Author: Andy Stern
-
Digitale Souveränität: Irgendwo zwischen Idealismus und Alltagstauglichkeit
Tags: unclassifiedWir haben gefragt, wie ihr euch digital frei macht, und gelernt: Der Wechselwillen ist groß, oft fehlt es aber noch an Alternativen – oder die Bequemlichkeit siegt. First seen on golem.de Jump to article: www.golem.de/news/di-day-je-weniger-us-basierter-dreck-desto-besser-2602-205075.html
-
AI Revolution Reshapes CISO Spending for 2026: Security Leaders Prioritize Defense Automation
The cybersecurity landscape is undergoing a fundamental shift as chief information security officers (CISOs) shift their 2026 budgets to artificial intelligence (AI) and realign traditional defense strategies. Nearly 80% of senior security executives are prioritizing AI-driven solutions to counter increasingly sophisticated threats, a new report from Glilot Capital Partners reveals. The survey, which polled leaders..…
-
EU: WhatsApp Likely Broke Antitrust Law by Blocking Rival AI
European Commission Intends to Force Meta to Open Chat App to Third Party AI. The European Commission said Meta appears to have broken antitrust law by blocking third-party AI assistants from interfacing with their users through WhatsApp. It gave notice to parent company that Europe intends to open up WhatsApp to third-party general-purpose AI assistants.…
-
Threat actors target SolarWinds Web Help Desk flaw
Researchers say hackers are using remote monitoring and other tools in compromised environments. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/threat-actors-target-solarwinds-web-help-desk-flaw/811702/
-
Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme
Tags: fraudTwo Connecticut men face federal charges for a $3m scheme targeting online gambling platforms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/men-charged-gambling-fraud-scheme/
-
Hacktivist scrapes over 500,000 stalkerware customers’ payment records
More than half-a-million people who bought access to phone surveillance and social media snooping apps had their email address and partial payment card numbers published online. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/09/hacktivist-scrapes-over-500000-stalkerware-customers-payment-records/
-
FTC data highlights online threats to consumers and businesses
The commission listed several steps companies can take to fend off attacks. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ftc-ransomware-scams-fraud-report/811705/
-
Password guessing without AI: How attackers build targeted wordlists
Attackers don’t need AI to crack passwords, they build targeted wordlists from an organization’s own public language. This article explains how tools like CeWL turn websites into high-success password guesses and why complexity rules alone fall short. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/password-guessing-without-ai-how-attackers-build-targeted-wordlists/
-
Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
SmarterTools, the company behind the popular Microsoft Exchange alternative SmarterMail, has been breached by a ransomware-wielding group that leveraged a recently fixed … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/09/smartertools-breach-smartermail-vulnerability/
-
VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code
VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/voidlink-malware-multi-cloud-ai/
-
Shortlist: Most Inspiring Women in Cyber Awards 2026
We’re pleased to announce the shortlist for this year’s Most Inspiring Women in Cyber Awards! This year’s awards are sponsored by BT, Fidelity International, Plexal and Bridewell. The awards are supported by WiCyS UK&I, WiTCH and Seidea and hosted by Eskenzi PR. Our judges had the difficult decision of picking their favourites using a points…
-
Criminal IP Integrates with IBM QRadar to Deliver Real-Time Threat Intelligence Across SIEM and SOAR
Torrance, United States / California, February 9th, 2026, CyberNewswire Criminal IP (criminalip.io), the AI-powered threat intelligence and attack surface intelligence platform, is now integrated with IBM QRadar SIEM and QRadar SOAR. The integration brings external, IP-based threat intelligence directly into IBM QRadar’s detection, investigation, and response workflows, enabling security teams to identify malicious activity faster…
-
Flaw in Anthropic Claude Extensions Can Lead to RCE in Google Calendar: LayerX
LayerX researchers say that a security in Anthropic’s Claude Desktop Extensions can be exploited to allow threat actors to place a RCE vulnerability into Google Calendar, the latest report to highlight the risks that come with giving AI models with full system privileges unfettered access to sensitive data. First seen on securityboulevard.com Jump to article:…
-
Flickr’s 35M Users Affected by Third-Party Data Exposure
Flickr disclosed a data exposure tied to a third-party email provider, highlighting how external service vulnerabilities can put millions of users at risk. The post Flickr’s 35M Users Affected by Third-Party Data Exposure appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-flickr-third-party-email-data-exposure/
-
GoBruteforcer – Botnetz nutzt schwache Passwörter für Angriffe auf Webserver
First seen on security-insider.de Jump to article: www.security-insider.de/gobruteforcer-botnetz-angriffe-linux-webserver-a-20f0c9bfd20c7b62612537e2a98d9199/
-
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Microsoft has revealed that it observed a multi”‘stage intrusion that involved the threat actors exploiting internet”‘exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization’s network to other high-value assets.That said, the Microsoft Defender Security Research Team said it’s not clear whether the activity weaponized recently First seen…
-
Taiwan tells Uncle Sam its chip ecosystem ain’t going anywhere
Tags: usaMoving 40% of semiconductor production to America is ‘impossible’ says vice premier First seen on theregister.com Jump to article: www.theregister.com/2026/02/09/taiwan_us_chip_production/
-
European Commission hit by cyberattackers targeting mobile management platform
Tags: mobileThe European Commission’s mobile device management platform was hacked but the incident was swiftly contained and no compromise of mobile devices was detected, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/09/european-commission-ivanti-epmm-vulnerabilities/
-
40 Prozent der Android-Smartphones unsicher? Was du über diese Google-Statistik wissen musst
First seen on t3n.de Jump to article: t3n.de/news/40-prozent-android-smartphones-unsicher-1728678/
-
Russia grants asylum to Spanish professor wanted for alleged pro-Moscow cyber operations
Russia has granted political asylum to a Spanish national accused in his home country of “cyberterrorism and espionage” in support of Moscow, according to Russian state media. First seen on therecord.media Jump to article: therecord.media/russia-asylum-spanish-professor-espionage
-
BeyondTrust Vulnerability Allows Pre-Auth Remote Code Execution
A BeyondTrust vulnerability lets unauthenticated attackers execute remote code on affected systems. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/beyondtrust-vulnerability-allows-pre-auth-remote-code-execution/
-
Moltbook-Hack in 3 Minuten: KI-Netzwerk offenbart massive Sicherheitslücke
First seen on t3n.de Jump to article: t3n.de/news/moltbook-hack-in-3-minuten-1727898/
-
Claude Opus 4.6 Exposes Hundreds of Open-Source Vulnerabilities
Anthropic says Claude Opus 4.6 identified over 500 previously unknown high-severity flaws in widely used open-source libraries. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/claude-opus-4-6-exposes-hundreds-of-open-source-vulnerabilities/
-
Payment tech provider for Texas, Florida governments working with FBI to resolve ransomware attack
BridgePay Network Solutions initially warned customers on Friday that it was dealing with system-wide outages and later said that it was working with the FBI and U.S. Secret Service forensic team to resolve a ransomware attack. First seen on therecord.media Jump to article: therecord.media/payment-tech-provider-texas-florida-govs-ransomware-attack
-
BridgePay Ransomware Causes Widespread Payment Outages
A ransomware attack on BridgePay caused widespread U.S. payment outages, forcing some organizations to go cash-only. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/bridgepay-ransomware-causes-widespread-payment-outages/
-
Proaktiv statt reaktiv durch Automatisierung – Proaktiv statt reaktiv durch Automatisierung
Tags: unclassifiedFirst seen on security-insider.de Jump to article: www.security-insider.de/proaktiv-statt-reaktiv-durch-automatisierung-a-d3f7ec2d0fcb006c9c19e6a21e27f838/
-
Moltbook-Hack in 3 Minuten: KI-Netzwerk offenbart massive Sicherheitslücke
First seen on t3n.de Jump to article: t3n.de/news/moltbook-hack-in-3-minuten-1727898/
-
Sicherheitslücke aufgedeckt: Ein Sprachbefehl reicht, um diesen Roboter zu übernehmen
Tags: bugFirst seen on t3n.de Jump to article: t3n.de/news/sicherheitsluecke-aufgedeckt-ein-sprachbefehl-reicht-um-diesen-roboter-zu-uebernehmen-1723282/
-
Moltbook-Hack in 3 Minuten: KI-Netzwerk offenbart massive Sicherheitslücke
First seen on t3n.de Jump to article: t3n.de/news/moltbook-hack-in-3-minuten-1727898/

