Latest Cybersecurity News: Progress of European AI Act Stumbles, Cybersecurity Firms Update Products, and More

The European Union has been working towards implementing regulations for artificial intelligence (AI) with the goal of protecting consumers and businesses from potential harm. However, recent reports suggest that progress towards implementing the AI Act has stumbled, despite being thought to be close. The EU believes that AI technology has the potential to be highly beneficial but also recognizes the need for regulation.

The European Commission has already proposed regulations for AI that target specific sectors such as healthcare and transportation, as well as high-risk applications such as biometric identification systems. However, some experts believe that the current proposal lacks clarity and may not be sufficient in protecting the public from potential harm caused by AI.

The Cyberspace Solarium Commission Deems the Current System for Designating Critical Sectors Inadequate.

The Cyberspace Solarium Commission (CSC) has released a report that calls into question the current system used to designate critical sectors, citing its inadequacy in identifying and protecting critical infrastructure. The CSC believes that the current approach needs to be updated in order to address the digital threats that the US faces.

The current system for designating critical infrastructure was first enacted in 2013 and is intended to identify certain sectors, such as energy, communications, and finance, as crucial to the functioning of the US economy and society as a whole. However, the CSC argues that this system only focuses on the most obvious targets for potential cyberattacks and does not account for the many other essential sectors that are not currently designated as critical.

Cybersecurity firms Dragos and SentinelOne see layoffs after poor Q1 results

Two cybersecurity firms, Dragos and SentinelOne, have recently experienced layoffs amid financial struggles. Dragos announced that it would be laying off 50 employees, or roughly 9% of its workforce, after missing its Q1 targets. Similarly, SentinelOne also announced layoffs that impacted 100 employees, representing 5% of its workforce, after poor financial results led to a decline in share value.

These layoffs demonstrate the financial pressures that cybersecurity firms are facing as the industry continues to evolve and adapt to the ever-changing cybersecurity landscape. Companies must prioritize staying on top of technological advancements while also maintaining profitability.

Radiflow and Network Perception Announce Product Updates

OT security firms Radiflow and Network Perception have both announced significant updates to their products. Radiflow, which specializes in industrial cybersecurity, has added new features to its iSID platform, including real-time dynamic asset tracking. Network Perception has updated its Compliance and Security Analyzer tool, which is designed to help organizations identify and resolve compliance issues within their networks.

These product updates demonstrate the importance of continually innovating and improving cybersecurity solutions in order to stay ahead of cyber attacks and meet the evolving needs of businesses.

OWASP publishes top 10 list of security risks for large language model applications

The Open Web Application Security Project (OWASP) has published a Top 10 list of security risks associated with large language model (LLM) applications. LLMs are AI systems that are trained to produce and understand human language. OWASP’s report highlights potential security vulnerabilities such as data leaks, bias, and adversarial attacks.

The report serves as a reminder that as AI technology continues to develop and advance, it also brings new security risks that must be addressed.

The Tor Project Develops Anti-Denial-of-Service Feature

The Tor Project, which focuses on developing online anonymity tools, is currently working on a denial-of-service (DoS) prevention feature where clients will be asked to “solve” a puzzle to prove they have the solution. This new feature is intended to help prevent DoS attacks on Tor’s network by requiring clients to complete a computational task before being allowed access.

The move underscores the Tor Project’s commitment to maintaining the integrity and security of its network, even in the face of potential cyber attacks.

Qualys Shares Technical Details of RenderDoc Vulnerabilities

Cybersecurity firm Qualys has shared technical details on three vulnerabilities in the RenderDoc graphics debugger. RenderDoc is a tool used by graphics developers to debug and analyze applications using OpenGL, Vulkan, and Direct3D.

The vulnerabilities were identified and reported to the RenderDoc development team by Qualys, highlighting the importance of vulnerability disclosure in improving cybersecurity.

QuSecure awarded Small Business Innovation Research contract for Post-Quantum Encryption

The US Army has awarded a Small Business Innovation Research (SBIR) Phase II contract to QuSecure for post-quantum encryption. Post-quantum encryption is a type of cybersecurity that aims to protect sensitive information from quantum computers, which pose a threat to current encryption methods.

This development highlights the importance of staying ahead of emerging threats as quantum computers become increasingly powerful and pose a significant risk to traditional encryption methods.

Quantum Brilliance fully releases Qiskit SDK

Australian firm Quantum Brilliance has fully released its Qristal software development kit (SDK). The SDK makes quantum computing more accessible to businesses and developers by providing an easy-to-use platform for building quantum applications.

This development highlights the ongoing effort to make quantum computing more accessible and easy to use, paving the way for a more secure and technologically advanced future.

In conclusion, these recent developments in cybersecurity highlight the constantly evolving nature of the industry and the need to stay ahead of potential threats. It is clear that cybersecurity must be a top priority for businesses and governments alike, as outdated systems and inadequate regulations can leave companies and individuals vulnerable to cyberattacks. The ongoing efforts to develop and improve cybersecurity solutions illustrate the importance of innovation, collaboration, and adaptation in this critical field.

Explore more

Resilience Becomes the New Velocity for DevOps in 2026

With extensive expertise in artificial intelligence, machine learning, and blockchain, Dominic Jainy has a unique perspective on the forces reshaping modern software delivery. As AI-driven development accelerates release cycles to unprecedented speeds, he argues that the industry is at a critical inflection point. The conversation has shifted from a singular focus on velocity to a more nuanced understanding of system

Can a Failed ERP Implementation Be Saved?

The ripple effect of a malfunctioning Enterprise Resource Planning system can bring a thriving organization to its knees, silently eroding operational efficiency, financial integrity, and employee morale. An ERP platform is meant to be the central nervous system of a business, unifying data and processes from finance to the supply chain. When it fails, the consequences are immediate and severe.

When Should You Upgrade to Business Central?

Introduction The operational rhythm of a growing business is often dictated by the efficiency of its core systems, yet many organizations find themselves tethered to outdated enterprise resource planning platforms that silently erode productivity and obscure critical insights. These legacy systems, once the backbone of operations, can become significant barriers to scalability, forcing teams into cycles of manual data entry,

Is Your ERP Ready for Secure, Actionable AI?

Today, we’re speaking with Dominic Jainy, an IT professional whose expertise lies at the intersection of artificial intelligence, machine learning, and enterprise systems. We’ll be exploring one of the most critical challenges facing modern businesses: securely and effectively connecting AI to the core of their operations, the ERP. Our conversation will focus on three key pillars for a successful integration:

Trend Analysis: Next-Generation ERP Automation

The long-standing relationship between users and their enterprise resource planning systems is being fundamentally rewritten, moving beyond passive data entry toward an active partnership with intelligent, autonomous agents. From digital assistants to these new autonomous entities, the nature of enterprise automation is undergoing a radical transformation. This analysis explores the leap from AI-powered suggestions to true, autonomous execution within ERP