Key Breakthroughs from RSA Conference 2025 - Day 1

Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, and a prototype AI Insight Summary tool using generative AI for data summarization (Sumo Logic Operations). Against a backdrop of escalating AI-driven threats and evolving regulatory demands, organizations unveiled groundbreaking advancements in artificial intelligence, identity management, threat detection, and data security. Graylog announced the Spring Release of Graylog Security, rolling out capabilities for faster threat detection, refined workflows, and smart data retention, leveraging automation for cost-effective data lake storage (Graylog Release). Abnormal AI launched two autonomous AI agents: the AI Phishing Coach, which replaces generic security training with a personalized, real-time feedback platform, and the AI Data Analyst, which transforms complex security data into instantly usable intelligence (Abnormal AI Launch). Cisco unveiled major security capabilities, including new XDR capabilities, Splunk enterprise security automation, deepened Cisco/ServiceNow partnership, AI supply chain risk management, enhanced critical infrastructure protection for IT and OT, Foundation AI team for secure AI adoption, and an open-source reasoning model for security applications (Cisco Security). This year’s Day 1 announcements underscored the industry’s focus on AI, identity management, threat detection, and data security. Powered by Anthropic’s LLM technology and Arctic Wolf’s security telemetry, Cipher delivers fast and accurate insights across endpoints, networks, cloud, and identity, enhancing threat detection and response (Arctic Wolf Cipher). Blackpoint Cyber unveiled CompassOne, a Unified Security Posture and Response platform with capabilities like asset inventory, tenant manager, MDR, exposure management, managed application control, and cloud posture management (Blackpoint CompassOne). Wallarm unveiled Agentic AI Protection, enhancing its platform to secure AI agents against prompt injection, jailbreaks, system prompt retrieval, and agent logic abuse, crucial for protecting AI-driven security operations (Wallarm Protection). BeyondTrust launched a free identity security risk service providing actionable insights to secure against vulnerabilities, employing AI-based detection for Paths to Privilege, and offering prioritized findings for security decisions (BeyondTrust Service). Skyhigh Security enhanced its SSE platform with DSPM capabilities for tackling data sprawl, ensuring security, compliance, and visibility, leveraging AI and ML-driven classification (Skyhigh DSPM). Palo Alto Networks announced Prisma AIRS for securing AI apps, agents, models, and datasets, with capabilities like AI model scanning and runtime security, alongside Prisma Access Browser 2.0 for GenAI visibility and Cortex XSIAM 3.0 combining proactive and reactive security (Palo Alto Announcements). Appknox released Storeknox, a post-launch app security solution targeting threats like fake apps and phishing, offering centralized monitoring, real-time detection, and proactive malware detection (Appknox Storeknox). Sentra launched Data Security for AI Agents, controlling how AI agents access and interact with sensitive data, purpose-built for securing AI workflows (Sentra Data Security). Censys launched a threat hunting module to track adversary infrastructure, integrating into existing security operations for proactive threat mitigation (Censys Threat Hunting). AppOmni unveiled a SaaS security MCP server reducing manual labor and enabling coordinated security decisions by delivering information from multiple tools, enhancing SaaS identity insights (AppOmni MCP). LiveDrop introduced a software-based data diode, offering top-level security like hardware diodes but with lower cost and complexity, protecting against data leaks and attacks (LiveDrop Diode). NVIDIA enhanced its cybersecurity AI platform with the NVIDIA DOCA software framework, part of its cybersecurity AI platform, focusing on runtime security for AI workloads. EQTY Lab introduced AI Guardian, a governance tool aligning autonomous AI agents with security standards and business policies, using a cryptographic certificate system rooted in an on-silicon trust layer, developed with Intel and NVIDIA. Data security was a key focus, with several announcements addressing data protection in AI and cloud environments. Flashpoint added new capabilities to its Ignite platform, including AI-powered risk discovery, curated threat feeds, and on-demand data source expansion (Flashpoint Enhancements). ArmorCode unveiled Anya, an agentic AI solution for AppSec and product security teams, addressing alert fatigue by delivering contextual insights across an organization’s security posture. Cyber Security News compiles the sector’s most significant announcements, emphasizing how the industry addresses contemporary challenges through innovation, collaboration, and automation. BrandShield launched Resolve, an AI-powered external threat detection platform for phishing, impersonation, and dark web threats, combining AI detection with 24/7 SOC team support (BrandShield Resolve). Arctic Wolf introduced Cipher, an AI security assistant developed in collaboration with Anthropic, integrated into the Arctic Wolf Aurora Platform. Anetac extended its Identity Vulnerability Management platform to unify non-human and human identity vulnerabilities, including detection of behavioral anomalies, compromised credentials, dormant accounts, and access chain mapping (Anetac Extension). Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Anya, with over 285 integrations, acts as an intelligent, conversation-driven virtual security champion, interpreting and correlating data to accelerate decision-making (ArmorCode Anya). Oasis Security launched NHI Provisioning, automating the creation, governance, and security of Non-Human Identities (NHIs) from inception, designed to be infrastructure- and vault-agnostic, ensuring security without impacting developer experience (Oasis NHI). Identity security was a major focus, with several announcements addressing both human and non-human identities. SOCRadar launched Copilot, an AI-powered cybersecurity assistant enhancing platform efficiency, sharing knowledge, and automating routine operations, aiding teams in being proactive against evolving risks (SOCRadar Copilot). RSA announced a suite of innovations including RSA Help Desk Live Verify for bi-directional identity verification to prevent social engineering, Windows Desktop Logon for passwordless access via QR code and mobile FIDO, and Secure Onboarding with ID Verification combating deepfake fraud with government ID and liveness detection (RSA Innovations).

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 30 Apr 2025 11:45:07 +0000


Cyber News related to Key Breakthroughs from RSA Conference 2025 - Day 1

CVE-2022-20866 - A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This ...
2 years ago
Researchers extract RSA keys from SSH server signing errors - A team of academic researchers from universities in California and Massachusetts demonstrated that it's possible under certain conditions for passive network attackers to retrieve secret RSA keys from naturally occurring errors leading to failed SSH ...
1 year ago Bleepingcomputer.com
10 of the biggest zero-day attacks of 2023 - Here are 10 of the biggest zero-day attacks of 2023 in chronological order. Zero-day attacks started strong in 2023 with CVE-2023-0669, a pre-authentication command injection vulnerability in Fortra's GoAnywhere managed file transfer product. ...
1 year ago Techtarget.com CVE-2023-0669 CVE-2023-34362 CVE-2023-36884 CVE-2023-4863 CVE-2023-41992 CVE-2023-41991 CVE-2023-41993 CVE-2023-22515
RSA Conference 2024: AI and the Future Of Security - The first week of May saw security practitioners from all over the globe come to the city by the bay to participate in RSA. In 1991, just a handful of security researchers got together for a single panel discussion about DES versus DSS. From those ...
11 months ago Securityboulevard.com
RSA Keys Security: Insights from SSH Server Signing Errors - In the realm of secure communication protocols, RSA keys play a pivotal role in safeguarding sensitive information. Recently, a group of researchers from prominent universities in California and Massachusetts uncovered a vulnerability in the SSH ...
1 year ago Securityboulevard.com
Check Point released hotfix for actively exploited VPN zero-day - MUST READ. Check Point released hotfix for actively exploited VPN zero-day. Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. Apple ...
11 months ago Securityaffairs.com CVE-2024-23222 CVE-2023-22515 CVE-2023-40044 CVE-2023-20109
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
1 week ago Cybersecuritynews.com Inception
Samsung Galaxy S23 hacked two more times at Pwn2Own Toronto - Security researchers hacked the Samsung Galaxy S23 smartphone two more times on the second day of the Pwn2Own 2023 hacking competition in Toronto, Canada. The contestants also demoed zero-day bugs in printers, routers, smart speakers, surveillance ...
1 year ago Bleepingcomputer.com
Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine - Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari. Actively Exploited Apple yesterday described the vulnerability as something an attacker could exploit to execute arbitrary code on affected systems. ...
1 year ago Darkreading.com CVE-2024-23222
Apple fixes Safari WebKit zero-day flaw exploited at Pwn2Own - Apple has released security updates to fix a zero-day vulnerability in the Safari web browser exploited during this year's Pwn2Own Vancouver hacking competition. The company addressed the security flaw on systems running macOS Monterey and macOS ...
11 months ago Bleepingcomputer.com CVE-2024-27834
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
7 months ago Aws.amazon.com
Samsung Galaxy S23 hacked twice on first day of Pwn2Own Toronto - Security researchers hacked the Samsung Galaxy S23 twice during the first day of the consumer-focused Pwn2Own 2023 hacking contest in Toronto, Canada. They also demoed exploits and vulnerability chains targeting zero-days in Xiaomi's 13 Pro ...
1 year ago Bleepingcomputer.com
Pwn2Own Automotive: $1.3M for 49 zero-days, Tesla hacked twice - The first edition of Pwn2Own Automotive has ended with competitors earning $1,323,750 for hacking Tesla twice and demoing 49 zero-day bugs in multiple electric car systems between January 24 and January 26. Throughout the contest organized by Trend ...
1 year ago Bleepingcomputer.com
In a first, cryptographic keys protecting SSH connections stolen in new attack - For the first time, researchers have demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete compromise when naturally occurring computational errors occur while the ...
1 year ago Arstechnica.com
Recap from Singapore FinTech Festival - This was my first time attending the Singapore FinTech Festival and I thoroughly enjoyed my time at the conference, chatting with colleagues, listening to sessions, and visiting booths. The conference was started in 2016 by the Monetary Authority of ...
1 year ago Feedpress.me
Product showcase: Protect digital identities with Swissbit's iShield Key Pro - In today's fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. ...
10 months ago Helpnetsecurity.com
The Westminster honeytrap mystery is even stranger than we thought - The honeytrapper - as we shall call him, her or them - first popped up on Saturday, 23 September last year in Bournemouth, the opening day of the Liberal Democrats' annual conference. We have spoken to two male conference attendees who received ...
1 year ago Bbc.com
Cisco discloses new IOS XE zero-day exploited to deploy malware implant - Cisco disclosed a new high-severity zero-day today, actively exploited to deploy malicious implants on IOS XE devices compromised using the CVE-2023-20198 zero-day unveiled earlier this week. The company said it found a fix for both vulnerabilities ...
1 year ago Bleepingcomputer.com CVE-2023-20198 CVE-2023-20273 CVE-2021-1435
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
7 months ago Securelist.com
Microsoft announces deprecation of 1024-bit RSA keys in Windows - Microsoft has announced that RSA keys shorter than 2048 bits will soon be deprecated in Windows Transport Layer Security to provide increased security. Rivest-Shamir-Adleman is an asymmetric cryptography system that uses pairs of public and private ...
1 year ago Bleepingcomputer.com
A Cost-Effective Encryption Strategy Starts With Key Management - Companies have a problem with encryption: While many businesses duly encrypt sensitive data, there is no standard strategy for deploying and managing an key-management infrastructure. Every organization needs to make a large number of decisions in ...
11 months ago Darkreading.com Equation
Millions Of RSA Key Exposes Serious Flaws That Can Be Exploited - A disturbing security vulnerability has been uncovered affecting RSA encryption keys used across the internet, with researchers discovering that approximately 1 in 172 certificates found online are susceptible to compromise through a mathematical ...
1 month ago Cybersecuritynews.com
RSAC panel debates confidence in post-quantum cryptography - Lattice-based cryptography is a proposed answer to the post-quantum cryptography dilemma, but a recently published paper cast doubt on this theory. While it appears to be a false alarm, experts were left questioning their confidence in PQC efforts. ...
11 months ago Techtarget.com
Behind EB Control's Revolutionary Patented Key Management System - If you're knee-deep in the world of data security, you'd agree that the key to unlocking superior protection lies, quite literally, in the keys- the encryption keys, to be precise. When it comes to managing these critical elements to safeguard your ...
1 year ago Securityboulevard.com
Bitwarden: how to create and use Passkeys to sign in - They can use a master password and improve security by adding a two-factor authentication option to the process. A private part of it never leaves the device, which means that all standard password attacks don't work against passkeys. I used the ...
1 year ago Ghacks.net

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)