access ai android api apple attack authentication backdoor breach browser business ceo china cisa cisco ciso cloud compliance control credentials crypto cve cyber cyberattack cybercrime cybersecurity data data-breach defense detection email exploit finance flaw framework fraud germany google government group hacker hacking healthcare identity infrastructure intelligence Internet jobs law leak linux malicious malware microsoft monitoring network open-source password phishing privacy ransomware remote-code-execution resilience risk russia scam service software strategy supply-chain technology theft threat tool unclassified update usa vulnerability windows zero-day
-
New ClickFix Attack Targets Crypto Wallets and 25+ Browsers with Infostealer
Researchers at CyberProof have identified a new fake captcha campaign linked to the ClickFix operation. This stealthy infostealer targets over 25 browsers, cryptocurrency wallets like MetaMask, and gaming accounts by tricking users into executing malicious PowerShell commands. First seen on hackread.com Jump to article: hackread.com/clickfix-attack-crypto-wallets-browsers-infostealer/ also interesting: DeepSeek Lure Using CAPTCHAs To Spread Malware New…
-
Buchungssystem der Deutschen Bahn war durch einen Cyberangriff über mehrere Stunden lahmgelegt
Wer Anfang dieser Woche eine Zugfahrt per DB-Navigator-App buchen wollte, hatte schlechte Karten. Das Buchungssystem der Deutschen Bahn war durch einen Cyberangriff über mehrere Stunden lahmgelegt. Obwohl nach bisherigem Kenntnisstand keine personenbezogenen Daten gestohlen wurden, sollte der Vorfall aber dennoch nicht nächste Woche schon vergessen sein Warum, erklärt Anouck Teiller, Deputy CEO beim europäischen Cybersecurity-Start-Up…
-
Agentic-AI als Erfolgsgrundlage für Startups
Der Januar startete für Startups mit einem Rekord, in Deutschland wurden fast ein Drittel mehr Gründungen vorgenommen. In Zahlen wurden 3.568 neue Firmen geschaffen: Ein neuer Höchststand, wie der Startup-Verband im Januar verkündete, auch dank KI, wie sich beim genauen Hinschauen herausstellte. 853 dieser Unternehmen kommen aus dem Bereich Software. Doch nicht nur sie verwenden KI,…
-
Globale Spannungen verschärfen Cyberrisiken
Tags: cyersecurityDie sich rapide ändernde angespannte geopolitische Lage beeinträchtigt die für eine umfassende Cybersicherheit erforderliche globale Zusammenarbeit. Clare Loveridge, Vice President & General Manager EMEA von Arctic Wolf, teilt ihre Gedanken zur Relevanz internationaler Zusammenarbeit für die Cybersecurity. ‘Die geopolitischen Spannungen weltweit bleiben nicht ohne Auswirkungen auf die Cybersicherheit. Während Staaten ihre technologische und strategische Souveränität…
-
KnowBe4 ernennt erfahrenen Finanzmanager Yuneeb Khan zum CFO
KnowBe4 ernennt Yuneeb Khan zum Chief Financial Officer. Er wird direkt an Bryan Palma, den CEO von KnowBe4, berichten. Yuneeb Khan wird die Nachfolge von Bob Reich antreten, der seinen Ruhestand angekündigt hat. Beide werden zusammenarbeiten, um einen reibungslosen Übergang bis zum ersten Quartal 2026 zu gewährleisten. ‘Yuneeb Khan’s umfangreiche Erfahrung im Technologiesektor sowie in […]…
-
TÜV Rheinland gibt Tipps zur Absicherung des Active-Directory
Active-Directory (AD) ist weltweit in Millionen von Organisationen im Einsatz und gilt als Standard in Windows-basierten Netzwerken, um Benutzerkonten, Zugriffsrechte und Netzwerkressourcen zu verwalten. Doch gerade diese zentrale Rolle macht AD-Umgebungen zu einem attraktiven Ziel für Cyberangriffe. Angreifer können Schwachstellen ausnutzen, um sich Zugang zu sensiblen Daten zu verschaffen, Berechtigungen auszuweiten oder kritische Geschäftsprozesse zu…
-
NDSS 2025 -DUMPLING: Fine-Grained Differential JavaScript Engine Fuzzing
Session 13A: JavaScript Security Authors, Creators & Presenters: Liam Wachter (EPFL), Julian Gremminger (EPFL), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)), Mathias Payer (EPFL), Flavio Toffalini (EPFL) PAPER DUMPLING: Fine-Grained Differential JavaScript Engine Fuzzing Web browsers are ubiquitous and execute untrusted JavaScript (JS) code. JS engines optimize frequently executed code through just-in-time (JIT) compilation. Subtly…
-
Warum ungepatchte Firewalls zum größten Einfallstor für Ransomware werden
Der Report macht deutlich: Klassische Sicherheitsmaßnahmen reichen längst nicht mehr aus. Regelmäßiges Patchen, sauberes Identitätsmanagement und die Überwachung von Drittanbietern sind keine ‘Nice-to-haves”, sondern Grundvoraussetzungen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/warum-ungepatchte-firewalls-zum-groessten-einfallstor-fuer-ransomware-werden/a43788/ also interesting: SonicWall firewalls the common access point in spreading ransomware campaign New kids on the ransomware block channel Lockbit to raid…
-
Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks
Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/ also interesting: The 2024 cyberwar playbook: Tricks used by nation-state actors Amazon: AI-assisted hacker breached 600 FortiGate…
-
Predator spyware hooks iOS SpringBoard to hide mic, camera activity
Intellexa’s Predator spyware can hide iOS recording indicators while secretly streaming camera and microphone feeds to its operators. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity/ also interesting: New Android trojan uses camera app to recreate user’s physical surroundings Privacy Roundup: Week 11 of Year 2025 Smashing Security podcast #424: Surveillance, spyware, and self-driving snafus…
-
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries.That’s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026.”No exploitation of FortiGate First seen on…
-
7 days until ticket prices rise for TechCrunch Disrupt 2026
Tags: groupLowest ticket prices to TechCrunch Disrupt 2026 end February 27. Up to $680 off individual passes and up to 30% off group passes. Register before they go up to join 10,000 founders, tech operators, and VCs. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/21/7-days-until-ticket-prices-rise-for-techcrunch-disrupt-2026/ also interesting: The Future of Cloud Access Management: How Tenable Cloud Security…
-
ClickFix Malware-Kampagne: Fake-Cloudflare-Check installiert unbemerkt MIMICRAT
Tags: malwareClickFix Malware-Kampagne verteilt MIMICRAT über Fake-Cloudflare-Seiten mit fünfstufiger Infektionskette, AMSI-/ETW-Bypass und HTTPS-C2. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/malware/clickfix-malware-kampagne-fake-cloudflare-check-installiert-unbemerkt-mimicrat-326127.html also interesting: Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Wormable Malware Compromises npm Supply Chain New Herodotus Android malware fakes human typing to avoid detection Attackers Sell…
-
Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks
Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/ also interesting: API Security is Not a Problem You Can Solve at the Edge Synack + Tenable:…
-
Amazon’s vibe-coding tool Kiro reportedly vibed too hard and brought down AWS
Bezos-corp blames user error for outage, ‘specifically misconfigured access controls’ First seen on theregister.com Jump to article: www.theregister.com/2026/02/20/amazon_denies_kiro_agentic_ai_behind_outage/ also interesting: Employees keep finding new ways around company access controls Building checksec without boundaries with Checksec Anywhere Find the Invisible: Salt MCP Finder Technology for Proactive MCP Discovery The LimaCharlie Manifesto: Security for an Autonomous Future
-
Sicherheitsbranche: Claude Code Security lässt Aktienkurse abstürzen
Tags: cybersecurityAnthropic Claude scannt jetzt Code auf Sicherheitslücken – und treibt die Aktien großer Cybersecurity-Unternehmen auf Talfahrt. First seen on golem.de Jump to article: www.golem.de/news/sicherheitsbranche-claude-code-security-laesst-aktienkurse-abstuerzen-2602-205693.html also interesting: Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot Malicious Ivanti VPN Client Sites in Google Search Deliver Malware, Users Warned Cybersecurity Firms See Surge…
-
Anthropic Debuts Claude Code Security AI Now Scan Vulnerabilities in Your Entire Codebase
Anthropic has quietly flipped the script on application security. On February 20, the company launched Claude Code Security, a new capability baked directly into Claude Code on the web that automatically scans entire repositories for sophisticated vulnerabilities and delivers ready-to-review patch suggestions. Unlike legacy SAST tools that rely on rigid signature matching, Claude Code Security uses…
-
Password Managers Share a Hidden Weakness
Plus: The cybersecurity community grapples with Epstein files revelations, the US State Department plans an online anti-censorship “portal” for the world, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-password-managers-share-a-hidden-weakness/ also interesting: Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks Clutch grabs $20M…
-
U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two RoundCube Webmail flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: Roundcube is a popular webmail platform and has been repeatedly targeted…
-
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand’s real website, and…
-
‘Narco-Submarine’ Carrying 4 Tons of Cocaine Captured by Mexico’s Navy
Tags: networkFollowing increased surveillance and patrols of routes used by transnational drug-trafficking networks, Mexican authorities have seized approximately 10 tons of cocaine in the past week alone. First seen on wired.com Jump to article: www.wired.com/story/narco-submarine-carrying-4-tons-of-cocaine-captured-by-mexicos-navy/ also interesting: 5 Things To Know About China-Linked Juniper Router Attacks Mitsubishi Electric to Buy Nozomi in $883M OT Security Deal…
-
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness.EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential…
-
CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.The vulnerabilities in question are listed below -CVE-2025-49113 (CVSS score: 9.9) – A deserialization of untrusted data vulnerability that allows remote code First seen on thehackernews.com…
-
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches.The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers.”It scans codebases for security vulnerabilities and suggests targeted…
-
So ticken KI-Agenten für Cybersicherheit wirklich “‹
Immer mehr Security Operation Centers (SOC) setzen im Kampf gegen Hacker und Downtimes auf die Hilfe künstlicher Intelligenz. KI-Agenten, die wie SOC-Teams miteinander autonom kollaborieren, sind in diesem Zusammenhang die neueste Evolutionsstufe. Ontinue, der führende Experte für Managed Extended Detection and Response (MXDR), wirft einen Blick unter die Haube solcher Multi-Agenten-Systeme. Multi-Agenten-Systeme (MAS), bestehend… First…
-
Agentic AI und die wachsende Herausforderung für die Cybersicherheit
Agentic AI revolutioniert die digitale Arbeitswelt, indem autonome KI-Agenten eigenständig Aufgaben übernehmen und Entscheidungen treffen, was Unternehmen vor neue Sicherheitsherausforderungen stellt. Die wachsende Zahl und Autonomie dieser Agentenidentitäten überfordert klassische Sicherheitsmodelle, da unkontrollierte Berechtigungen und fehlende Governance-Strukturen neue Angriffsmöglichkeiten eröffnen. Unternehmen müssen ihre Sicherheitsstrategien dringend anpassen, um Identitätskontrollen, klare Verantwortlichkeiten und Schutzmaßnahmen zu etablieren, bevor……
-
Best Cyber Security Consulting Companies
With rapid technological progress, it is estimated that nearly 200 billion connected devices, ranging from medical equipment and industrial machines to cars, smartphones, and home appliances, will be communicating through the Internet of Things (IoT) and Industrial IoT (IIoT). This massive interconnected ecosystem creates an enormous attack surface for attackers to exploit, disrupt, and infiltrate….…
-
Neue Android-Malware nutzt Gemini als Gehirn
Sicherheitsforscher des slowakischen IT-Unternehmens ESET haben eine neue Android-Schadsoftware entdeckt, die Google Gemini aktiv im laufenden Betrieb einsetzt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/neue-android-malware-nutzt-gemini-als-gehirn also interesting: Hackers use Zoom Google Meet Lures to Attack Android Windows users New Antidot Android Malware Poses as Google Update to Steal Funds Goldoson Malware: Wahrscheinlich mehr als…
-
PayPal Flaw Exposed Email Addresses, Social Security Numbers for 6 Months
PayPal disclosed a software error in its Working Capital platform that exposed sensitive customer data, including Social Security numbers, for months in 2025. The post PayPal Flaw Exposed Email Addresses, Social Security Numbers for 6 Months appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-paypal-working-capital-data-exposure-2025/ also interesting: The biggest data breach fines,…
-
Olympische Winterspiele Angriffe auf digitale Identitäten als größtes Cyberrisiko
Tags: cyberattackFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/olympia-2026-winter-digitale-identitaeten also interesting: Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials Anthropic Claude Unternehmensdaten gefährdet 7 signs your cybersecurity framework needs rebuilding Cyberangriff auf Bahn stört Auskunftssysteme
-
Vishing: Gezielte Cyberangriffe in Echtzeit mittels neuartiger VoiceKits
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/vishing-gezielt-cyberangriffe-echtzeit-neu-voice-phishing-kits also interesting: V3BKit bedroht europäische Banken Junge Onliner tappen oft in Phishing-Fallen Neue ClickFix-Kampagne nutzt Fake-Windows-Updates Microsoft stellt neue Sicherheitsstrategie vor
-
Compromised npm package silently installs OpenClaw on developer machines
Update to the latest version: npm install “-g cline@latest.”If on version 2.3.0, update to 2.4.0 or higher.Check for and immediately remove OpenClaw if it hadn’t been intentionally installed (“npm uninstall -g openclaw”).Gooding noted, “nothing ran automatically beyond the install,” but added there was still a risk: “OpenClaw is a capable agentic tool with broad system…
-
Why Legacy Software Modernization is Critical for Data Security
An in-depth Suped review covering features, pricing, pros and cons, and real-world use cases. Discover whether Suped is the right email deliverability tool for your business. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/why-legacy-software-modernization-is-critical-for-data-security/ also interesting: The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes CISOs’ security priorities reveal…
-
University of Mississippi Medical Center Closes Clinics After Ransomware Attack
A ransomware attack disrupted UMMC’s EMR system, forcing clinic closures and manual patient documentation. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/university-of-mississippi-medical-center-closes-clinics-after-ransomware-attack/ also interesting: Should Organizations Pay Ransom Demands? Black Basta Ransomware Hit Over 500 Organizations Ratel RAT targets outdated Android phones in ransomware attacks Ministers consider ban on all UK public bodies making ransomware…
-
Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent
Tags: hackerSpain’s police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to Euro1,000 a night for just one euro cent. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/spanish-police-say-they-have-arrested-hacker-who-booked-luxury-hotel-rooms-for-just-one-cent also interesting: FBI says hackers are sending fraudulent police data requests to tech giants to…
-
Hospitals at Risk of BeyondTrust Ransomware Hacks
Critical Vulnerability Could Give Attackers Foothold in Clinical Networks. Federal authorities and industry officials are urging healthcare sector entities to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a hospital or clinic network. First seen on govinfosecurity.com Jump to article:…
-
PayPal discloses extended data leak linked to Loan App glitch
PayPal disclosed a six-month data breach that exposed sensitive user data, including Social Security numbers, due to a software error. PayPal has disclosed a data breach caused by a software bug in its PayPal Working Capital loan app. The flaw exposed sensitive customer information, including customers’ business contact details (name, email, phone number, address), along…
-
Anthropic rolls out embedded security scanning for Claude
The feature, currently limited to a small group of testers, will provide an easy-to-use feature that scans AI-generated code and offers up patching solutions. First seen on cyberscoop.com Jump to article: cyberscoop.com/anthropic-claude-code-security-automated-security-review/ also interesting: Your Network Is Showing Time to Go Stealth Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE…
-
How does NHI impact innovation in cloud-native security solutions
Are Organizations Fully Realizing the Potential of Non-Human Identities in Cloud-Native Security Solutions? Where businesses continually strive for digital transformation, how do they ensure their security infrastructures evolve at the same swift pace when their innovative endeavors? For sectors like financial services, healthcare, and DevOps, where sensitive data is the currency of trust, the stakes……
-
How does Agentic AI enforce cloud compliance in real-time
The Critical Role of Agentic AI in Enhancing Cloud Compliance Monitoring How do organizations ensure their cloud systems remain compliant in real-time amidst evolving threats? The implementation of Agentic AI in compliance monitoring has emerged as a proactive strategy for bridging the security gap in cloud environments, especially when it comes to Non-Human Identities (NHIs)….…
-
How assured is your data with NHIs in place
Are You Adequately Protecting Your Organization with NHI Management? Where information is a cornerstone for business operations, safeguarding data has become paramount for organizations across various industries. How do Non-Human Identities (NHIs) play a role, and why should cybersecurity teams incorporate NHI management into their strategy? Understanding Non-Human Identities in Cybersecurity When we talk about……
-
Can Agentic AI improve scalability in secrets management
How Do Non-Human Identities Revolutionize Cloud Security? Maintaining robust cybersecurity measures is crucial. One area rapidly gaining attention is the management of Non-Human Identities (NHIs), which plays a vital role in ensuring cloud security. But why are NHIs important? And how can they help bridge the gap between security and R&D teams? The Role of……
-
Attackers Use New Tool to Scan for React2Shell Exposure
Researchers say threat actors wielded the sophisticated, and unfortunately named, toolkit to target high-value networks for React2Shell exploitation. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/attackers-new-tool-scan-react2shell-exposure also interesting: The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness…
-
PayPal Flaw Exposed Sensitive Data in Lending App for Six Months
A PayPal loan app error exposed sensitive customer data, including SSNs, for nearly six months in 2025. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/paypal-flaw-exposed-sensitive-data-in-lending-app-for-six-months/ also interesting: Getting the Most Value Out of the OSCP: After the Exam Threat actors scanning for apps incorporating vulnerable Spring Boot tool Synack + Tenable: AI-Powered Partnership Translates Vulnerability…
-
5 Things To Know On Anthropic’s Claude Code Security
Anthropic announced Friday it is looking to compete with application security vendors by adding vulnerability scanning capabilities into its web-based Claude Code tool. First seen on crn.com Jump to article: www.crn.com/news/security/2026/5-things-to-know-on-anthropic-s-claude-code-security also interesting: Beyond CVE: The hunt for other sources of vulnerability intel How Can Dynamic Application Security Testing (DAST) Help Your Organization? Cybersecurity Snapshot:…
-
Security that works for you: Exploring the new enhancements in SonarQube
Tags: aiOur latest enhancements in SonarQube establish a non-negotiable code verification layer designed to bridge this trust gap, unifying the analysis of first-party, AI-generated, and third-party code. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/security-that-works-for-you-exploring-the-new-enhancements-in-sonarqube/ also interesting: Koi Raises $48M to Safeguard AI Models, Code and Extensions Gcore Radar Report Reveals 41% Surge in DDoS Attack…
-
Check Point Software Earns Leader Fast Mover Position in GigaOm Radar for Cloud Network Security
Check Point Software has announced that it has been named a Leader and Fast Mover in the GigaOm Radar for Cloud Network Security 2025, marking the company’s third consecutive year in the top position. GigaOm recognised Check Point for its prevention-first architecture, unified cloud security platform, and consistent pace of innovation further strengthened by The…
-
Google Blocked 1.75M Harmful Apps From Play Store in 2025
Google used AI-driven review systems to block 1.75 million policy-violating apps and ban 80,000 developer accounts in 2025, expanding Play Store and Android security enforcement. The post Google Blocked 1.75M Harmful Apps From Play Store in 2025 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-google-ai-blocked-1-75-million-apps-2025/ also interesting: Google Unveils New Intelligent,…
-
DHS Wants a Single Search Engine to Flag Faces and Fingerprints Across Agencies
Tags: privacyHomeland Security aims to combine its face and fingerprint systems into one big biometric platform”, after dismantling centralized privacy reviews and key limits on face recognition. First seen on wired.com Jump to article: www.wired.com/story/dhs-wants-a-single-search-engine-to-flag-faces-and-fingerprints-across-agencies/ also interesting: EFF Warns of Major Ubuntu Privacy Issue South Korea Fines Meta $15 Million for Illegally Collecting Information on Facebook…

