Tag: ai
-
Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns
Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-ai-claude-distillation/
-
Arkanix Stealer: AI-assisted info-stealer shuts down after brief campaign
Arkanix Stealer surfaced in late 2025 as a short-lived info-stealer, likely built as an AI-assisted experiment and quickly abandoned. Arkanix Stealer emerged in late 2025 as a short-lived information-stealing malware promoted on dark web forums. Researchers believe it was likely created as an AI-assisted experiment, suggesting the operators were testing automated development techniques rather than…
-
Windows 365 for Agents brings managed cloud PCs to autonomous workflows
Microsoft’s Windows 365 for Agents is a cloud platform that gives AI agents secure access to cloud PCs. It lets builders run copilots, agents, and automated workflows in … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/24/microsoft-windows-365-for-agents/
-
Realistische Einschätzung 2026: Wie erklärbare KI das moderne SOC neu gestaltet
Die anfängliche Euphorie um KI-gesteuerte Security Operations Center (SOC) wich nach zahlreichen Fehlalarmen und Automatisierungsfehlern einer realistischeren Sicht: Über 80 % der Unternehmen berichten, dass generische KI-Lösungen kaum nennenswerte Ergebnisse gebracht haben. Sicherheitsteams bevorzugen mittlerweile erklärbare, assistive KI, die nachvollziehbare Empfehlungen liefert und das menschliche Urteilsvermögen unterstützt, statt Black-Box-Automatisierung, die zu Vertrauensverlust und ineffizienter… First…
-
UK tech hit by double trouble: Fewer foreign techies amid skills squeeze
Visa applications down, executives emigrating, and AI blamed for the rest First seen on theregister.com Jump to article: www.theregister.com/2026/02/24/brit_tech_firms_face_falling/
-
AI Arms Race Shrinks Breakout Time to 29 Minutes as Adversaries Turn GenAI on the Enterprise
Artificial intelligence is no longer just a defensive tool; it is now a core accelerant for cybercriminals and nation-state actors alike. That is the central message from CrowdStrike’s newly released 2026 Global Threat Report, which paints 2025 as the “year of the evasive adversary”, defined by speed, identity abuse and direct attacks on AI systems…
-
Chinese AI Labs Launch Massive Distillation Attacks on Anthropic Claude, Tracking 13M Exchanges
Anthropic has identified and exposed industrial-scale data extraction campaigns orchestrated by three major Chinese AI laboratories: DeepSeek, Moonshot, and MiniMax. These organizations utilized approximately 24,000 fraudulent accounts to generate over 16 million exchanges with Anthropic’s Claude models. The primary objective of these campaigns was >>distillation,<< a technique where a less capable AI model is trained…
-
AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike
CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/
-
Nur fünf Prozent nutzen KI strategisch in der Cybersicherheit – KI-Risiken werden falsch eingeschätzt, Governance-Versagen unterschätzt
First seen on security-insider.de Jump to article: www.security-insider.de/ki-governance-cybersecurity-risiken-ueberschaetzt-a-bf1a99a12a460c75e09ea433118ff910/
-
Openclaw: KI-Agent leert unerwartet ganzen E-Mail-Posteingang
Eine KI-Sicherheitsforscherin ließ Openclaw nach wochenlangen Tests ihre echten E-Mails verarbeiten. Doch das ging gehörig schief. First seen on golem.de Jump to article: www.golem.de/news/bei-sicherheitsexpertin-ki-agent-leert-unerwartet-ganzen-e-mail-posteingang-2602-205762.html
-
So You Think You Have Cyber Insurance? The Breach is Only the First Incident. The Claim is the Second.
Explore the complexities of cyber insurance, including common claim denials, coverage disputes, and evolving risks like ransomware, AI fraud, and BEC. Learn how to navigate insurance ecosystems to secure reliable coverage that stands firm in loss situations. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/so-you-think-you-have-cyber-insurance-the-breach-is-only-the-first-incident-the-claim-is-the-second/
-
Model Inversion Attacks: Growing AI Business Risk
In an era where artificial intelligence (AI) and machine learning (ML) are driving unprecedented innovation and efficiency, a new class of cyber threats has emerged that puts sensitive data and entire business operations at serious risk. Among these threats, model inversion attacks have become particularly concerning for organizations that rely on machine learning models trained……
-
It’s time to rethink CISO reporting lines
Tags: ai, business, ceo, cio, ciso, control, cyber, data, governance, infrastructure, jobs, risk, threat, vulnerabilityWhat’s in a reporting line?: Aaron Painter, CEO of security vendor Nametag, contends that reporting structures often mean less than the respect the CISO is granted.Painter is “less dogmatic about where the CISO reports and more focused on whether they actually have a seat at the table,” he says.”Org charts matter far less than influence,”…
-
Nur fünf Prozent nutzen KI strategisch in der Cybersicherheit – KI-Risiken werden überschätzt, Governance-Versagen unterschätzt
First seen on security-insider.de Jump to article: www.security-insider.de/ki-governance-cybersecurity-risiken-ueberschaetzt-a-bf1a99a12a460c75e09ea433118ff910/
-
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models.The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms First seen…
-
The rise of the evasive adversary
Tags: access, ai, attack, authentication, breach, china, cloud, credentials, crime, crowdstrike, crypto, data, defense, endpoint, exploit, finance, firewall, group, identity, infrastructure, intelligence, korea, lazarus, leak, mail, malicious, malware, microsoft, monitoring, network, north-korea, open-source, phishing, ransomware, remote-code-execution, russia, saas, service, software, strategy, supply-chain, tactics, theft, threat, tool, update, vpn, vulnerability, windows, zero-dayBig game hunters tighten their grip: CrowdStrike’s research highlights how big game hunting (BGH) ransomware actors have remained the dominant force in the eCrime landscape.Punk Spider, a group responsible for developing and maintaining Russian-language Akira ransomware, and its associated Akira dedicated leak site, conducted 198 intrusions in 2025, a 134% increase year over year. Victim-shaming operations…
-
Anthropic’s Claude Code Security rollout is an industry wakeup call
Anchors security posture to the model: However, those assurances didn’t make all concerns evaporate. “The moment those vibe coders plug a foundation model into their CI pipeline, their entire security posture is no longer anchored only to the company’s code,” I-Gentic AI CEO Zahra Timsah pointed out.”It is anchored to the current behavior of that model.…
-
Security and complexity slow the next phase of enterprise AI agent adoption
Enterprise AI agents are embedded in routine business processes, particularly inside engineering and IT operations. Many organizations report active production deployments, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/24/ai-agents-business-processes-security-complexity/
-
Anthropic Facing Allegations from Musk Over Large”‘Scale Data Misuse
Tech billionaire Elon Musk has publicly condemned the artificial intelligence firm Anthropic, accusing the company of massive data theft and hypocrisy. This confrontation follows Anthropic’s recent claims that competing Chinese artificial intelligence models unlawfully extracted training data from its flagship Claude model. The Distillation Controversy Earlier this week, Anthropic published a report accusing Chinese AI…
-
Hackers Exploit DeepSeek and Claude AI to Launch Global Attacks on FortiGate Devices
Hackers are using commercial AI models DeepSeek and Claude to automate attacks against FortiGate firewalls worldwide, turning basic misconfigurations into a high”‘volume intrusion campaign. In early February 2026, a misconfigured SimpleHTTP server running on 212.11.64[.]250:9999 was found exposing more than 1,400 files and 139 subdirectories, including stolen FortiGate configurations, Active Directory maps, credential dumps, exploit…
-
Russian group uses AI to exploit weakly-protected Fortinet firewalls, says Amazon
Tags: access, ai, api, attack, authentication, business, ciso, control, credentials, cybersecurity, data-breach, detection, exploit, firewall, fortinet, group, Internet, linkedin, malicious, mfa, monitoring, network, password, russia, software, threat, tool, vpn, vulnerabilityRecommendations: The Amazon report makes a number of recommendations to network admins with FortiGate devices. They include ensuring device management interfaces aren’t exposed to the internet, or, if they have to be, restricting access to known IP ranges and using a bastion host or out-of-band management network. As basic cybersecurity demands, all default and common…
-
Operation Olalampo: MuddyWater Unleashes AI-Assisted Rust Malware and Telegram C2 in MENA Espionage Surge
The post Operation Olalampo: MuddyWater Unleashes AI-Assisted Rust Malware and Telegram C2 in MENA Espionage Surge appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/operation-olalampo-muddywater-unleashes-ai-assisted-rust-malware-and-telegram-c2-in-mena-espionage-surge/
-
Regionale Datensouveränität im Zeitalter der KI: Spannungsfeld zwischen Freiheit und Regulierung mit maximalem Mehrwert
Tags: aiFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/datensouveraenitaet-ki-freiheit-regulierung
-
Why Claude Code Security Has Shaken the Cybersecurity Market
How Claude’s New AI Code Scanning Tool Will Challenge Application Security Leaders Anthropic’s debut of Claude Code Security jolted cybersecurity stocks and intensified competition in application security testing. It promises deep reasoning around identifying and remediating code vulnerabilities but faces steep challenges matching the feature breadth required by large enterprises. First seen on govinfosecurity.com Jump…
-
How are cloud security teams supported by Agentic AI
Is Your Organization Prepared for the Surge of Non-Human Identities in Cloud Security? When businesses increasingly shift their operations to the cloud, the complexities of cybersecurity also grow. A little-discussed aspect of this transition is the management of Non-Human Identities (NHIs). These are essentially the machine identities that navigate secure environments, operating through encrypted secrets……
-
Can Agentic AI operate independently in managing machine identities
What Is the Role of Agentic AI in Managing Machine Identities? How can organizations enhance their security measures where teeming with sophisticated cybersecurity threats? The answer may be in evolving role of Agentic AI, particularly in managing machine identities. With the rise of cloud technologies and automated systems, machine identities”, often seen as Non-Human Identities…
-
What makes Agentic AI capable in secrets scanning
How Can Organizations Securely Manage Non-Human Identities? Have you ever considered how important it is to manage machine identities within your organization’s cybersecurity framework? Non-Human Identities (NHIs) are becoming increasingly crucial with digital evolves, particularly in industries like financial services, healthcare, and cloud-based services. With the surge in cloud computing, the gap between security teams……
-
Data Breaches in 2026: What’s old, what’s new?
Data breaches in 2026 explained, new cyber threats, AI driven attacks, common breach causes, and practical security strategies for individuals and businesses First seen on hackread.com Jump to article: hackread.com/data-breaches-2026-whats-old-whats-new/

