Author: Andy Stern
-
Amazon’s Ring cancels partnership with Flock, a network of AI cameras used by ICE, feds, and police
This news comes less than a week after Ring’s Super Bowl commercial stoked controversy over the company’s capacity for mass surveillance. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/
-
Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code execution. Threat actors rapidly began exploiting a newly patched BeyondTrust vulnerability, tracked as CVE-2026-1731 (CVSS score of 9.9), soon after a proof-of-concept exploit became public. This week BeyondTrust released security updates to address the critical flaw in its Remote Support…
-
India’s E-Rupee Leads the Secure Adoption of CBDCs
Futurex’s Ruchin Kumar on CBDC Adoption and HSM Security for Transactions. CBDCs are expanding, with 90% of central banks exploring them. India’s e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.…
-
41 Prozent der Spam-Mails zum Valentinstag sind digitaler Betrug
Wie jedes Jahr ist auch der diesjährige Valentinstag eine Hochphase für betrügerische Mails. In der Analyse erkannten Experten der Bitdefender Labs 41 Prozent der Spam-Mails mit Bezug zum Valentinstag im Januar und Anfang Februar als betrügerisch. 55 Prozent der bösartigen Nachrichten zielten auf Absender in den USA. Deutschland liegt als Zielland mit 13 Prozent auf…
-
BSI läutet Ende der klassischen Verschlüsselung ein
Das BSI empfiehlt traditionelle Verschlüsselungsverfahren mit Post-Quanten-Kryptographie zu kombinieren.Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat in seiner aktualisierten Technischen Richtlinie TR-02102 konkrete Fristen für das Ende der herkömmlichen asymmetrischen Verschlüsselungsverfahren gesetzt. Demnach sollen diese Methoden ab dem Jahr 2031 nicht mehr isoliert verwendet werden. Für Systeme mit besonders hohen Sicherheitsanforderungen gilt diese Vorgabe…
-
India’s E-Rupee Leads the Secure Adoption of CBDCs
Futurex’s Ruchin Kumar on CBDC Adoption and HSM Security for Transactions. CBDCs are expanding, with 90% of central banks exploring them. India’s e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.…
-
Valentinstag KnowBe4 warnt vor Deepfakes Romantikbetrug
Betrüger nutzen am Valentinstag Echtzeit-Deepfake-Videos und perfekte KI-Persönlichkeiten, um einsame Herzen zu manipulieren, was zu finanziellen Schäden und gebrochenen Herzen führt. Liebesbetrügereien haben sich zu einem vollständig KI-gestützten Geschäft entwickelt. Betrüger verwenden nicht mehr nur gestohlene Fotos, sondern erstellen komplette falsche Identitäten, Echtzeit-Videopersönlichkeiten auf Zoom und WhatsApp sowie automatisierte Gesprächs-Bots, die über Monate hinweg ein…
-
Windows ist offen für andere Passwortmanager – So funktionieren Passkeys unter Windows 11
First seen on security-insider.de Jump to article: www.security-insider.de/microsoft-sichere-anmeldung-externe-passwortmanager-a-de4da6e1ce78536bfad5a67c04b0d50b/
-
CISA orders federal agencies to patch exploited SolarWinds, Apple, Microsoft bugs within weeks
The Cybersecurity and Infrastructure Security Agency (CISA) added ten new vulnerabilities to its catalog of exploited bugs this week, forcing all federal civilian agencies to resolve the issues by the first week of March. First seen on therecord.media Jump to article: therecord.media/cisa-orders-federal-agencies-to-patch-solarwinds-microsoft-apple-bugs
-
Senegalese Data Breaches Expose Lack of Security Maturity
Green Blood Group steals personal records and biometric data of the West African nation’s nearly 20 million residents. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/hackers-breach-senegal-national-biometric-database
-
US needs to impose ‘real costs’ on bad actors, State Department cyber official says
At the Munich Cyber Security Conference, senior U.S. officials signaled that a defensive cyber crouch is giving way to something closer to Cold Warstyle deterrence, an effort to convince adversaries that the costs of hacking the United States will outweigh the benefits. First seen on therecord.media Jump to article: therecord.media/usa-cyber-actors-consequences
-
Odido CRM Data Breach Exposes 6.2M Customer Records
A cyberattack on Odido’s CRM system exposed personal data from 6.2 million customers, though passwords and billing information were not affected. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/odido-crm-data-breach-exposes-6-2m-customer-records/
-
16 Prozent mehr Cyber-Angriffe in Deutschland im Januar
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat seinen Monthly-Cyber-Threat-Report für Januar 2026 veröffentlicht. Im Januar 2026 erfuhren Unternehmen weltweit durchschnittlich 2090 Cyber-Angriffe pro Woche. Dies entspricht einem Anstieg von drei Prozent gegenüber Dezember 2025 und von 17 Prozent gegenüber dem Vorjahreszeitraum. Im DACH-Raum gehen die Trends auseinander. In Deutschland […]…
-
Romance Scamming: der neue Alltag beim Online-Dating
Tags: aiEine neue Studie zeigt, dass jeder dritte Deutsche online schon einmal auf ein gefälschtes Profil oder einen KI-generierten Bot gestoßen ist. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/romance-scamming-online-dating
-
Bitcoin trading firm CEO gets 20 years for operating $200 million Ponzi scheme
The U.S. Department of Justice sentenced the CEO of a multi level marketing and bitcoin trading firm to 20 years in prison after a conviction for wire fraud and money … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/13/bitcoin-prison-200-million-ponzi-scheme/
-
Europe must adapt to ‘permanent’ cyber and hybrid threats, Sweden warns
Cyber and hybrid threats are now a permanent feature of Europe’s security environment, a senior Swedish defense official said, citing Russia’s full-scale invasion of Ukraine as a turning point. First seen on therecord.media Jump to article: therecord.media/sweden-cyber-threats-europe-permanent
-
Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/
-
The foundation problem: How a lack of accountability is destroying cybersecurity
Tags: business, compliance, cybersecurity, healthcare, jobs, monitoring, risk, technology, training, vulnerabilityThe accountability gap: When leaders don’t take ownership, it shows up in predictable ways. Some are obvious, like teams that have a high turnover rate, projects that never finish or the same problems recurring month after month, year after year. Others, like technical debt, are far more insidious. Technical debt accumulates until it becomes a…
-
Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/
-
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager.The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes. First seen on thehackernews.com…
-
CISA flags critical Microsoft SCCM flaw as exploited in attacks
CISA ordered federal agencies on Thursday to secure their systems against a critical Microsoft Configuration Manager vulnerability patched in October 2024 and now exploited in attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks/
-
Flucht vor der Polizei: Malware-Entwickler täuscht eigenen Tod vor
Tags: malwareMit einer gefälschten Sterbeurkunde wollte ein Malware-Entwickler einer Haftstrafe entgehen. Doch seine Gewohnheiten wurden ihm zum Verhängnis. First seen on golem.de Jump to article: www.golem.de/news/flucht-vor-der-polizei-malware-entwickler-taeuscht-eigenen-tod-vor-2602-205389.html
-
Autonomes Fahren: Waymo ruft an, Deutschland legt auf
Die Google-Tochter Waymo entwickelt autonome Fahrzeuge. Die Rechtslage in Deutschland erlaubt den Einsatz aber momentan nicht. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/autonomes-fahren-waymo-ruft-an-deutschland-legt-auf-325932.html
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
AI Powered HIPAA Compliance Readiness Testing in Healthcare Software. A QA Leader’s Guide to Continuous Compliance
In healthcare software, quality is inseparable from compliance. A feature working as designed is not enough. Every workflow, integration, and data exchange must protect Protected…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/02/ai-powered-hipaa-compliance-readiness-testing-in-healthcare-software-a-qa-leaders-guide-to-continuous-compliance/
-
CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution
A newly disclosed critical flaw, CVE-2025-64712 (CVSS 9.8), in Unstructured.io’s “unstructured” ETL library could let attackers perform arbitrary file writes and potentially achieve remote code execution (RCE) on systems that process untrusted documents. Unstructured is widely used to convert messy business files into AI-ready text and embeddings, and the vendor’s ecosystem footprint is often cited as spanning…

