惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

博客园 - 司徒正美
aimingoo的专栏
aimingoo的专栏
MongoDB | Blog
MongoDB | Blog
云风的 BLOG
云风的 BLOG
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
酷 壳 – CoolShell
酷 壳 – CoolShell
博客园 - 聂微东
Y
Y Combinator Blog
T
Tailwind CSS Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
S
SegmentFault 最新的问题
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
博客园 - 【当耐特】
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
J
Java Code Geeks
美团技术团队
Google DeepMind News
Google DeepMind News
博客园_首页
Apple Machine Learning Research
Apple Machine Learning Research
T
The Blog of Author Tim Ferriss

Cybersecurity Dive - Latest News

Iran-linked hackers target key US, allied sectors with sophisticated spear-phishing messages CISA asks cybersecurity community to alert it to vulnerability exploitation Grafana Labs links GitHub environment breach to TanStack npm supply chain attack 7-Eleven hit by data breach Microsoft disrupts cybercrime operation that hid behind legitimate software Compromised coding tool helped hackers breach thousands of GitHub repositories Telecom sector launches its own private ISAC Patch bypass allows hackers to exploit prior flaw in SonicWall SSL-VPN Grafana Labs says hacker gained access to codebase through leaked token How a government contest launched a revolution in AI-based bug hunting Attackers exploit critical flaw in Cisco Catalyst SD-WAN Controller MSPs need AI to fight AI-fueled cyberthreats: Guardz More money is going to physical security, but it’s often CISOs that oversee it: EY Frontier AI models reap rapid discovery of security vulnerabilities West Pharmaceutical starts restoring operations after ransomware attack Foxconn confirms cyberattack affecting some North American facilities OpenAI launches Daybreak to combat cyber threats Canvas owner reaches ‘agreement’ with threat actors after data breach Guardrail Technologies launches Traffic Light for Code & AI™; first security technology to verify & secure AI code and the people creating it Identity takes center stage as a leading factor in enterprise cyberattacks AI and an absent government: Takeaways from RSAC 2026 Second Canvas data breach causes major disruptions for schools, colleges AI used to develop working zero-day exploit, researchers warn New cybersecurity industry alliance aims to lead US critical infrastructure protection Identity is the new perimeter as rapid NHI proliferation threatens visibility and control Instructure confirms cybersecurity incident Anthropic’s Claude used in attempted compromise of Mexican water utility Businesses hide vast majority of ransomware attacks, report finds Palo Alto Networks warns state-linked cluster behind zero-day exploitation Businesses eager but unprepared for AI to transform their security strategies Iran-sponsored threat group behind false flag social engineering campaign NIST will test three major tech firms’ frontier AI models for cybersecurity risks Trellix investigating breach of source code repository CISA urges critical infrastructure firms to ‘fortify’ before it’s too late Critical vulnerability in cPanel leads to widespread exploitation New MOVEit vulnerabilities prompt urgent patch warning How OpenClaw’s agent skills become an attack surface White House questions tech industry on defensive AI use, cybersecurity resilience As email phishing evolves, malicious attachments decline and QR codes surge US and allies urge ‘careful adoption’ of AI agents PwC partners with Google Cloud to take on the managed security market US agencies promote zero-trust practices for operational technology networks CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog State CISOs losing confidence in ability to manage cyber risks ‘Fundamental tension’ undermines manufacturers’ cybersecurity North Korea-linked actor targets Web3 execs in social-engineering campaign Major critical infrastructure supplier reports cyberattack US, UK authorities warn that Firestarter backdoor malware survives patching When security becomes the attack surface: Why endpoint protection must evolve Hasbro expects March cyberattack to impact second-quarter revenue AI-written software creates hassles for wary security teams China disguises cyberattacks with ‘covert network’ botnets, US and allies warn Iran-nexus threat groups refine attacks against critical infrastructure Trump’s CISA director pick withdraws after tumultuous nomination Microsoft SharePoint vulnerability widely exposed across multiple countries Phishing — sometimes with AI’s help — topped initial-access methods in Q1, Cisco says CISA urges security teams to view environments following axios compromise Big banks seek to ease security worries as AI push accelerates CISA confirms exploitation of 3 more Cisco networking device vulnerabilities Stellantis teams with Microsoft to strengthen digital capabilities Vulnerability exploitation surges often precede disclosure, offering possible early warnings Vercel systems targeted after third-party tool compromised Beyond IT: Cybersecurity is a strategic business risk TP-Link routers face exploitation attempt linked to high-severity flaw US joins nearly two dozen other countries in striking back against DDoS-for-hire platforms CIOs fret over rising security concerns amid AI adoption CISA cancels prestigious summer internships, citing government shutdown NIST limits vulnerability analysis as CVE backlog swells FCC exempts Netgear from foreign router ban Medium-severity flaw in Microsoft SharePoint exploited Brute-force cyberattacks originating in Middle East surge in Q1 FCC signals continued commitment to Cyber Trust Mark program CISOs see gaps in their incident response playbooks US, Indonesia shut down ‘sophisticated’ phishing kit Stryker warns of earnings fallout from March cyberattack Nearly 4K industrial control devices vulnerable to Iran-linked hacking campaign NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure Iran-linked hackers target water, energy in US, FBI and CISA warn CISA’s vulnerability scans, field support on chopping block in Trump budget React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data Olympic Games, FIFA World Cup offer huge platforms, rich cyberattack surface Threat cluster launches extortion campaign using social engineering
New York regulator calls for additional cyber mitigation amid heightened threat environment
David Jones · 2026-05-22 · via Cybersecurity Dive - Latest News

An article from site logo

The guidance from the state Department of Financial Services arises from concerns about frontier AI and threats linked to the Iran war and other geopolitical risks.

Published May 22, 2026

Woman in a black suit stands behind a podium with a sign that reads "enhancing cybersecurity protecting New Yorkers."

New York Gov. Kathy Hochul announces a nation-leading cybersecurity plan in Brooklyn, New York on Aug. 9, 2023. A state financial industry regulator is issuing new guidance amid heightened concerns about geopolitical and frontier AI models. Courtesy of Darren McGee/ Office of Governor Kathy Hochul

The New York State Department of Financial Services (DFS) sent a letter on Thursday urging regulated entities and people to take additional steps in light of what it calls a heightened threat environment, referencing the geopolitical landscape and the development of frontier AI models. 

DFS called on regulated entities, including banks and other financial services firms that do business in New York, to consider taking additional steps to protect their environments. 

The letter comes weeks after a preview of Anthropic’s Mythos AI tool raised significant concerns in the banking industry about the model’s unprecedented ability to uncover security vulnerabilities.

DFS regulates more than 3,000 financial institutions, including banks, credit unions, insurance companies and other entities. 

Researchers from Google Threat Intelligence Group earlier this month warned that threat groups used AI to develop a working zero-day exploit. 

Palo Alto Networks, one of the early participants in testing Mythos, warned that it might be only a few months before bad actors have their hands on such technology and be able to accelerate exploitation activity. 

New York Gov. Kathy Hochul signed legislation in December requiring AI developers to post information about their safety protocols and report security incidents within 72 hours. The state can bring civil penalties for failure to comply or for making false statements. The bill also created an oversight office within DFS.

DFS Acting Superintendent Kaitlin Asrow urged organizations to assess their environment before making decisions about which steps to take. 

Among the suggested measures, DFS called on entities to immediately identify and remediate known exploited vulnerabilities, disable unnecessary ports, test resilience measures and test the integrity of data backup systems.