access ai android api apple attack authentication backdoor breach browser business ceo china cisa cisco ciso cloud compliance control credentials crypto cve cyber cyberattack cybercrime cybersecurity data data-breach defense detection email exploit finance flaw framework fraud germany google government group hacker hacking healthcare identity infrastructure intelligence Internet jobs law leak linux malicious malware microsoft network north-korea open-source password phishing privacy ransomware remote-code-execution resilience risk russia scam service software strategy supply-chain technology theft threat tool unclassified update usa vulnerability windows zero-day
-
Safer Internet Day 2026: Gut 50.000 Jugendliche werden Umgang mit KI-Begleitern am 10. Februar 2026 diskutieren
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/safer-internet-day-2026-50000-jugendliche-umgang-ki-10-februar-2026-diskussion also interesting: MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era Closing the Loop: Continuous API Security Testing FireTail Blog Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find Fighting AI with…
-
RĂĽckblick auf die 2. Auflage zum Thema Data Act und DSGVO
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/denkwerkstatt-bfdi-fortfuehrung-ruckblick-2-auflage-data-act-dsgvo also interesting: SIEM-Kaufratgeber Die wertvollsten Security-Zertifizierungen Wirbel um Microsoft-Zahlen Update – – Windows verliert keine 400 Millionen Nutzer in drei Jahren Unternehmen zu lax bei KI-Sicherheit
-
Bithumb Mistakenly Sends 620,000 Bitcoin ($40B) to Customer Accounts
Tags: unclassifiedA system error at Bithumb sent 620,000 Bitcoin worth about $40B to hundreds of users during a promotion, briefly disrupting prices and drawing scrutiny. First seen on hackread.com Jump to article: hackread.com/bithumb-sends-bitcoin-to-customer-accounts/ also interesting: Be Optimistic About the Future of Secrets Management Relax with Secure and Managed Non-Human Identities Arctic Wolf Security Operations Report 2025…
-
Supermarket sorry after facial recognition alert flags right criminal, wrong customer
Tags: unclassifiedSystem worked as intended, but staff then kicked out innocent bystander First seen on theregister.com Jump to article: www.theregister.com/2026/02/06/sainsburys_/ also interesting: Be Optimistic About the Future of Secrets Management Relax with Secure and Managed Non-Human Identities Arctic Wolf Security Operations Report 2025 – Unternehmen mĂĽssen weiterhin den Feierabend fĂĽrchten Datenschutz: Tesla-Kameras dokumentieren Straftaten im öffentlichen…
-
Italian university La Sapienza still offline to mitigate recent cyber attack
Rome’s La Sapienza University was hit by a cyberattack that disrupted IT systems and caused widespread operational issues. Since February 2, Rome’s La Sapienza University, one of the most important Italian universities, has been offline due to a cyberattack. For days, students have been unable to book exams, check tuition payments, or access faculty contacts.…
-
Firefox Will Give Users an AI Kill Switch for Better Privacy
Not everyone wants AI in their browser. Firefox 148 is introducing easy toggles to disable chatbots and AI tab grouping. Discover how Mozilla is prioritising user choice and privacy in its latest 2026 update. First seen on hackread.com Jump to article: hackread.com/firefox-users-ai-kill-switch-better-privacy/ also interesting: 2025 Cybersecurity and AI Predictions TDL003 – Breaking Barriers: IPv6 Adoption…
-
State actor targets 155 countries in ‘Shadow Campaigns’ espionage op
A new state-aligned cyberespionage threat group tracked as TGR-STA-1030/UNC6619, has conducted a global-scale operation dubbed the “Shadow Campaigns,” where it targeted government infrastructure in 155 countries. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/state-actor-targets-155-countries-in-shadow-campaigns-espionage-op/ also interesting: More telecom firms were breached by Chinese hackers than previously reported FCC creates national security council to counter cyber…
-
Safer Internet Day 2026: Digitale Achtsamkeit und Skepsis angesichts der KI-Dominanz geboten
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/safer-internet-day-2026-digital-achtsamkeit-skepsis-ki-dominanz-gebot also interesting: MY TAKE: Technology breakthroughs, emerging standards are coalescing to assure IoT integrity 9 VPN alternatives for securing remote network access 8 biggest cybersecurity threats manufacturers face What to look for in a data protection platform for hybrid clouds
-
Von Veo 3 bis Adobe Firefly: Welche KI-Videogeneratoren das US-Heimatschutzministerium einsetzt
First seen on t3n.de Jump to article: t3n.de/news/von-veo-3-bis-adobe-firefly-welche-ki-videogeneratoren-das-us-heimatschutzministerium-einsetzt-1728054/ also interesting: Adobe Adds Firefly and AI Watermarking to Bug Bounty Program Adobe expands bug bounty programme to account for GenAI BĂĽchse der Pandora: Die Gesundheitsdaten, KI (Copilot, Adobe AI) und der Patienten-/Datenschutz Phishing click rates tripled in 2024 despite user training
-
Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam
Tags: scamWhen a Romanian businesswoman fell for a fake Dubai Crown Prince in a $2.5 million romance scam, investigators tracked the fraudster to his Nigerian mansion – only to discover he was masquerading as a campaigning philanthropist. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/fake-dubai-crown-prince-tracked-to-nigerian-mansion-after-2-5m-romance-scam also interesting: Android 15, Google Play get new anti-malware and anti-fraud…
-
German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt fĂĽr Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carrying out phishing attacks over the Signal messaging app.”The focus is on high-ranking…
-
Study confirms experience beats youthful enthusiasm
Tags: unclassifiedResearch shows productivity and judgment peak decades after graduation First seen on theregister.com Jump to article: www.theregister.com/2026/02/07/boomers_vs_zoomers_workplace/ also interesting: Per CheckTerminal: Angreifer konnten in fremde Ibis-Hotelzimmer eindringen Efficiency is All You Need Three Ways to Build Momentum and Consensus for Your Security Program Automatisierte Datenanalysen durch Polizeibehörden: DSK-Forderung nach Verfassungskonformität
-
Moltbook, the Social Network for AI Agents, Exposed Real Humans’ Data
Plus: Apple’s Lockdown mode keeps the FBI out of a reporter’s phone, Elon Musk’s Starlink cuts off Russian forces, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-moltbook-the-social-network-for-ai-agents-exposed-real-humans-data/ also interesting: Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with…
-
CISA pushes Federal agencies to retire endsupport edge devices
CISA ordered U.S. federal agencies to improve management of edge network devices and replace unsupported ones within 1218 months. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) instructed U.S. federal civilian agencies to strengthen how they manage edge network devices throughout their lifecycle. According to Binding Operational Directive 26-02,”ÂŻMitigating Risk From End-of-Support Edge”ÂŻDevices, agencies must…
-
AI security worries stall enterprise production deployments
From Big Tech executives at Cisco’s AI Summit this week to market research, the industry is waking up to a major hindrance in enterprise AI adoption. First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366638794/AI-security-worries-stall-enterprise-production-deployments also interesting: KI-gestĂĽtzte Cybersicherheit – Logicalis bietet Cisco XDR als Managed Service an Cisco Reimagines Infrastructure for the AI Era, From…
-
Zscaler AI Security Suite sorgt für mehr Überblick und Kontrolle bei KI-Anwendungen
In der Praxis fehlt vielen Unternehmen der vollständige Ăśberblick ĂĽber ihre KI-Landschaft. Dazu zählen nicht nur GenKI-Tools, sondern auch KI-Entwicklungsumgebungen, in SaaS integrierte KI-Funktionen, Modelle, Agenten sowie die zugrunde liegende Infrastruktur. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/zscaler-ai-security-suite-sorgt-fuer-mehr-ueberblick-und-kontrolle-bei-ki-anwendungen/a43635/ also interesting: DLP solutions vs today’s cyberthreats: The urgent need for modern solutions You Have Exposure…
-
Payments platform BridgePay confirms ransomware attack behind outage
A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday and quickly escalated into a nationwide disruption across BridgePay’s platform. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/ also interesting: US healthcare sector subjected to attacks…
-
Payments platform BridgePay confirms ransomware attack behind outage
A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday and quickly escalated into a nationwide disruption across BridgePay’s platform. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/payments-platform-bridgepay-confirms-ransomware-attack-behind-outage/ also interesting: RansomHub Ransomware Has Hit 210 Victims…
-
Hackers Exploit Free Firebase Accounts to Launch Phishing Campaigns
A new wave of phishing campaigns where scammers are abusing Google’s legitimate infrastructure to bypass security filters. Attackers are now creating free developer accounts on Google Firebase to send fraudulent emails that impersonate well-known brands. By leveraging the reputation of the Firebase domain, these attackers are successfully landing in users’ inboxes, bypassing standard spam detection…
-
Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information
Digital squatting has evolved from a simple trademark nuisance into a dangerous cybersecurity threat. In 2025, the World Intellectual Property Organization (WIPO) handled a record-breaking 6,200 domain name disputes. This figure continues a troubling trend, with cybersquatting cases rising by 68% since the 2020 pandemic. Today, criminal networks use these fake domains not just to…
-
Microsoft sets Copilot agents loose on your OneDrive files
AI helpers can now rummage through multiple documents First seen on theregister.com Jump to article: www.theregister.com/2026/02/05/microsoft_onedrive_agents/ also interesting: Microsoft Purview AI Hub verfĂĽgbar – Datensicherheit und Compliance-Risiken in Microsoft 365 entschärfen Microsofts KI-Assistent Recall ist ein Sicherheitsrisiko This new cipher tech could break you out of your Gen AI woes Microsoft Exposes LLMjacking Cybercriminals Behind…
-
Langzeitarchivierung von Daten Herausforderungen und vielversprechende Ansätze
Tags: unclassifiedDie Langzeitarchivierung von Daten stellt Organisationen vor groĂźe Herausforderungen, da technologische Entwicklungen, regulatorische Anforderungen und die Notwendigkeit dauerhafter Datenzugänglichkeit einen stetigen Anpassungsdruck erzeugen. Mythen wie die Annahme, Daten könnten einfach gespeichert und später problemlos genutzt werden, werden widerlegt vielmehr mĂĽssen Archive aktiv gepflegt, validiert und mit Metadaten angereichert werden, um langfristig nutzbar zu bleiben…. First…
-
Liebe, Likes und LĂĽgen: Cyberkriminelle nutzen unsere Emotionen schamlos aus
Tags: aiEin Date mit einer kĂĽnstlichen Intelligenz? FĂĽr viele ist das längst keine abwegige Vorstellung mehr. Der aktuelle Norton Insights Report: Artificial Intimacy (NIR) zeigt: Die Hälfte der aktuellen deutschen Online-Dater (“¦innen eingeschlosssen) kann sich ein Date mit einer KI vorstellen, drei von zehn glauben sogar, dass es möglich ist, romantische GefĂĽhle fĂĽr eine kĂĽnstliche Intelligenz zu entwickeln….…
-
Banks Face Dual Authentication Crisis From AI Agents
Experts Advise Moving From Verifying Identities to Knowing Agent Intentions. Financial institutions are rushing to deploy AI agents capable of autonomously initiating transactions, approving payments and freezing accounts in real time. But agents are creating a dual authentication crisis that traditional security frameworks cannot address. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/banks-face-dual-authentication-crisis-from-ai-agents-a-30711 also interesting:…
-
Moltbook Gave Everyone Control of Every AI Agent
Database Misconfiguration Exposed 1.5 million API Tokens. A misconfigured database at Moltbook, the viral social network for AI agents, exposed 1.5 million API authentication tokens, 35,000 email addresses, and private messages. Security researchers discovered unauthenticated read and write access to all platform data within days of launch. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/moltbook-gave-everyone-control-every-ai-agent-a-30710…
-
Digitalisierung im Gesundheitswesen: 92 Prozent der Senioren erkennen Chancen
Tags: unclassifiedFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/digitalisierung-gesundheitswesen-92-prozent-senioren-erkennung-chancen also interesting: Hadassah Medical Center launches next-gen NAC to address BYOD US lawmakers dig into FCC’s $900M Starlink snub in wake of Hurricane Helene Tor Browser 13.0.14 Released What’s New! Drohnen-Einsatz durch Unternehmen – Wie Drohnen zum Sicherheits- und Datenschutzrisiko werden
-
Asian Cyber Espionage Campaign Breached 37 Countries
Palo Alto Networks says an Asian cyber espionage campaign breached 70 organizations in 37 countries, targeting government agencies and critical infrastructure. The post Asian Cyber Espionage Campaign Breached 37 Countries appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-asian-cyber-espionage-campaign-breached-37-countries/ also interesting: US eyes ban on TP-Link routers amid cybersecurity concerns Salt Typhoon…
-
ICE Agent’s ‘Dragging’ Case May Help Expose Evidence in Renee Good Shooting
Tags: governmentThe government has withheld details of the investigation of Renee Good’s killing”, but an unrelated case involving the ICE agent who shot her could force new revelations. First seen on wired.com Jump to article: www.wired.com/story/jonathan-ross-renee-good-roberto-carlos-munoz-guatemala/ also interesting: Singapore’s Government Directed ISPs To Block Access To Ten Inauthentic Websites US Government and OpenSSF Partner on New…
-
Radicl Brings In $31M to Push AI-Driven SOC Toward Autonomy
Series A Funding Accelerates AI-Native Detection and Response Roadmap. With $31 million in new Series A funding, Radicl plans to accelerate development of an autonomous security operations platform for midmarket organizations. CEO Chris Petersen said the company is focused on improving detection accuracy and trust to enable automated response at scale. First seen on govinfosecurity.com…
-
Zscaler Purchases SquareX to Secure Browsers Without Agents
CEO Jay Chaudhry: SquareX Deal Targets Unmanaged Devices and Third-Party Access. Zscaler has acquired SquareX to deliver browser security through extensions rather than endpoint agents or stand-alone browsers. CEO Jay Chaudhry said the approach speeds deployment, improves security for unmanaged devices, and accelerates time-to-market by up to a year. First seen on govinfosecurity.com Jump to…
-
Docker AI Bug Lets Image Metadata Trigger Attacks
AI Assistant Executes Hidden Commands Embedded in Docker Image Labels. A vulnerability in Docker’s Ask Gordon AI assistant allows attackers to execute malicious commands by hiding them in the container application development platform’s image metadata, said security researchers. Dubbed DockerDash, the vulnerability exploits a failure across Docker’s AI execution chain. First seen on govinfosecurity.com Jump…
-
DHS privacy probe will focus on biometric tracking by ICE, OBIM
Tags: privacyAuditors told CyberScoop the probe could expand to other parts of DHS and will look at the agency’s increasing use of biometric markers in immigration enforcement. First seen on cyberscoop.com Jump to article: cyberscoop.com/dhs-ig-audit-ice-obim-biometric-data-privacy-facial-recognition/ also interesting: Malwarebytes Acquires VPN Provider AzireVPN Three Keys to Modernizing Data Security: DSPM, AI, and Encryption Microsoft’s Failed Strategy Security…
-
Malicious packages for dYdX cryptocurrency exchange empties user wallets
Incident is at least the third time the exchange has been targeted by thieves. First seen on arstechnica.com Jump to article: arstechnica.com/security/2026/02/malicious-packages-for-dydx-cryptocurrency-exchange-empties-user-wallets/ also interesting: New SteelFox malware hijacks Windows PCs using vulnerable driver Malicious AI-generated npm package hits Solana users Hackers Leverage AI to Craft Malicious NPM Package That Drains Crypto Wallets 14 Malicious NuGet…
-
TeamPCP and the Rise of Cloud-Native Cybercrime
Flare researchers report that TeamPCP is abusing exposed cloud control planes to run large-scale, automated exploitation campaigns. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/teampcp-and-the-rise-of-cloud-native-cybercrime/ also interesting: 8 biggest cybersecurity threats manufacturers face 25 on 2025: APAC security thought leaders share their predictions and aspirations CSPM buyer’s guide: How to choose the best cloud security…
-
Can a Cardiac Pacemaker Help Find a Missing Person?
Medical Device Cyber Experts Explain Data, Signal Constraints. As law enforcement investigate the abduction of 84-year-old Nancy Guthrie, medical device cyber experts cast doubt on whether her pacemaker might lead authorities to find her location, even as one researcher suggested the medical device may unwittingly transmit certain signals. First seen on govinfosecurity.com Jump to article:…
-
EU Envisions Military Data Sharing Sans US Tech
‘Kill Switch’ Fears Drive EU Tech Sovereignty Push. Europe is quietly planning to set up a secure military data-sharing platform – without U.S.-made technology. Discussions about the need for more European tech infrastructure have heavily accelerated in recent months, although there’s debate about whether the EU can really replace U.S. hyperscalers. First seen on govinfosecurity.com…
-
NYC explores using AI cameras to spot subway fare evaders
Officials at Cubic, the manufacturer of the gates, reportedly say their product has cameras that record for five seconds when someone neglects to pay a fare. Artificial intelligence is used to produce a physical description of suspected fare evaders, they say, and the description is sent to the MTA. First seen on therecord.media Jump to…
-
Six more vulnerabilities found in n8n automation platform
CVE-2026-21893, a command injection hole in the community edition of n8n. An unauthenticated user with administration permission could execute arbitrary system commands on the n8n host.”The risk is amplified by the trust typically placed in community extensions,” Upwinds said in its commentary, “making this a high-impact attack path that directly bridges application-level functionality with host-level…
-
Germany warns of Signal account hijacking targeting senior figures
Germany’s domestic intelligence agency is warning of suspected state-sponsored threat actors targeting high-ranking individuals in phishing attacks via messaging apps like Signal. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/germany-warns-of-signal-account-hijacking-targeting-senior-figures/ also interesting: New phishing campaign targets users in Poland and Germany Security und GenAI Zwischen Innovation und Sicherheit AI in the Enterprise: Key Findings from the…
-
‘Encrypt It Already’ Campaign Pushes Big Tech to Prioritize E2E Encryption
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns mount amid increased AI use. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/encrypt-it-already-pushes-big-tech-e2e-encryption also interesting: Privacy Roundup: Week 6 of Year 2025 New Cybersecurity Executive Order: What…
-
Microsoft Starts Testing Built-In Sysmon Monitoring in Windows 11
Microsoft is rolling out native Sysmon support in Windows 11 Insider builds, giving security teams built-in system monitoring with optional activation. The post Microsoft Starts Testing Built-In Sysmon Monitoring in Windows 11 appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-windows-11-native-sysmon-support/ also interesting: How to configure OAuth in Microsoft 365 Defender and…
-
Flickr Notifies Users of Potential Third-Party Data Exposure
Flickr is alerting users to a potential data exposure tied to a third-party email service vulnerability. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/flickr-notifies-users-of-potential-third-party-data-exposure/ also interesting: Black Hat: Researchers demonstrate zero-click prompt injection attacks in popular AI agents The ultimate business resiliency test: Inside Kantsu’s ransomware response Iberia Airlines Hit by Data Breach Exposing Customer…
-
Bug Hunting With LLMs: Expert Tool Seeks More ‘True’ Flaws
Open Source ‘Vulnhalla’ Promises ‘Up to 96% Reduction in False Positives’. Using large language models to automatically identify only real code vulnerabilities – not false positives – remains a holy grail. Eschewing a moonshot approach, a tool called Vulnhalla helps senior researchers use guided questioning with LLMs to more rapidly triage actual vulnerabilities. First seen…
-
Russia Hacked the Polish Electricity Grid. Now What?
Stymied Attack Leaves Poland No Good Options in Responding to Provocation. Poland’s online defenses stopped a Russian cyberattack against the energy grid, but now the Warsaw government is in a bind about how to respond to a digital assault that was a lot more than a crime, but a sliver less than an act of…
-
Senator, who has repeatedly warned about secret US government surveillance, sounds new alarm over ‘CIA activities’
The two-line letter to the CIA’s director is the latest warning in recent years from a long-serving Democratic senator with knowledge of secret government programs and intelligence operations. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/06/senator-who-has-repeatedly-warned-about-secret-u-s-government-surveillance-sounds-new-alarm-over-cia-activities/ also interesting: Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group Cybercrime increasingly moving beyond financial…
-
Encrypt It Already Campaign Pushes Big Tech to Prioritize E2E Encryption
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption by default across their services, as privacy concerns mount amid increased AI use. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/encrypt-it-already-pushes-big-tech-e2e-encryption also interesting: Fraud Awareness Week: How to Effectively Protect Your Data and Combat Fraudsters Cybersecurity…
-
DKnife Linux toolkit hijacks router traffic to spy, deliver malware
A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dknife-linux-toolkit-hijacks-router-traffic-to-spy-deliver-malware/ also interesting: The 2024 cyberwar playbook: Tricks used by nation-state actors Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies…
-
Senator, who has repeatedly warned about secret U.S. government surveillance, sounds new alarm over ‘CIA activities’
The two-line letter to the CIA’s director is the latest warning in recent years from a long-serving Democratic senator with knowledge of secret government programs and intelligence operations. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/06/senator-who-has-repeatedly-warned-about-secret-u-s-government-surveillance-sounds-new-alarm-over-cia-activities/ also interesting: UK Government Debuts AI Tools for Enhanced Public Services Why every company needs a travel security program…

