Category: SecurityNews
-
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG).The tech giant’s threat intelligence division said the adversarial targeting of the sector is centered around four key themes: striking defense…
-
The Rise of Continuous Penetration Testing-as-a-Service (PTaaS)
Traditional penetration testing has long been a cornerstone of cyber assurance. For many organisations, structured annual or biannual tests have provided an effective way to validate security controls, support compliance requirements, and identify material weaknesses across infrastructure, applications, and external attack surfaces. However, enterprise environments now change at a pace that is difficult to reconcile”¦…
-
The Rise of Continuous Penetration Testing-as-a-Service (PTaaS)
Traditional penetration testing has long been a cornerstone of cyber assurance. For many organisations, structured annual or biannual tests have provided an effective way to validate security controls, support compliance requirements, and identify material weaknesses across infrastructure, applications, and external attack surfaces. However, enterprise environments now change at a pace that is difficult to reconcile”¦…
-
NDSS 2025 Density Boosts Everything
Tags: ai, attack, conference, cybersecurity, detection, Internet, malware, military, network, resilience, strategy, trainingSession 12B: Malware Authors, Creators & Presenters: Jianwen Tian (Academy of Military Sciences), Wei Kong (Zhejiang Sci-Tech University), Debin Gao (Singapore Management University), Tong Wang (Academy of Military Sciences), Taotao Gu (Academy of Military Sciences), Kefan Qiu (Beijing Institute of Technology), Zhi Wang (Nankai University), Xiaohui Kuang (Academy of Military Sciences) PAPER Density Boosts Everything:…
-
Four new reasons why Windows LNK files cannot be trusted
Hidden command-line arguments: Beyond target spoofing, Beukema demonstrated a technique for hiding malicious command-line instructions behind legitimate executables. LNK files can launch trusted Windows binaries while passing attacker-controlled instructions through embedded arguments, enabling “living-off-the-land” (LOLBINs) execution without pointing directly to malware.According to the researcher, this can be done by manipulating the input passed into certain…
-
NATO must impose costs on Russia, China over cyber and hybrid attacks, says deputy chief
Speaking at the Munich Cyber Security Conference, Radmila Shekerinska said the security environment has become “more complex” and “more contested,” with rivals operating at the same time in the physical and digital worlds. First seen on therecord.media Jump to article: therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary
-
NATO must impose costs on Russia, China over cyber and hybrid attacks, says deputy chief
Speaking at the Munich Cyber Security Conference, Radmila Shekerinska said the security environment has become “more complex” and “more contested,” with rivals operating at the same time in the physical and digital worlds. First seen on therecord.media Jump to article: therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary
-
China may be rehearsing a digital siege, Taiwan warns
Tags: chinaYuh-Jye Lee, a senior adviser at Taiwan’s National Security Council, delivered a stark warning about China’s intentions to use cyberspace in new and more aggressive ways. First seen on therecord.media Jump to article: therecord.media/china-taiwan-digital-siege-munich
-
Wahlwerbung per Post kein Datenschutzverstoß Widerspruch gegen Datenweitergabe möglich
Tags: unclassifiedFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/wahlwerbung-post-kein-datenschutzverstoss-widerspruch-datenweitergabe-moglichkeit
-
Wahlwerbung per Post kein Datenschutzverstoß Widerspruch gegen Datenweitergabe möglich
Tags: unclassifiedFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/wahlwerbung-post-kein-datenschutzverstoss-widerspruch-datenweitergabe-moglichkeit
-
Dutch phone giant Odido says millions of customers affected by data breach
The Dutch phone giant Odido is the latest phone and internet company to be hacked in recent months, as governments and financially motivated hackers continue to steal highly confidential information about phone customers. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/dutch-phone-giant-odido-says-millions-of-customers-affected-by-data-breach/
-
Fukushima’s radioactive hybrid terror pig boom was driven by amorous mothers
Tags: unclassifiedGenetic study finds domestic pigs’ year-round breeding sped gene flow into wild boar First seen on theregister.com Jump to article: www.theregister.com/2026/02/11/amorous_radioactive_hybrid_terror_pig_mums/
-
Corporate AI Use Shifts from Hypothetical Risk to Everyday Reality, New Research Shows
Organisations are now deploying AI as a routine part of everyday work, far beyond pilot projects and theoretical risk debates, according to a new January snapshot of real-world usage data released by CultureAI this week. The research highlights how AI is being used in ordinary workflows and reveals the emerging patterns that are generating the…
-
UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos.”This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their…
-
Kleinanzeigen-Tricks: An diesen Warnsignalen erkennst du die meisten Betrüger
Tags: unclassifiedFirst seen on t3n.de Jump to article: t3n.de/news/kleinanzeigen-tricks-1724757/
-
BSI läutet Ende der klassischen Verschlüsselung ein
Das BSI empfiehlt traditionelle Verschlüsselungsverfahren mit Post-Quanten-Kryptographie zu kombinieren.Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat in seiner aktualisierten Technischen Richtlinie TR-02102 konkrete Fristen für das Ende der herkömmlichen asymmetrischen Verschlüsselungsverfahren gesetzt. Demnach sollen diese Methoden ab dem Jahr 2031 nicht mehr isoliert verwendet werden. Für Systeme mit besonders hohen Sicherheitsanforderungen gilt diese Vorgabe…
-
Estonia spy chief calls on Europe to invest in its own offensive cyber capabilities
These capabilities are needed not just to mirror what the continent’s most capable adversaries can do, but also to match Europe’s defensive posture with credible tools to gain access to target networks, he said. First seen on therecord.media Jump to article: therecord.media/estonia-spy-chief-calls-on-europe-to-invest-in-own-offense
-
CISA orders federal agencies to patch exploited SolarWinds, Apple, Microsoft bugs within weeks
The Cybersecurity and Infrastructure Security Agency (CISA) added ten new vulnerabilities to its catalog of exploited bugs this week, forcing all federal civilian agencies to resolve the issues by the first week of March. First seen on therecord.media Jump to article: therecord.media/cisa-orders-federal-agencies-to-patch-solarwinds-microsoft-apple-bugs
-
CISA orders federal agencies to patch exploited SolarWinds, Apple, Microsoft bugs within weeks
The Cybersecurity and Infrastructure Security Agency (CISA) added ten new vulnerabilities to its catalog of exploited bugs this week, forcing all federal civilian agencies to resolve the issues by the first week of March. First seen on therecord.media Jump to article: therecord.media/cisa-orders-federal-agencies-to-patch-solarwinds-microsoft-apple-bugs
-
Amazon’s Ring cancels partnership with Flock, a network of AI cameras used by ICE, feds, and police
This news comes less than a week after Ring’s Super Bowl commercial stoked controversy over the company’s capacity for mass surveillance. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/
-
Valentinstag KnowBe4 warnt vor Deepfakes Romantikbetrug
Betrüger nutzen am Valentinstag Echtzeit-Deepfake-Videos und perfekte KI-Persönlichkeiten, um einsame Herzen zu manipulieren, was zu finanziellen Schäden und gebrochenen Herzen führt. Liebesbetrügereien haben sich zu einem vollständig KI-gestützten Geschäft entwickelt. Betrüger verwenden nicht mehr nur gestohlene Fotos, sondern erstellen komplette falsche Identitäten, Echtzeit-Videopersönlichkeiten auf Zoom und WhatsApp sowie automatisierte Gesprächs-Bots, die über Monate hinweg ein…
-
41 Prozent der Spam-Mails zum Valentinstag sind digitaler Betrug
Wie jedes Jahr ist auch der diesjährige Valentinstag eine Hochphase für betrügerische Mails. In der Analyse erkannten Experten der Bitdefender Labs 41 Prozent der Spam-Mails mit Bezug zum Valentinstag im Januar und Anfang Februar als betrügerisch. 55 Prozent der bösartigen Nachrichten zielten auf Absender in den USA. Deutschland liegt als Zielland mit 13 Prozent auf…
-
Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code execution. Threat actors rapidly began exploiting a newly patched BeyondTrust vulnerability, tracked as CVE-2026-1731 (CVSS score of 9.9), soon after a proof-of-concept exploit became public. This week BeyondTrust released security updates to address the critical flaw in its Remote Support…
-
Deepfakes werden zur steigenden Gefahr im Bereich der Cybersecurity
Das Internet ist aufgrund seiner vielen Vorteile für Unternehmen und Privatpersonen aus dem Alltag nicht mehr wegzudenken. Leider geht die zunehmende Digitalisierung aber auch mit einem hohen Risiko einher. So ist die Anzahl an Cyberangriffen in den vergangenen zehn Jahren deutlich angestiegen und eine Trendumkehr ist nicht in Sicht. Dank neuer Technologien könnte sich die…
-
India’s E-Rupee Leads the Secure Adoption of CBDCs
Futurex’s Ruchin Kumar on CBDC Adoption and HSM Security for Transactions. CBDCs are expanding, with 90% of central banks exploring them. India’s e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.…
-
India’s E-Rupee Leads the Secure Adoption of CBDCs
Futurex’s Ruchin Kumar on CBDC Adoption and HSM Security for Transactions. CBDCs are expanding, with 90% of central banks exploring them. India’s e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.…
-
Bretton AI Gets $75M to Use AI for Financial Crime Compliance
AI Agents Target Anti-Money Laundering at Major Global Banks, Cut Manual Probes. Bretton AI has raised $75 million in Series B funding led by Sapphire Ventures to scale AI agents for anti-money laundering sanctions and KYC compliance. CEO Will Lawrence says the company is targeting large banks with automation designed to reduce manual investigations and…
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/

