Tag: defense
-
Ukraine appoints digital chief as defense minister to drive military reform
Ukraine’s parliament appointed Mykhailo Fedorov, the digital transformation minister who modernized public services and helped develop drone programs for the war effort, as the country’s new defense chief. First seen on therecord.media Jump to article: therecord.media/ukraine-digital-chief-transformation
-
‘Imagination the limit’: DeadLock ransomware gang using smart contracts to hide their work
New crooks on the block get crafty with blockchain to evade defenses First seen on theregister.com Jump to article: www.theregister.com/2026/01/14/deadlock_ransomware_smart_contracts/
-
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025.The activity has been attributed with medium confidence to a Russian hacking group tracked as Void Blizzard (aka Laundry Bear or UAC-0190). The threat actor is believed…
-
Ukraine’s army targeted in new charity-themed malware campaign
Officials of Ukraine’s Defense Forces were targeted in a charity-themed campaign between October and December 2025 that delivered backdoor malware called PluggyApe. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukraines-army-targeted-in-new-charity-themed-malware-campaign/
-
Microsoft Patch Tuesday addresses 112 defects, including one actively exploited zero-day
Researchers said the information disclosure zero-day exposes sensitive information that attackers can use to undermine defenses and make other exploits more reliable. First seen on cyberscoop.com Jump to article: cyberscoop.com/microsoft-patch-tuesday-january-2026/
-
Hill warning: Don’t put cyber offense before defense
A House hearing weighed the pros and cons from the Trump administration and some lawmakers to step up cyber offensive operations. First seen on cyberscoop.com Jump to article: cyberscoop.com/us-offensive-cyber-operations-defense-cisa-workforce-house-homeland-security-committee/
-
HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models
Researchers from Shanghai Jiao Tong University, the University of Illinois at Urbana-Champaign, and Zhejiang University have unveiled HoneyTrap, a groundbreaking deceptive defense framework designed to counter progressively intensifying jailbreak attacks on large language models. The novel approach leverages collaborative multi-agent systems to mislead attackers and drain their computational resources while maintaining seamless interactions with legitimate…
-
Driving Passwordless Adoption with FIDO and Biometric Authentication
Tags: access, attack, authentication, awareness, banking, breach, business, cloud, compliance, container, control, credentials, cyber, data, defense, fido, finance, fraud, government, Hardware, iam, identity, insurance, login, mobile, passkey, password, phishing, risk, service, technology, threat, trainingDriving Passwordless Adoption with FIDO and Biometric Authentication madhav Tue, 01/13/2026 – 06:13 For decades, passwords have been the default mechanism for securing digital access. They are deeply embedded in enterprise systems and workflows, yet they were never designed to withstand today’s threat landscape. Cybersecurity Sarah Lefavrais – IAM Product Marketing Manager More About This…
-
SAP Defense in Focus as Zerlang Takes Over at SecurityBridge
New CEO Jesper Zerlang Plans Global Growth, US Push and Vertical Expansion. Former Logpoint chief Jesper Zerlang, now CEO at SecurityBridge, says SAP security remains a weak link in enterprise risk strategies. As CEO of SecurityBridge, he’s launching a global expansion and leaning into the company’s product differentiators to fill the gap. First seen on…
-
How GenAI Is Aiding a Rise in Identity-Based Threats
Thales CISO Eric Liebowitz Outlines Urgent Defenses for AI-Driven Phishing Threats. The shift from brute-force attacks to AI-powered phishing is creating tougher challenges for defenders. Thales CISO, Americas, Eric Liebowitz says combining employee training with behavioral monitoring and AI guardrails is essential to mitigate identity risk. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/how-genai-aiding-rise-in-identity-based-threats-a-30493
-
GoFundMe Ignores Own Rules by Hosting a Legal-Defense Fund for the ICE Agent Who Killed Renee Good
The fundraiser for the ICE agent in the Renee Good killing has stayed online in seeming breach of GoFundMe’s own terms of service, prompting questions about selective enforcement. First seen on wired.com Jump to article: www.wired.com/story/gofundme-ice-jonathan-ross-renee-good-fundraiser/
-
Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices
Public sector cybersecurity faces outdated systems, budget gaps, and rising attacks. Learn key challenges, defense strategies, and proven best practices. First seen on hackread.com Jump to article: hackread.com/cybersecurity-public-sector-challenges-strategies-practices/
-
Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign
Rust offers evasion advantages: CloudSEK researchers said RustyWater was developed in Rust, which they said is increasingly used by malware authors for its memory safety features and cross-platform capabilities, according to the blog post. Other state-sponsored groups, including Russia’s Gossamer Bear and China-linked actors, have also deployed Rust-based malware in recent campaigns, according to security…
-
How impenetrable are modern secret defenses?
How Secure Is Your Cloud Environment With Non-Human Identities? Have you ever considered the crucial role that non-human identities (NHIs) play in modern cloud security? The concept of NHIs is rapidly gaining traction, acting as a linchpin for organizations striving to build more impenetrable secret defenses. Understanding Non-Human Identities and Their Importance NHIs refer to……
-
ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches
Also: Turning AI Data Into AI Defense, Autonomous Border Patrol Robots. In this week’s panel, four ISMG editors discussed how basic security failures are still opening the door to major breaches, how researchers are rethinking data protection in the age of AI and the implications of robots with artificial intelligence patrolling national borders. First seen…
-
Why AI-Powered Cyber Defense Is No Longer Optional for Modern Businesses
Large businesses or governments aren’t the only ones threatened by cyber attacks. Every organization is now equally threatened…. First seen on hackread.com Jump to article: hackread.com/ai-powered-cyber-defense-modern-businesses/
-
INFORM 2026: MITRE’s Updated Threat-Informed Defense Maturity Model Explained
On January 8th, MITRE’s Center for Threat-Informed Defense (CTID) published a significant update to INFORM, its threat-informed defense maturity model. This update reflects the joint efforts of MITRE researchers, AttackIQ, and several CTID members to enhance INFORM based on two years of operational use and broad security community feedback. First seen on securityboulevard.com Jump to…
-
CrowdStrike Acquires SGNL for $740 Million to Thwart AI-Powered Cyber Threats
Tags: ai, credentials, crowdstrike, cyber, cybersecurity, defense, exploit, hacker, identity, intelligence, startup, technology, threatCrowdStrike Inc. said Thursday it will acquire identity security startup SGNL in a deal valued at $740 million the latest move by the cybersecurity giant to fortify its defenses against increasingly sophisticated artificial intelligence (AI)-powered cyberattacks. The acquisition centers on SGNL’s continuous identity technology, designed to prevent hackers from exploiting user credentials as entry.. First…
-
Cisco Snort 3 Vulnerability Leading to Sensitive Data Disclosure
Cisco has disclosed two critical vulnerabilities in the Snort 3 detection engine affecting multiple enterprise security products, including firewalls, threat defense systems, and edge platforms. The vulnerabilities, tracked as CVE-2026-20026 and CVE-2026-20027 under advisory cisco-sa-snort3-dcerpc-vulns-J9HNF4tH, could allow unauthenticated remote attackers to leak sensitive information or cause denial-of-service conditions by disrupting packet inspection capabilities. The vulnerabilities…
-
UK Government Launches Cyber Action Plan to Bolster Public Sector Security
The UK government has unveiled an ambitious £210 million cyber security initiative designed to fortify digital defenses across public sector departments and restore confidence in online government services. The centerpiece of the initiative is the newly formed Government Cyber Unit, which will coordinate risk management and incident response operations across all government departments. This centralized…
-
Voice cloning defenses are easier to undo than expected
Many voice protection tools promise to block cloning by adding hidden noise to speech. Researchers at a Texas university found that widely used voice protection methods can be … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/08/voice-authentication-audio-cleanup-risk/

