting the economic significance of the airport [5] Company Overview - Calian has over 40 years of experience delivering IT and cybersecurity solutions for mission-critical environments, focusing on four key pillars: cybersecurity, cloud modernization, data and AI, and staff augmentation [4][6] - The company emphasizes a security-first approach to drive performance, innovation, and trust among its North American and European customers [4][6] Industry Context - Modern airports rely on complex digital systems, making cybersecurity increasingly vital for their operations [2] - The initiative by OIAA represents a proactive strategy to protect passengers, staff, and infrastructure in a digitally integrated environment [3]
Cybercriminals Allegedly Steal Nearly a Billion Records from Companies That Use Salesforce (CRM)’s Software
Yahoo Finance· 2025-10-15 11:42
Group 1: Company Overview - RIT Capital Partners holds $34,689,623 worth of Salesforce, Inc. shares, representing 4.35% of its portfolio, indicating confidence in the company's potential [1] - Salesforce continues to demonstrate its dominance in AI-driven CRM technology, focusing on embedding generative AI across its customer platforms [4] Group 2: Cybersecurity Incident - A cybercriminal group, Scattered LAPSUS$ Hunters, allegedly stole nearly one billion records from companies using Salesforce's software, although Salesforce reported no breach of its own systems [2] - The incident highlights ongoing cybersecurity challenges for enterprise cloud providers, with the group exploiting "vishing" techniques to target Salesforce customers' IT help desks [3] Group 3: Product and Strategic Developments - Salesforce offers a range of products like Data Cloud, Slack, Agentforce, and industry-specific AI platforms, enhancing its customer relationship management and AI-driven business solutions globally [5] - The company has formed a strategic partnership with Perficient to develop "agentic enterprises," enhancing data-driven decision-making [4]
FTI Consulting Adds Former FBI Deputy Director Paul Abbate to National Security Team
Globenewswire· 2025-10-15 11:30
Core Insights - FTI Consulting has appointed Paul Abbate as a Senior Managing Director in its National Security offering, leveraging his extensive law enforcement and intelligence experience [1][2][4] Company Overview - FTI Consulting is a global expert firm specializing in crisis and transformation, with over 7,900 employees across 32 countries and territories as of June 30, 2025 [8] - The company generated $3.70 billion in revenues during fiscal year 2024 [8] Appointment Details - Paul Abbate brings nearly 30 years of experience from the FBI, where he served in various executive leadership roles, including Deputy Director [2][5] - In his new role, Abbate will focus on helping clients identify geopolitical risks and combat threats, including espionage and insider threats [3][6] National Security Offering - FTI Consulting's National Security experts come from diverse backgrounds, including law enforcement and intelligence, providing comprehensive solutions for compliance with national security regulations [7] - The firm aims to enhance organizations' defenses against national security incidents and support investigations related to regulatory enforcement actions [7]
3 Reasons to Hold BLZE Stock Now Despite a 56.8% Year-to-Date Rally
ZACKS· 2025-10-14 15:45
Core Insights - Backblaze (BLZE) has seen a significant year-to-date (YTD) increase of 56.8%, outperforming the Zacks Internet-Software industry and Zacks Computer and Technology sector, which returned 16.7% and 19.6% respectively [1] - The company is capitalizing on the AI revolution and executing its growth strategy effectively, leading to a critical decision for investors regarding holding positions or seeking better entry points [1] B2 Cloud Storage Growth - Backblaze's B2 Cloud Storage business is the main driver of its expansion, benefiting from increased enterprise adoption and demand for scalable, cost-efficient infrastructure for AI, media, and cybersecurity workloads [4][6] - The company anticipates B2 Cloud Storage revenue growth of 28% to 30% for Q3 2025, with a Zacks Consensus Estimate of $20.88 million, indicating a 29% year-over-year increase [5][8] - The focus on enterprise scale, predictable pricing, and AI-aligned product innovation strengthens B2 Cloud Storage as a durable and profitable growth engine [6] AI and Cybersecurity Integration - Backblaze is enhancing its market position by integrating AI and cybersecurity features into its cloud storage platform, capitalizing on the rising demand for scalable and secure infrastructure [7][9] - AI-related customers are increasingly contributing to enterprise revenues, diversifying growth and improving visibility across data-intensive use cases [9] - New cybersecurity features such as Anomaly Alerts and Enterprise Web Console enhance threat detection and compliance capabilities for enterprises [9] Competitive Landscape - Backblaze faces competition from Dropbox, Datadog, and Amazon, which are targeting overlapping enterprise workloads and expanding their service offerings [12] - Despite its transparent pricing and open-cloud design, competition from larger rivals may limit near-term market share gains [13] Valuation and Market Position - Backblaze's forward price-to-sales ratio stands at 3.27X, compared to 3.12X for Dropbox and 3.06X for Amazon, indicating a relatively high valuation [14] - The company holds a Zacks Value Score of F, suggesting that the stock may be overvalued following its substantial rally [14] - Continued growth in B2 Cloud Storage and strong demand for AI-related services could justify the current valuation, but investors may prefer to hold existing positions while waiting for more attractive entry points [14][16]
Energy Plug and Malahat Battery Technology Announce Strategic Alliance with Quantum eMotion on Energy and Defence, Including NATO-Aligned Initiative
Newsfile· 2025-10-14 13:00
Core Insights - The partnership between Quantum eMotion, Energy Plug Technologies, and Malahat Battery Technology aims to co-develop quantum-secured energy storage and defense systems for critical infrastructure [1][2] - This collaboration integrates advanced battery energy storage systems with quantum cybersecurity technologies to protect energy assets from cyber threats [2][4] Group 1: Partnership and Development - The Joint Development Agreement focuses on creating cyber-resilient, quantum-safe power systems [1][2] - Malahat Battery Technology, an Indigenous-led enterprise, will be central to system development and manufacturing, promoting Indigenous participation in defense and clean energy programs [3][8] - The partners are advancing a NATO-aligned defense initiative in collaboration with a leading defense contractor [3] Group 2: Technology and Security - Quantum eMotion's QRNG2 chip provides high-speed, true randomness for secure communications, establishing a quantum-resilient security layer across energy systems [4][5] - The collaboration positions Energy Plug as a pioneer in operationalizing quantum-grade cybersecurity within decentralized power systems [5] Group 3: Applications and Impact - The systems developed will support various applications, including Arctic defense installations, portable field systems for military personnel, and utility-scale smart grids [7] - The initiative aims to set a new benchmark for resilience and trust in intelligent energy systems [5]