New Standard for Quantum-Resistant Encryption Adopted
NIST has chosen CRYSTALS-Kyber as the forthcoming PQC method to be implemented in government systems, signifying a significant advancement in the field of post-quantum cryptography.
Surge in AI-Driven Cyberattacks Noted at 300% Increase
A recent study indicates a dramatic rise in cyber threats with the use of generative AI, which enables actors to orchestrate complex phishing attacks and slip past security measures.
Monitoring of International Security
North America Section
- Tech corporation incurs $25M penalty from FTC for privacy breaches akin to GDPR regulations
- CISA's new policies require Multi-Factor Authentication for all government contractors
- Service groups offering ransomware target healthcare systems
European Update
- The EU's Cyber Resilience Act is in the last stage before approval
- Stricter regulations for AI systems included in proposed GDPR revisions
- A large network within the darknet dismantled by Interpol
Updates from APAC
- Security framework for AI launched by Singapore
- Record levels of DDoS attacks reported in Japan
- Within 24 hours, data breaches now must be reported in Australia
Innovation Trends in Technology
- Innovative Advancements in Homomorphic Encryption - Computing on encrypted data is now up to 100 times quicker
- Artificial Intelligence Assisted Security - Joint release of developer tools by Microsoft and AxisCommonsPortal
- Advances in 5G Network Security - New network slicing security protocols unveiled by GSMA
Forthcoming Tech Gatherings
- Black Hat 2025 - Registration available for early participants
- Cyber Vulnerability Engagement - A series of online workshops focusing on CVEs
- Summit on Cloud Computing Security - Featuring leading talks by specialists from AWS, Azure, and GCP
Focus on Threat Intelligence
| Threat Actor | Target | TTPs | Risk Level |
|---|---|---|---|
| Lazarus Group | Financial Institutions | Supply Chain Infiltration | High |
| FIN7 | Commerce Sector | Memory-Resident Malware | Medium |
Engage in the Discussion
If you're a security analyst, IT expert, or technology writer with valuable perspectives, your contributions are welcome. Your input can help enrich the worldwide cybersecurity conversation and affirm your thought leadership.
Updated Daily - Because Threats Never Sleep.
Stay informed with AxisCommonsPortal Security Intelligence.