Author: Andy Stern
-
US needs to impose ‘real costs’ on bad actors, State Department cyber official says
At the Munich Cyber Security Conference, senior U.S. officials signaled that a defensive cyber crouch is giving way to something closer to Cold Warstyle deterrence, an effort to convince adversaries that the costs of hacking the United States will outweigh the benefits. First seen on therecord.media Jump to article: therecord.media/usa-cyber-actors-consequences
-
16 Prozent mehr Cyber-Angriffe in Deutschland im Januar
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat seinen Monthly-Cyber-Threat-Report für Januar 2026 veröffentlicht. Im Januar 2026 erfuhren Unternehmen weltweit durchschnittlich 2090 Cyber-Angriffe pro Woche. Dies entspricht einem Anstieg von drei Prozent gegenüber Dezember 2025 und von 17 Prozent gegenüber dem Vorjahreszeitraum. Im DACH-Raum gehen die Trends auseinander. In Deutschland […]…
-
Bitcoin trading firm CEO gets 20 years for operating $200 million Ponzi scheme
The U.S. Department of Justice sentenced the CEO of a multi level marketing and bitcoin trading firm to 20 years in prison after a conviction for wire fraud and money … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/13/bitcoin-prison-200-million-ponzi-scheme/
-
Europe must adapt to ‘permanent’ cyber and hybrid threats, Sweden warns
Cyber and hybrid threats are now a permanent feature of Europe’s security environment, a senior Swedish defense official said, citing Russia’s full-scale invasion of Ukraine as a turning point. First seen on therecord.media Jump to article: therecord.media/sweden-cyber-threats-europe-permanent
-
KnowBe4 Appoints Kelly Morgan as Chief Customer Officer to Drive Global Customer Lifecycle Strategy
KnowBe4 has announced the appointment of Kelly Morgan as its new Chief Customer Officer (CCO), reinforcing the company’s commitment to delivering measurable customer outcomes as it continues to expand in the Human and AI Risk Management market. Morgan will oversee KnowBe4’s global end-to-end customer lifecycle, leading the Customer Success, Customer Support, Managed Services and Professional…
-
Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/
-
The foundation problem: How a lack of accountability is destroying cybersecurity
Tags: business, compliance, cybersecurity, healthcare, jobs, monitoring, risk, technology, training, vulnerabilityThe accountability gap: When leaders don’t take ownership, it shows up in predictable ways. Some are obvious, like teams that have a high turnover rate, projects that never finish or the same problems recurring month after month, year after year. Others, like technical debt, are far more insidious. Technical debt accumulates until it becomes a…
-
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business Suite and Facebook Business Manager.The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes. First seen on thehackernews.com…
-
Autonomes Fahren: Waymo ruft an, Deutschland legt auf
Die Google-Tochter Waymo entwickelt autonome Fahrzeuge. Die Rechtslage in Deutschland erlaubt den Einsatz aber momentan nicht. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/it-sicherheit/autonomes-fahren-waymo-ruft-an-deutschland-legt-auf-325932.html
-
CISA flags critical Microsoft SCCM flaw as exploited in attacks
CISA ordered federal agencies on Thursday to secure their systems against a critical Microsoft Configuration Manager vulnerability patched in October 2024 and now exploited in attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks/
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
Flucht vor der Polizei: Malware-Entwickler täuscht eigenen Tod vor
Tags: malwareMit einer gefälschten Sterbeurkunde wollte ein Malware-Entwickler einer Haftstrafe entgehen. Doch seine Gewohnheiten wurden ihm zum Verhängnis. First seen on golem.de Jump to article: www.golem.de/news/flucht-vor-der-polizei-malware-entwickler-taeuscht-eigenen-tod-vor-2602-205389.html
-
Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
CVE-2025-64712 in Unstructured.io Puts Amazon, Google, and Tech Giants at Risk of Remote Code Execution
A newly disclosed critical flaw, CVE-2025-64712 (CVSS 9.8), in Unstructured.io’s “unstructured” ETL library could let attackers perform arbitrary file writes and potentially achieve remote code execution (RCE) on systems that process untrusted documents. Unstructured is widely used to convert messy business files into AI-ready text and embeddings, and the vendor’s ecosystem footprint is often cited as spanning…
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
AI Powered HIPAA Compliance Readiness Testing in Healthcare Software. A QA Leader’s Guide to Continuous Compliance
In healthcare software, quality is inseparable from compliance. A feature working as designed is not enough. Every workflow, integration, and data exchange must protect Protected…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/02/ai-powered-hipaa-compliance-readiness-testing-in-healthcare-software-a-qa-leaders-guide-to-continuous-compliance/
-
Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/
-
Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)
Attackers are exploiting a recently patched critical vulnerability (CVE-2026-1731) in internet-facing BeyondTrust Remote Support and Privileged Remote Access instances. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/13/beyondtrust-cve-2026-1731-poc-exploit-activity/
-
What is a SAML Assertion in Single Sign-On?
Learn what a SAML assertion is in Single Sign-On. Discover how these XML trust tokens securely exchange identity data between IdPs and Service Providers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/what-is-a-saml-assertion-in-single-sign-on/
-
state-backed hackers exploit Gemini AI for cyber recon and attacks
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations. Google DeepMind and GTIG report a rise in model extraction or “distillation” attacks aimed at stealing AI intellectual property, which Google has detected and blocked. While APT groups have not breached frontier models, private firms and researchers have tried to…
-
Moltbook: Das perfekte Setup für einen Sicherheitsalptraum
Tags: unclassifiedMoltbook bietet einen extrem faszinierenden Einblick in die Welt der KI. Aber: Es ohne Security-Wissen zu nutzen, wäre mehr als fahrlässig. First seen on golem.de Jump to article: www.golem.de/news/moltbook-das-perfekte-setup-fuer-einen-sicherheitsalptraum-2602-205337.html
-
GenAI-Nutzung kann aus ahnungslosen Mitarbeitern Insider-Bedrohungen machen
Das Risiko steigt weiter, wenn Mitarbeiter unbeabsichtigt sensible Informationen wie API-Schlüssel oder Passwörter in GenAI-Plattformen offenlegen. Werden solche Daten von Angreifern abgefangen, dann können sich diese als vertrauenswürdige Nutzer ausgeben und unbemerkt auf Unternehmenssysteme zugreifen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/genai-nutzung-kann-aus-ahnungslosen-mitarbeitern-insider-bedrohungen-machen/a43686/
-
Moltbook: Das perfekte Setup für einen Sicherheitsalptraum
Tags: unclassifiedMoltbook bietet einen extrem faszinierenden Einblick in die Welt der KI. Aber: Es ohne Security-Wissen zu nutzen, wäre mehr als fahrlässig. First seen on golem.de Jump to article: www.golem.de/news/moltbook-das-perfekte-setup-fuer-einen-sicherheitsalptraum-2602-205337.html
-
Moltbook: Das perfekte Setup für einen Sicherheitsalptraum
Tags: unclassifiedMoltbook bietet einen extrem faszinierenden Einblick in die Welt der KI. Aber: Es ohne Security-Wissen zu nutzen, wäre mehr als fahrlässig. First seen on golem.de Jump to article: www.golem.de/news/moltbook-das-perfekte-setup-fuer-einen-sicherheitsalptraum-2602-205337.html
-
Chrome Extensions Infect 500K Users to Hijack VKontakte Accounts
A long-running Chrome extension malware campaign has silently hijacked more than 500,000 VKontakte (VK) accounts, forcing users into attacker-controlled groups, resetting their settings every 30 days, and abusing VK’s own infrastructure as command-and-control. What appeared to be harmless VK customization tools were in reality a tightly maintained malware project operated by a single threat actor…
-
Static Design to Adaptive Control: How Artificial Intelligence Improves Modern Material Handling Equipment Systems
AI enables material handling systems to adapt to demand volatility through predictive design, dynamic control, and smarter maintenance without replacing core engineering. First seen on hackread.com Jump to article: hackread.com/how-artificial-intelligence-improves-material-handling-equipment/
-
Okta for AI Agents macht Schatten-KI sichtbar und kontrollierbar
Okta verbessert KI-Sicherheit, indem es unbekannte KI-Agenten von versteckten Risiken in kontrollierte Assets umwandelt, die sichere Innovation ermöglichen. Auf diese Weise lassen sich KI-Agenten nicht nur identifizieren, sondern über ihren gesamten Lebenszyklus hinweg sicher integrieren, verwalten und schützen ohne Innovation auszubremsen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/okta-for-ai-agents-macht-schatten-ki-sichtbar-und-kontrollierbar/a43727/

