#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News

Cybersecurity | Breaking Cybersecurity News | The Hacker News

Category — Cybersecurity
Who's Really Using Your SaaS? The Rise of Non-Human Identities

Who's Really Using Your SaaS? The Rise of Non-Human Identities

Nov 10, 2025
As SaaS ecosystems expand, not every user is human anymore. AI assistants, automation bots, integration services, and API tokens now perform countless actions across business cloud applications, often with the same or greater access privileges as employees. These non-human identities (NHIs) are silently driving productivity while introducing a new class of risk: unmonitored, long-lived, and often misunderstood access. These machine credentials (service accounts, API keys, OAuth tokens, etc.) are essential for automation and integrations, but their growth far outpaces the oversight and security controls applied to them. The result is a widening visibility gap. A lot of NHI types enjoy broad permissions within SaaS apps, sometimes more privileges than a human user, yet they rarely get the same scrutiny as employee accounts. Over-privilege is common: about one-third of SaaS app integrations have access to sensitive data that exceeds their needs. Let's examine a few notable data brea...
Beyond Chrome: Risks of Malicious Extensions Across Traditional and AI Browsers

Beyond Chrome: Risks of Malicious Extensions Across Traditional and AI Browsers

Nov 10, 2025
Browser extensions have evolved over the years into powerful productivity platforms to streamline workflows, integrate business tools, and optimize how work is done. Now in the age of AI, extensions are once again evolving to enable advanced automation and data-driven decision-making directly in the browser. And as these extensions continue to mature, so will the cyberattacks. Today's extension-based attacks do not discriminate; they target every traditional browser, including Chrome, Edge, Firefox, and more, as well as the new AI-powered browsers like ChatGPT's Atlas and Perplexity's Comet. They adapt to each environment's security nuances. Most enterprises assume that if they secure one browser, it's enough.  The reality is that cross-platform extension threats are becoming increasingly common, and organizations must take broader vigilance. In this article, you'll learn why leveraging a Secure Enterprise Browsing (SEB) platform is critical for organizations to keep up with tod...
Identity Migration: Why it Feels Scary, and Necessary Steps for a Smooth Transition

Identity Migration: Why it Feels Scary, and Necessary Steps for a Smooth Transition

Nov 10, 2025
Identity platforms are an organization's backbone of secure access. But what happens when you need to migrate from one identity provider to another? The stakes are high: downtime, broken integrations, compliance gaps, and user frustration. Yet, with the right strategy and preparation, these fears can be addressed head-on. Identity migration is intimidating If a migration is poorly planned and executed, it can mean lost productivity, frustrated customers, and a hit to your business' bottom line. Identity touches every corner of an organization, from HR systems to customer portals. Beyond downtime, migrations often expose brittle integrations, undocumented dependencies, and legacy technologies that no one wants to touch. Add compliance requirements (SOC2, HIPAA, DORA) and the pressure mounts. Even well-planned transitions can surface unexpected issues, edge cases, and broken processes. Why consider identity migration at all? Why migrate at all? Often, it's about cost savings, strea...
Continuous Feedback Loops: Why Training Your AI-SOC Doesn’t Stop at Deployment

Continuous Feedback Loops: Why Training Your AI-SOC Doesn't Stop at Deployment

Nov 03, 2025
You invested in a new AI-SOC because you want your organization to be safe. You also don't want your SOC team to burn out from the flood of alerts they're receiving.  It's good at first. At deployment, the detections are lined up with your environment. Your SOC team reports it's going to be a learning curve, but it seems to be working. It's going well until a few months later, when it's not, at least not as well.  The problem is that the agent isn't processing alerts the way your team needs it to. It keeps flagging the CEO's logins as threats because it doesn't understand that he's traveling. It's also let a few real threats slip through the cracks. Threats that should have been easily caught. What's happening?  Pre-trained AI was built to recognize the familiar, and it does. It's trained on old data, old attack paths, and assumptions that made sense in the lab based on what's been observed before. What it can't do is understand the small, real-world details that an...
Governing AI Agents: From Enterprise Risk to Strategic Asset

Governing AI Agents: From Enterprise Risk to Strategic Asset

Nov 02, 2025
The proliferation of AI agents in the enterprise has moved from theoretical to practical at a remarkable pace. These agents, whether developed internally or licensed, are increasingly integrated into core business workflows. While they promise substantial gains in automation and productivity, they also introduce a new and complex class of security risks that demand immediate attention.  The core challenge is not whether to adopt AI agents, but how to govern them effectively. A disciplined approach to balancing innovation with security is essential for any organization looking to leverage AI without exposing itself to unacceptable risk.  Recent research highlights the urgency of this issue. A comprehensive study found that 82% of companies are already using AI agents, with 53% acknowledging they access sensitive information daily . This rapid adoption, often occurring without adequate oversight, creates significant vulnerabilities. The imperative is clear: organizations must...
Implementing AI in the SOC: Lessons Learned from Redis

Implementing AI in the SOC: Lessons Learned from Redis

Nov 02, 2025
AI SOC Agents are going through a hype cycle. If we're going by Gartner's Hype Cycle for Security Operations, 2025 , this technology is still an "Innovation Trigger", but it's at the cusp of "Peak of Inflated Expectations". Every vendor claims their solution will revolutionize security operations. Every conference features another keynote promising autonomous defense. And every CISO is being asked whether AI will replace their security team. At Redis, implementing AI in the SOC has been more of a measured journey. The model is more of a hybrid SOC, so there's a combination of external service providers as well as internal resources. In this case, Prophet Security is currently proving themselves alongside a more traditional MDR provider.  But let's take a step back.  The Tipping Point for AI Adoption within the SOC Considering an AI solution for Redis' SOC came down to the confluence of three drivers.  On an individual level, there was more value from AI tools an...
Modern Browser Attacks: Why Perimeter Tools Are No Longer Enough

Modern Browser Attacks: Why Perimeter Tools Are No Longer Enough

Oct 20, 2025
The browser has quietly become the most critical application in the enterprise — and the most targeted. With SaaS, cloud, and hybrid work redefining IT boundaries, browsers now handle proprietary data, credentials, and business workflows. Yet legacy security tools like firewalls, antivirus, and EDR were never designed to defend this new digital front line. The shift from being an ancillary tool to becoming the main location of work means legacy security solutions, such as firewalls, antivirus, VDI, etc., are not equipped to provide the necessary level of protection needed to secure today's organizations. The browser, once an afterthought, is now the weak link that legacy defenses simply can't secure.  This article examines the modern browser exploitation playbook and details why legacy tools alone are no match for today's cybercriminals. By adopting a Secure Enterprise Browser (SEB), enterprises can complement their existing security tools, shore up their weak link, and future-p...
What Happens to MSSPs and MDRs in the Age of the AI-SOC?

What Happens to MSSPs and MDRs in the Age of the AI-SOC?

Oct 20, 2025
For nearly two decades, managed-security models have defined how most organizations handle detection and response. Faced with alert overload, chronic staffing shortages, and the high cost of 24/7 coverage, many teams turned to Managed Security Service Providers (MSSPs) and later to Managed Detection and Response (MDR) vendors to fill the gap. Beyond staffing and capacity, many also lacked in-house expertise in building detection systems. It was a rational choice. MSSPs and MDRs provided 24/7 monitoring, experienced analysts, and predictable coverage. They gave companies without an in-house SOC a viable way to maintain security coverage in an increasingly complex threat landscape. But the ground has shifted. AI-driven SOC platforms are now automating large parts of what human analysts once did: triaging alerts, correlating signals, enriching incidents, and recommending or even executing responses. That raises a simple but profound question: what happens to the managed-security m...
Cybersecurity Resources