Category: SecurityNews
-
NDSS 2025 Density Boosts Everything
Tags: ai, attack, conference, cybersecurity, detection, Internet, malware, military, network, resilience, strategy, trainingSession 12B: Malware Authors, Creators & Presenters: Jianwen Tian (Academy of Military Sciences), Wei Kong (Zhejiang Sci-Tech University), Debin Gao (Singapore Management University), Tong Wang (Academy of Military Sciences), Taotao Gu (Academy of Military Sciences), Kefan Qiu (Beijing Institute of Technology), Zhi Wang (Nankai University), Xiaohui Kuang (Academy of Military Sciences) PAPER Density Boosts Everything:…
-
Four new reasons why Windows LNK files cannot be trusted
Hidden command-line arguments: Beyond target spoofing, Beukema demonstrated a technique for hiding malicious command-line instructions behind legitimate executables. LNK files can launch trusted Windows binaries while passing attacker-controlled instructions through embedded arguments, enabling “living-off-the-land” (LOLBINs) execution without pointing directly to malware.According to the researcher, this can be done by manipulating the input passed into certain…
-
NATO must impose costs on Russia, China over cyber and hybrid attacks, says deputy chief
Speaking at the Munich Cyber Security Conference, Radmila Shekerinska said the security environment has become “more complex” and “more contested,” with rivals operating at the same time in the physical and digital worlds. First seen on therecord.media Jump to article: therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary
-
NATO must impose costs on Russia, China over cyber and hybrid attacks, says deputy chief
Speaking at the Munich Cyber Security Conference, Radmila Shekerinska said the security environment has become “more complex” and “more contested,” with rivals operating at the same time in the physical and digital worlds. First seen on therecord.media Jump to article: therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary
-
China may be rehearsing a digital siege, Taiwan warns
Tags: chinaYuh-Jye Lee, a senior adviser at Taiwan’s National Security Council, delivered a stark warning about China’s intentions to use cyberspace in new and more aggressive ways. First seen on therecord.media Jump to article: therecord.media/china-taiwan-digital-siege-munich
-
Wahlwerbung per Post kein Datenschutzverstoß Widerspruch gegen Datenweitergabe möglich
Tags: unclassifiedFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/wahlwerbung-post-kein-datenschutzverstoss-widerspruch-datenweitergabe-moglichkeit
-
Wahlwerbung per Post kein Datenschutzverstoß Widerspruch gegen Datenweitergabe möglich
Tags: unclassifiedFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/wahlwerbung-post-kein-datenschutzverstoss-widerspruch-datenweitergabe-moglichkeit
-
Deepfakes werden zur steigenden Gefahr im Bereich der Cybersecurity
Das Internet ist aufgrund seiner vielen Vorteile für Unternehmen und Privatpersonen aus dem Alltag nicht mehr wegzudenken. Leider geht die zunehmende Digitalisierung aber auch mit einem hohen Risiko einher. So ist die Anzahl an Cyberangriffen in den vergangenen zehn Jahren deutlich angestiegen und eine Trendumkehr ist nicht in Sicht. Dank neuer Technologien könnte sich die…
-
India’s E-Rupee Leads the Secure Adoption of CBDCs
Futurex’s Ruchin Kumar on CBDC Adoption and HSM Security for Transactions. CBDCs are expanding, with 90% of central banks exploring them. India’s e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.…
-
India’s E-Rupee Leads the Secure Adoption of CBDCs
Futurex’s Ruchin Kumar on CBDC Adoption and HSM Security for Transactions. CBDCs are expanding, with 90% of central banks exploring them. India’s e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.…
-
Bretton AI Gets $75M to Use AI for Financial Crime Compliance
AI Agents Target Anti-Money Laundering at Major Global Banks, Cut Manual Probes. Bretton AI has raised $75 million in Series B funding led by Sapphire Ventures to scale AI agents for anti-money laundering sanctions and KYC compliance. CEO Will Lawrence says the company is targeting large banks with automation designed to reduce manual investigations and…
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/
-
How to find and remove credential-stealing Chrome extensions
Researchers have uncovered 30 Chrome extensions stealing user data. Here’s how to check your browser and remove any malicious extensions step by step. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/how-to-find-and-remove-credential-stealing-chrome-extensions/
-
Windows ist offen für andere Passwortmanager – So funktionieren Passkeys unter Windows 11
First seen on security-insider.de Jump to article: www.security-insider.de/microsoft-sichere-anmeldung-externe-passwortmanager-a-de4da6e1ce78536bfad5a67c04b0d50b/
-
BSI läutet Ende der klassischen Verschlüsselung ein
Das BSI empfiehlt traditionelle Verschlüsselungsverfahren mit Post-Quanten-Kryptographie zu kombinieren.Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat in seiner aktualisierten Technischen Richtlinie TR-02102 konkrete Fristen für das Ende der herkömmlichen asymmetrischen Verschlüsselungsverfahren gesetzt. Demnach sollen diese Methoden ab dem Jahr 2031 nicht mehr isoliert verwendet werden. Für Systeme mit besonders hohen Sicherheitsanforderungen gilt diese Vorgabe…
-
Estonia spy chief calls on Europe to invest in its own offensive cyber capabilities
These capabilities are needed not just to mirror what the continent’s most capable adversaries can do, but also to match Europe’s defensive posture with credible tools to gain access to target networks, he said. First seen on therecord.media Jump to article: therecord.media/estonia-spy-chief-calls-on-europe-to-invest-in-own-offense
-
CISA orders federal agencies to patch exploited SolarWinds, Apple, Microsoft bugs within weeks
The Cybersecurity and Infrastructure Security Agency (CISA) added ten new vulnerabilities to its catalog of exploited bugs this week, forcing all federal civilian agencies to resolve the issues by the first week of March. First seen on therecord.media Jump to article: therecord.media/cisa-orders-federal-agencies-to-patch-solarwinds-microsoft-apple-bugs
-
CISA orders federal agencies to patch exploited SolarWinds, Apple, Microsoft bugs within weeks
The Cybersecurity and Infrastructure Security Agency (CISA) added ten new vulnerabilities to its catalog of exploited bugs this week, forcing all federal civilian agencies to resolve the issues by the first week of March. First seen on therecord.media Jump to article: therecord.media/cisa-orders-federal-agencies-to-patch-solarwinds-microsoft-apple-bugs
-
Amazon’s Ring cancels partnership with Flock, a network of AI cameras used by ICE, feds, and police
This news comes less than a week after Ring’s Super Bowl commercial stoked controversy over the company’s capacity for mass surveillance. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/
-
Valentinstag KnowBe4 warnt vor Deepfakes Romantikbetrug
Betrüger nutzen am Valentinstag Echtzeit-Deepfake-Videos und perfekte KI-Persönlichkeiten, um einsame Herzen zu manipulieren, was zu finanziellen Schäden und gebrochenen Herzen führt. Liebesbetrügereien haben sich zu einem vollständig KI-gestützten Geschäft entwickelt. Betrüger verwenden nicht mehr nur gestohlene Fotos, sondern erstellen komplette falsche Identitäten, Echtzeit-Videopersönlichkeiten auf Zoom und WhatsApp sowie automatisierte Gesprächs-Bots, die über Monate hinweg ein…
-
41 Prozent der Spam-Mails zum Valentinstag sind digitaler Betrug
Wie jedes Jahr ist auch der diesjährige Valentinstag eine Hochphase für betrügerische Mails. In der Analyse erkannten Experten der Bitdefender Labs 41 Prozent der Spam-Mails mit Bezug zum Valentinstag im Januar und Anfang Februar als betrügerisch. 55 Prozent der bösartigen Nachrichten zielten auf Absender in den USA. Deutschland liegt als Zielland mit 13 Prozent auf…
-
Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code execution. Threat actors rapidly began exploiting a newly patched BeyondTrust vulnerability, tracked as CVE-2026-1731 (CVSS score of 9.9), soon after a proof-of-concept exploit became public. This week BeyondTrust released security updates to address the critical flaw in its Remote Support…
-
Romance Scamming: der neue Alltag beim Online-Dating
Tags: aiEine neue Studie zeigt, dass jeder dritte Deutsche online schon einmal auf ein gefälschtes Profil oder einen KI-generierten Bot gestoßen ist. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/romance-scamming-online-dating
-
US needs to impose ‘real costs’ on bad actors, State Department cyber official says
At the Munich Cyber Security Conference, senior U.S. officials signaled that a defensive cyber crouch is giving way to something closer to Cold Warstyle deterrence, an effort to convince adversaries that the costs of hacking the United States will outweigh the benefits. First seen on therecord.media Jump to article: therecord.media/usa-cyber-actors-consequences
-
16 Prozent mehr Cyber-Angriffe in Deutschland im Januar
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat seinen Monthly-Cyber-Threat-Report für Januar 2026 veröffentlicht. Im Januar 2026 erfuhren Unternehmen weltweit durchschnittlich 2090 Cyber-Angriffe pro Woche. Dies entspricht einem Anstieg von drei Prozent gegenüber Dezember 2025 und von 17 Prozent gegenüber dem Vorjahreszeitraum. Im DACH-Raum gehen die Trends auseinander. In Deutschland […]…
-
Odido CRM Data Breach Exposes 6.2M Customer Records
A cyberattack on Odido’s CRM system exposed personal data from 6.2 million customers, though passwords and billing information were not affected. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/odido-crm-data-breach-exposes-6-2m-customer-records/
-
Senegalese Data Breaches Expose Lack of Security Maturity
Green Blood Group steals personal records and biometric data of the West African nation’s nearly 20 million residents. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/hackers-breach-senegal-national-biometric-database

