<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security trends for 2025</title>
	<atom:link href="http://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 09:28:54 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1864685</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Nov 2025 12:05:26 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1864685</guid>
		<description><![CDATA[https://etn.fi/index.php/13-news/18052-kumpi-on-turvallisempi-wi-fi-vai-ethernet]]></description>
		<content:encoded><![CDATA[<p><a href="https://etn.fi/index.php/13-news/18052-kumpi-on-turvallisempi-wi-fi-vai-ethernet" rel="nofollow">https://etn.fi/index.php/13-news/18052-kumpi-on-turvallisempi-wi-fi-vai-ethernet</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1864684</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Nov 2025 12:05:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1864684</guid>
		<description><![CDATA[https://www.uusiteknologia.fi/2025/10/08/digiturvabarometri-2025-huijaukset-ja-kyberuhat-huolestuttavat/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.uusiteknologia.fi/2025/10/08/digiturvabarometri-2025-huijaukset-ja-kyberuhat-huolestuttavat/" rel="nofollow">https://www.uusiteknologia.fi/2025/10/08/digiturvabarometri-2025-huijaukset-ja-kyberuhat-huolestuttavat/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1862733</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Oct 2025 21:08:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1862733</guid>
		<description><![CDATA[&quot;Constant hacks, ransomware attacks and data leakages are warning signs that this is a deeply fragile system.&quot; https://trib.al/SnBLbXr]]></description>
		<content:encoded><![CDATA[<p>&#8220;Constant hacks, ransomware attacks and data leakages are warning signs that this is a deeply fragile system.&#8221; <a href="https://trib.al/SnBLbXr" rel="nofollow">https://trib.al/SnBLbXr</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1861311</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 10:24:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1861311</guid>
		<description><![CDATA[“The focus of cybersecurity is too much on technology and too little on people” – AI helps, but is not enough on its own
AI has been shaking up the cybersecurity industry for years, but the human role remains crucial, says Harri Sylvander, who leads Google Cloud’s Mandiant incident management team in Europe.
https://www.dna.fi/dnabusiness/blogi/-/blogs/the-focus-of-cybersecurity-is-too-much-on-technology-and-too-little-on-people-ai-helps-but-is-not-enough-on-its-own?utm_source=facebook&amp;utm_medium=social&amp;utm_content=LAA-artikkeli-the-focus-of-cybersecurity-is-too-much-on-technology-and-too-little-on-people-ai-helps-but-is-not-enough-on-its-own&amp;utm_campaign=P_LAA_25-36-40_artikkelikampanja_enkku_&amp;fbclid=IwdGRjcAMiSyxleHRuA2FlbQEwAGFkaWQBqyYSGxNcPAEe06Vz71ov59WIO0LCoBgUdyMkNcvvtX7qT7jlwWOY-lnz4wba8E8VfkdZmcI_aem_popK69YcgmuvhbyFCCjtsw&amp;utm_id=120231673906370556&amp;utm_term=120231673906390556]]></description>
		<content:encoded><![CDATA[<p>“The focus of cybersecurity is too much on technology and too little on people” – AI helps, but is not enough on its own<br />
AI has been shaking up the cybersecurity industry for years, but the human role remains crucial, says Harri Sylvander, who leads Google Cloud’s Mandiant incident management team in Europe.<br />
<a href="https://www.dna.fi/dnabusiness/blogi/-/blogs/the-focus-of-cybersecurity-is-too-much-on-technology-and-too-little-on-people-ai-helps-but-is-not-enough-on-its-own?utm_source=facebook&#038;utm_medium=social&#038;utm_content=LAA-artikkeli-the-focus-of-cybersecurity-is-too-much-on-technology-and-too-little-on-people-ai-helps-but-is-not-enough-on-its-own&#038;utm_campaign=P_LAA_25-36-40_artikkelikampanja_enkku_&#038;fbclid=IwdGRjcAMiSyxleHRuA2FlbQEwAGFkaWQBqyYSGxNcPAEe06Vz71ov59WIO0LCoBgUdyMkNcvvtX7qT7jlwWOY-lnz4wba8E8VfkdZmcI_aem_popK69YcgmuvhbyFCCjtsw&#038;utm_id=120231673906370556&#038;utm_term=120231673906390556" rel="nofollow">https://www.dna.fi/dnabusiness/blogi/-/blogs/the-focus-of-cybersecurity-is-too-much-on-technology-and-too-little-on-people-ai-helps-but-is-not-enough-on-its-own?utm_source=facebook&#038;utm_medium=social&#038;utm_content=LAA-artikkeli-the-focus-of-cybersecurity-is-too-much-on-technology-and-too-little-on-people-ai-helps-but-is-not-enough-on-its-own&#038;utm_campaign=P_LAA_25-36-40_artikkelikampanja_enkku_&#038;fbclid=IwdGRjcAMiSyxleHRuA2FlbQEwAGFkaWQBqyYSGxNcPAEe06Vz71ov59WIO0LCoBgUdyMkNcvvtX7qT7jlwWOY-lnz4wba8E8VfkdZmcI_aem_popK69YcgmuvhbyFCCjtsw&#038;utm_id=120231673906370556&#038;utm_term=120231673906390556</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1860778</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 26 Aug 2025 06:24:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1860778</guid>
		<description><![CDATA[https://www.securityweek.com/slow-and-steady-security-lessons-from-the-tortoise-and-the-hare/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/slow-and-steady-security-lessons-from-the-tortoise-and-the-hare/" rel="nofollow">https://www.securityweek.com/slow-and-steady-security-lessons-from-the-tortoise-and-the-hare/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1858962</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 06 Aug 2025 07:03:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1858962</guid>
		<description><![CDATA[Malware &amp; Threats
Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware
https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/

Microsoft has unveiled Project Ire, a prototype autonomous AI agent that can analyze any software file to determine if it’s malicious.

AI agent malware reverse engineering

Microsoft on Tuesday unveiled Project Ire, a prototype autonomous AI agent that can analyze software files in order to determine whether they hide malware.

According to Microsoft, Project Ire can autonomously reverse engineer and classify software without any prior context, automating and scaling what can be a complex process.

Project Ire was developed by teams at Microsoft Research, Microsoft Defender Research, and Microsoft Discovery &amp; Quantum.

It uses decompilers and other tools to gather data that enables it to determine whether a file is benign or malicious, while also providing a traceable chain of evidence.

“The system’s architecture allows for reasoning at multiple levels, from low-level binary analysis to control flow reconstruction and high-level interpretation of code behavior,” Microsoft explained.

It added, “Its tool-use API enables the system to update its understanding of a file using a wide range of reverse engineering tools, including Microsoft memory analysis sandboxes based on Project Freta, custom and open-source tools, documentation search, and multiple decompilers.”

Project Ire’s goal is to reduce analyst error and fatigue, accelerate threat response, and strengthen defenses against evolving attacks, Microsoft said.

https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/]]></description>
		<content:encoded><![CDATA[<p>Malware &amp; Threats<br />
Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware<br />
<a href="https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/" rel="nofollow">https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/</a></p>
<p>Microsoft has unveiled Project Ire, a prototype autonomous AI agent that can analyze any software file to determine if it’s malicious.</p>
<p>AI agent malware reverse engineering</p>
<p>Microsoft on Tuesday unveiled Project Ire, a prototype autonomous AI agent that can analyze software files in order to determine whether they hide malware.</p>
<p>According to Microsoft, Project Ire can autonomously reverse engineer and classify software without any prior context, automating and scaling what can be a complex process.</p>
<p>Project Ire was developed by teams at Microsoft Research, Microsoft Defender Research, and Microsoft Discovery &amp; Quantum.</p>
<p>It uses decompilers and other tools to gather data that enables it to determine whether a file is benign or malicious, while also providing a traceable chain of evidence.</p>
<p>“The system’s architecture allows for reasoning at multiple levels, from low-level binary analysis to control flow reconstruction and high-level interpretation of code behavior,” Microsoft explained.</p>
<p>It added, “Its tool-use API enables the system to update its understanding of a file using a wide range of reverse engineering tools, including Microsoft memory analysis sandboxes based on Project Freta, custom and open-source tools, documentation search, and multiple decompilers.”</p>
<p>Project Ire’s goal is to reduce analyst error and fatigue, accelerate threat response, and strengthen defenses against evolving attacks, Microsoft said.</p>
<p><a href="https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/" rel="nofollow">https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1856571</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 21 Jun 2025 17:46:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1856571</guid>
		<description><![CDATA[Vuls: Open-source agentless vulnerability scanner
Vuls is an open-source tool that helps users find and manage security vulnerabilities. It was created to solve the daily problems admins face when trying to keep servers secure.
https://www.helpnetsecurity.com/2025/05/05/vuls-open-source-agentless-vulnerability-scanner/]]></description>
		<content:encoded><![CDATA[<p>Vuls: Open-source agentless vulnerability scanner<br />
Vuls is an open-source tool that helps users find and manage security vulnerabilities. It was created to solve the daily problems admins face when trying to keep servers secure.<br />
<a href="https://www.helpnetsecurity.com/2025/05/05/vuls-open-source-agentless-vulnerability-scanner/" rel="nofollow">https://www.helpnetsecurity.com/2025/05/05/vuls-open-source-agentless-vulnerability-scanner/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1856537</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 21 Jun 2025 11:57:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1856537</guid>
		<description><![CDATA[NIST Outlines Real-World Zero-Trust Examples
SP 1800-35 offers 19 examples of how to implement zero-trust architecture (ZTA) using off-the-shelf commercial technologies.
https://www.darkreading.com/endpoint-security/nist-outlines-real-world-zero-trust-examples

The National Institute of Standards and Technology released new guidance on building end-to-end zero-trust architectures (ZTA), providing security teams with practical, real-world examples of how to enhance their organization&#039;s defenses.

The guidance (SP 1800-35) offers 19 example ZTAs built using commercial, off-the-shelf technologies to give organizations a starting point for implementing zero trust. Developed through a four-year project at the NIST National Cybersecurity Center of Excellence with 24 industry collaborators, SP 1800-35 addresses the reality that every ZTA implementation should be treated as a custom build because every organization&#039;s network environment and needs are different.]]></description>
		<content:encoded><![CDATA[<p>NIST Outlines Real-World Zero-Trust Examples<br />
SP 1800-35 offers 19 examples of how to implement zero-trust architecture (ZTA) using off-the-shelf commercial technologies.<br />
<a href="https://www.darkreading.com/endpoint-security/nist-outlines-real-world-zero-trust-examples" rel="nofollow">https://www.darkreading.com/endpoint-security/nist-outlines-real-world-zero-trust-examples</a></p>
<p>The National Institute of Standards and Technology released new guidance on building end-to-end zero-trust architectures (ZTA), providing security teams with practical, real-world examples of how to enhance their organization&#8217;s defenses.</p>
<p>The guidance (SP 1800-35) offers 19 example ZTAs built using commercial, off-the-shelf technologies to give organizations a starting point for implementing zero trust. Developed through a four-year project at the NIST National Cybersecurity Center of Excellence with 24 industry collaborators, SP 1800-35 addresses the reality that every ZTA implementation should be treated as a custom build because every organization&#8217;s network environment and needs are different.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1856531</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 21 Jun 2025 11:04:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1856531</guid>
		<description><![CDATA[https://www.aikido.dev/
No bullsh*t security for developers
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.aikido.dev/" rel="nofollow">https://www.aikido.dev/</a><br />
No bullsh*t security for developers<br />
Secure your code, cloud, and runtime in one central system.<br />
Find and fix vulnerabilities fast automatically.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/12/31/cyber-security-trends-for-2025/comment-page-5/#comment-1856528</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 21 Jun 2025 10:58:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196785#comment-1856528</guid>
		<description><![CDATA[https://hackaday.com/2025/06/16/an-open-source-justification-for-usb-cable-paranoia/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2025/06/16/an-open-source-justification-for-usb-cable-paranoia/" rel="nofollow">https://hackaday.com/2025/06/16/an-open-source-justification-for-usb-cable-paranoia/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
