Momentum Cybersecurity Almanac 2025

The 2025 Cybersecurity M&A and Capital Markets Report highlights a record $119 billion in strategic activity with significant growth in AI security investments, multiple billion-dollar acquisitions, and a dynamic market shift toward AI-driven defense solutions. The report underscores AI’s transformative impact on cybersecurity offense and defense, with rapid vendor emergence and evolving governance challenges representing the central focus for future security strategies. #AISecurity #CyberArk #Wiz #MomentumCyber

Read More
Inside the 2026 Business Blast Radius: Dr. Amit Chaubey on Why Cyber Disruption Is Now a Sovereign Risk

Dr. Amit Chaubey discusses the expanding “2026 Business Blast Radius,” emphasizing how external dependencies and geopolitical risks threaten global infrastructure and organizational resilience. The rising cyber threats, including AI-enabled identity attacks and cloud exploits, demand a collective, proactive security approach. #ChakraX #GlobalCyberThreats…

Read More
THE KNOWNSEC LEAK: Yet Another Leak of China’s Contractor-Driven Cyber-Espionage Ecosystem – DomainTools Investigations | DTI

Leaked internal Knownsec documents show the company functions as a state-aligned cyber contractor providing an integrated espionage stack—ZoomEye, TargetDB, GhostX, Un‑Mail, and Passive Radar—supporting PLA/MPS/public-security and critical-infrastructure targeting worldwide. The corpus includes massive breach datasets (o_data_*), detailed TargetDB asset mappings (notably Taiwan telecom/finance/energy), and tooling for browser exploitation, mailbox takeover, PCAP-driven network reconstruction, persistence, and OPSEC/anti-forensics. #Knownsec #GhostX

Read More
The Cyber Express Weekly Roundup: Schools, Hacktivists, and National Cyber Overhauls

The first week of 2026 highlights the increasing complexity and global reach of cyber threats affecting various sectors from education to government. Effective cybersecurity responses now demand coordinated efforts, regulatory measures, and heightened awareness across all levels. #HighamLaneSchool #WhiteSupremacistWebsites #UKCyberSecurity #Prosura #USCyberCoalitions…

Read More
Cybersecurity Firms Secured  Billion in Funding in 2025: Analysis

Cybersecurity funding reached nearly $14 billion in 2025, marking a strong rebound after a contraction since 2021, with growth focused on governance, identity, and AI security. Investors are now favoring vendors with proven outcomes, emphasizing strategic links to operational disciplines and evolving buyer needs. #CybersecurityFunding #AIProtection…

Read More
A framework for securing AI in the enterprise

Securing AI must be approached as a lifecycle challenge that crosses development, operations, data, supply chain, and user interaction boundaries rather than fitting into any single existing security function. The article outlines five categories of enterprise AI risk and recommends lifecycle-based frameworks, real-time monitoring, supplier validation, and governance to maintain trust, accountability, and resilience. #ISOIEC42001 #NISTAIRMF

Read More
Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses

This article emphasizes that cybersecurity in 2026 will require a focus on resilience over prevention due to increasing automation and sophistication in cyber threats. Building organizational resilience through governance, technology, and culture is essential for enduring emerging risks like AI manipulation, third-party vulnerabilities, and quantum threats. #CyberResilience #AIThreats…

Read More
UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

The UK Government’s new “Cyber Action Plan” highlights the urgent need to address critical vulnerabilities in public sector digital infrastructure, including widespread reliance on legacy systems. The plan introduces new oversight, accountability, and workforce initiatives to improve cybersecurity resilience across government departments. #CrowdStrike #NHSecurity…

Read More
What is Identity Dark Matter?

The article discusses the fragmentation of digital identities across various platforms and the emergence of identity dark matter, which includes unmanaged, non-human, and orphaned identities. It emphasizes the security risks associated with ungoverned identities and promotes shifting to identity observability for comprehensive security and compliance. #IdentityDarkMatter #OrchidSecurity…

Read More
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk

A threat actor named Zestix, also known as Sentap, exploits infected employee devices and weak security practices to access and sell corporate cloud credentials. This campaign highlights the importance of enforcing Multi-Factor Authentication and monitoring for compromised credentials in preventing data breaches. #Zestix #Sentap #Infostealer #ShareFile #Nextcloud

Read More