IPQS launched its IPQS Email Verification Database. This database is the first of its kind, enabling businesses to validate email addresses at scale. It reduces the need for external API calls for every fraud check, and makes it easier to comply with data privacy regulations. The IPQS Email Verification Database enables businesses to identify fraudulent, disposable, or suspicious emails with unparalleled accuracy by tapping into IPQS’s vast repository of email reputation data. By analyzing factors such as email age, domain reputation, and historical fraud associations, companies can significantly enhance fraud detection while improving customer trust. Additionally, businesses can maintain better email hygiene by filtering out invalid or risky email addresses, improving deliverability rates and sender reputation. IPQS provides businesses with the most comprehensive access to granular email risk intelligence. This enables organizations to detect high-risk users, block fraudulent account registrations, and prevent payment fraud at scale. Delivered securely via an API, the database is updated on a daily, weekly, or monthly basis, depending on business requirements: On-Premise Deployment; Lightweight Design; Regulatory Compliance; Unmatched Data Accuracy; Email List Hygiene. With the IPQS Email Verification Database, businesses can tap into the freshest, most comprehensive email risk intelligence, CEO Dennis Weiss said.
AI-powered cyberattacks are expected within a year and will emerge from models that are less controlled than OpenAI and Anthropic
Kevin Mandia, one of the most prolific cyber entrepreneurs and investors, predicts the world is only a year away from an AI-agent-enabled cyberattack. Mandia warned that chances are we won’t even know an AI tool was the perpetrator. “Everybody’s going to look at that, wonder how that got done, and it’s probably AI behind it,” he told Axios on the sidelines of the RSA Conference. AI doomsday scenarios have haunted cyber pros for decades, but the introduction of generative AI hypercharged their fears. Some have predicted we’ll see autonomous cyber weapons that can evade security tools in the wild by 2027. Others predict that one day the robots will be fighting robots. Mandia founded famed cybersecurity incident response company Mandiant in the early 2000s. The type of attack Mandia is predicting will likely come from the cyber criminal side of the world, rather than nation-states, he said. Mandia added that the first iteration of any new attack style is typically “a bit sloppy” and that foreign adversaries like China are more likely to take their time before rushing to follow suit. “There is enough R&D happening right now on how to use AI [at legitimate organizations] that the criminal element is doing that R&D as well,” he said. Models from OpenAI, Anthropic and other popular AI companies aren’t likely to be involved in the attack that Mandia is predicting. Those models are “pretty darn good” at blocking such blatant violations of their safety parameters. “It’s going to come from some model that’s somewhere out there that’s less controlled,” he said. Chester Wisniewski, global field CISO at Sophos, told Axios that cyber criminals may already have the capabilities — but many of them don’t have a real incentive to tap into them yet. “Fortunately today, cyber criminals are really lazy, and because we keep leaving our wallets open with large sums of cash in them, they’re happy to just steal the money and move on and not do anything fancy,” Wisniewski said.
JFrog’s software supply chain platform integration with Nvidia to scan all components for vulnerabilities, version them and track them across the entire development lifecycle, along with end-to-end artifact and model management
Software supply chain company JFrog announced a new strategic partnership with Nvidia Corp. to power what the company calls the next era of enterprise AI. Under the partnership, JFrog’s platform will serve as the central software artifact repository and secure model registry within Nvidia’s recently unveiled Enterprise AI Factory. The initiative is designed to help enterprises build, deploy and manage next-generation AI workloads, including agentic and physical AI applications, in a secure and scalable environment. The integration between JFrog and Nvidia will allow users to gain secure and governed visibility into all software components, including ML models and engines. The components can be scanned for vulnerabilities, versioned and tracked across the entire software development lifecycle. Users will also benefit from end-to-end artifact and model management, with the ability to seamlessly pull, upload and host AI models, datasets and containers. The integration includes full support for Nvidia NIMs and other assets optimized for the Enterprise AI Factory architecture. By using JFrog Artifactory, organizations can eliminate the need to access components from external sources, improving both performance and security. The integration includes the ability for the JFrog Platform to run natively on Nvidia’s Grace Blackwell architecture to help reduce latency and process tasks with unparalleled performance, efficiency and scale. Additionally, the integration is expected to support a wide range of AI-enabled enterprise applications, agentic and physical AI workflows, autonomous decision-making and real-time data analysis across various industries, including financial services, healthcare, telecommunications, retail, media and manufacturing.
Glean to integrate Palo Alto Network’s security platform to enable secure deployment of enterprise AI agents at scale through runtime security; offers unified data governance across the 100+ connected SaaS applications with SASE-native controls and real-time visibility
Glean, the Work AI platform, announced a strategic technology partnership with Palo Alto Networks to further secure and accelerate the use of AI agents in the enterprise. With new integrations to Palo Alto Networks Prisma AIRS and Prisma Access Browser and AI Access, Glean customers gain enhanced visibility and control over how AI agents operate and interact with sensitive enterprise data – enabling rapid innovation without sacrificing trust, security, or compliance. Glean is purpose-built to solve the challenges of deploying AI at scale in the enterprise. From day one, it was architected with enterprise-grade security at its core: enforcing source-level permissions, isolating customer data, and integrating tightly with identity systems. That foundation has since evolved to include proactive guardrails for agent behavior, continuous governance scanning, and an open ecosystem of security partners. Palo Alto Networks Prisma AIRS is the world’s most comprehensive AI security platform that is designed to protect the entire enterprise AI ecosystem, providing Model Scanning, Posture Management, AI Red Teaming, Runtime Security, and Agent Security. The new integration of Prisma AIRS with Glean’s platform will offer: Secure AI adoption at scale with Runtime Security; Confident cloud data governance Posture Management; Zero-compromise security.
Virtana’s full-stack observability platform integrates natively with NVIDIA GPU platforms to offer in-depth insights into AI environments by continuously collecting telemetry
Virtana announced the launch of Virtana AI Factory Observability (AIFO), a powerful new capability that extends Virtana’s full-stack observability platform to the unique demands of AI infrastructure. With deep, real-time insights into everything from GPU utilization and training bottlenecks to power consumption and cost drivers, AIFO enables enterprises to turn complex, compute-intensive AI environments into scalable, efficient, and accountable operations. This launch strengthens Virtana’s position as the industry’s broadest and deepest observability platform, spanning AI, infrastructure, and applications across hybrid and multi-cloud environments. Virtana’s AI Factory Observability (AIFO) helps enterprises treat AI infrastructure with the same level of visibility, discipline, and accountability as traditional IT. As an official NVIDIA partner, Virtana integrates natively with NVIDIA GPU platforms to deliver in-depth telemetry, including memory utilization, thermal behavior, and power metrics, providing precise, vendor-validated insight into the most performance-critical components of the AI Factory. This deep integration delivers accurate, actionable intelligence at enterprise scale. Virtana AI Factory Observability (AIFO) is purpose-built to meet the demands of AI operations. It continuously collects telemetry across GPUs, CPUs, memory, network, and storage and then correlates that data with training and inference pipelines to provide clear and actionable insights. Core capabilities include: GPU Performance Monitoring; Distributed Training Visibility; Infrastructure-to-AI Mapping; Power and Cost Analytics; Root Cause Analysis. AIFO is already delivering measurable results in production AI environments across multiple industries. Operational outcomes include: 40% reduction in idle GPU time, improving resource utilization and reducing infrastructure costs; 60% faster mean time to resolution (MTTR) for AI-related incidents; 50% decrease in false alerts, reducing operational noise and accelerating response; 15% improvement in power efficiency, supporting sustainability goals.
NordVPN launches post-quantum encryption across all its applications complying with NIST’s latest cryptographic standards
NordVPN has launched post-quantum encryption (PQE) support for all its VPN applications. The first iteration of post-quantum cryptography was implemented on the NordVPN Linux application last year. In 2025, NordVPN also rolled out its PQE feature for Windows, macOS, iOS, and Android, including Android TV and tvOS. The PQE upgrade integrates quantum-resistant algorithms into NordLynx, the company’s high-speed VPN protocol based on WireGuard, and complies with NIST’s latest cryptographic standards. In September 2024, NordVPN released a Linux app update with the first post-quantum cryptography upgrade for the Nordlynx protocol — a high-performance VPN protocol known for its extreme speed and security, based on WireGuard. The upgraded protocol complied with the latest National Institute of Standards and Technology (NIST) standards for post-quantum encryption and protected Linux users from quantum decryption, while also collecting essential performance metrics, such as impact on connection speeds and latency. NordVPN’s early Linux deployment allowed the company to collect performance data to optimize encryption transitions without degrading user experience, enabling a seamless rollout across all platforms.
Picus Security’s service accurately quantifies the actual exploitability of vulnerabilities against real-world attack techniques in real time using context-aware scoring that replaces assumptions with evidence
Cybersecurity validation startup Picus Security launched Picus Exposure Validation, a new service that allows security teams to verify the exploitability of vulnerabilities based on their unique environments. The new capability has been designed to continuously test security controls against real-world attack techniques to identify which vulnerabilities are truly exploitable and which can safely be deprioritized. Picus Exposure Score provides an evidence-based, context-aware metric that accurately quantifies actual risk by accounting for how effectively current security controls mitigate real threats. Common Vulnerability Scoring System, Exploit Prediction Scoring System and Known Exploited Vulnerabilities offer theoretical risk signals. Picus Exposure Validation delivers proof by testing threats against your production defenses in real time. It replaces assumptions with evidence so security teams can focus on vulnerabilities that are exploitable. Picus Exposure Validation allows security teams to prioritize accurately and deprioritize safely. The service leverages a transparent, automated Exposure Score and advanced security validation technologies to allow teams to focus on threats that truly matter and confidently set aside vulnerabilities that pose no real risk. The new service also enables faster, more confident decision-making. With real-time reporting, continuous attack simulations and in-depth security control testing, users are provided with the evidence needed for compliance documentation and executive communication. Picus Exposure Validation additionally helps save time and improve mitigation efforts via automated validation that reduces manual workloads. The resulting tailored recommendations support rapid improvements in security control effectiveness, even when immediate patching isn’t feasible.
Persado’s multi-agent AI platform for financial services marketing continuously learns from consent orders, public comments, and evolving regulations, and refines analysis with every interaction to offer 90% reduction in legal review
Persado, a provider of AI-powered content compliance and performance solutions for marketing, today launched Persado Marketing Compliance AI, the first agentic AI platform purpose-built for financial services marketing and legal teams to speed time to market of customer communications. The enterprise-grade solution integrates regulatory compliance analysis, performance prediction scoring, and brand fit insights, so companies can identify and rapidly resolve risks within content, shortening legal reviews by up to 90%.Persado’s first Marketing Compliance AI solution is designed for large and mid-size retail banks and credit unions. The solution leverages AI agents and builds on a decade of content insights gleaned from working with 8 of the 10 largest U.S. banks. In turn, marketers can rapidly analyze, edit, and finalize copy, achieving (on average): 90% reduction in review time; 85% reduction in compliance rejections; 80%+ reduction in campaign cycle time. Persado Marketing Compliance AI applies multi-agent AI that continuously learns from consent orders, public comments, and evolving regulations—and refine analysis with every interaction, providing institutions with smarter, more precise insights over time. AI agents include: Regulation agents; Marketing agents; Library and oversight agents. Additional solution capabilities include analysis of copy in PDF, text, and image formats for adherence to Federal, state, and local laws, a library of high-risk expressions, copy performance scoring, disclaimer analysis, customizable compliance guidelines, and more. Persado also offers customizable, integrated workflows that enable marketing and legal to collaborate in the platform in real time, leveraging the agentic output to streamline decision making.
Banking groups led by ABA want the SEC to revoke its cybersecurity incident disclosure requirement because of need for confidentiality about critical infrastructure
American banking groups want the Securities and Exchange Commission (SEC) to revoke its cybersecurity incident disclosure requirements. These groups, led by the American Bankers Association (ABA), wrote to the SEC last week, contending that disclosing cybersecurity incidents “directly conflicts with confidential reporting requirements intended to protect critical infrastructure and warn potential victims.” Joining the ABA were the Securities Industry and Financial Markets Association, the Bank Policy Institute, Independent Community Bankers of America, and the Institute of International Bankers, who argue the rule hinders regulatory efforts to bolster national cybersecurity. The letter was flagged in a report Monday (May 26) by Cointelegraph, which noted that the rule in question — the SEC’s Cybersecurity Risk Management rule, published in July 2023 — requires companies to quickly disclose incidents such as data breaches or hacks. But the banking groups say this rule was flawed from the beginning and has been problematic in practice since going into effect. The letter said that the “complex and narrow disclosure delay mechanism” interferes with incident response and law enforcement, while also breeding “market confusion” between mandatory and voluntary disclosures.
Breaking encryption with a quantum computer just got 20 times easier following modular exponentiations getting twice as fast and packing more useful data into the same space to improve error correction
Google just released a new research paper, and it could be a big deal for Bitcoin and online security. Their quantum research has found that it might take 20 times less power and effort for a quantum computer to break RSA encryption – the technology that protects things like bank accounts and Bitcoin wallets – than experts thought earlier. the breakthrough has come from two places: better algorithms and smarter error correction. Researchers have made two big improvements in how quantum computers handle encryption. The first is that they have managed to make the modular exponentiations twice as fast. Then, they have also packed more useful data into the same space to improve error correction. However, the security implications are of a much serious nature. RSA and similar systems go against the global secure communications, ranging from banking to digital signatures.