Tag: data
-
Google quantum-proofs HTTPS by squeezing 2.5kB of data into 64-byte space
Merkle Tree Certificate support is already in Chrome. Soon, it will be everywhere. First seen on arstechnica.com Jump to article: arstechnica.com/security/2026/02/google-is-using-clever-math-to-quantum-proof-https-certificates/
-
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool
Credential and cryptocurrency theft, live surveillance, ransomware – an attacker’s Swiss Army knife First seen on theregister.com Jump to article: www.theregister.com/2026/02/27/double_extortion_whammy_steaelite_rat/
-
New Menlo Security CEO Eyes Agentic AI Runtime Protection
Former Mandiant Executive Bill Robbins Targets Browser-Based AI Security Growth. New CEO Bill Robbins said Menlo Security will boost growth by focusing on securing agentic AI runtimes through the browser, leveraging its visibility into web sessions to prevent prompt injection, malware and data loss. He also plans to sustain 40% plus revenue growth and drive…
-
Security hole could let hackers take over Juniper Networks PTX core routers
The hole is “especially dangerous, because these devices often sit in the middle of the network, not on the fringes,” said Piyush Sharma, CEO of Tuskira. “If an attacker gains control of a PTX, the impact is bigger than a single device compromise because it can become a traffic vantage point and a control point…
-
‘Silent’ Google API key change exposed Gemini AI data
Mitigation: The first job for concerned site admins is to check in the GCP console for keys specifically allowing the Generative Language API. In addition, look for unrestricted keys, now identified by a yellow warning icon. Check if any of these keys are public.Exposed keys should all be rotated or ‘regenerated,’ with a grace period…
-
Strengthening Identity Security: Real-World Credential Attack Detection with Seceon aiSIEM
Executive Overview Identity has become the primary attack surface in modern enterprise environments. Threat actors increasingly bypass traditional malware-based techniques and instead exploit compromised credentials to access cloud platforms, email systems, and business-critical applications. Credential abuse now drives ransomware campaigns, business email compromise, data exfiltration, and lateral movement within hybrid environments. Organizations must therefore detect…
-
APT37 hackers use new malware to breach air-gapped networks
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
-
Claude Code Security Crashed the Market Because We’re Defending the Wrong Thing
On Feb. 20, the cybersecurity market experienced a structural tremor. Anthropic released Claude Code Security, pointing its Claude Opus 4.6 and million-token context window at the industry’s most “vetted” codebases. This is a significant change from standard pattern-matching against known signatures, achieved by applying semantic reasoning to trace data flows and map component interactions across..…
-
Randall Munroe’s XKCD ‘Proof Without Content’
Tags: datavia the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/02/randall-munroes-xkcd-proof-without-content/
-
Samsung updates ACR privacy practices after Texas sues TV manufacturers
In December, Texas sued five major smart TV manufacturers, Samsung, Sony, LG, Hisense and TCL Technology, for allegedly collecting ACR data without consumers in the state being fully informed and consenting. First seen on therecord.media Jump to article: therecord.media/samsung-updates-acr-privacy-practices-texas
-
Catch FireTail at RSAC 2026 FireTail Blog
Feb 27, 2026 – Alan Fagan – RSA Conference is fast approaching, and the FireTail team is packing our bags for San Francisco! We are thrilled to announce that we’ll be exhibiting at the Early Stage Expo (Booth ESE-52) this year.Whether you’re looking to secure your enterprise AI initiatives, grab some great swag, or talk…
-
Zero-Days, Data Breaches, and AI Risks Define This Week’s Cybersecurity Landscape
Weekly summary of Cybersecurity Insider newsletters First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/weekly-roundup/zero-days-data-breaches-and-ai-risks-define-this-weeks-cybersecurity-landscape/
-
The Case for Why Better Breach Transparency Matters
It’s become a standard practice for organizations to disclose the bare minimum about a data breach, or worse, not disclose the incident at all. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/why-better-breach-transparency-matters
-
Scientists Intro AirSnitch, Which Bypasses WiFi Isolation to Launch Attacks on Networks
Scientists from the University of California Riverside uncovered fundamental weaknesses in the client isolation security feature in WiFi networks that can be exploited to bypass the protections and allow threat actors to run machine-in-the-middle attacks, manipulate traffic, and steal data from others who are on the same network. First seen on securityboulevard.com Jump to article:…
-
Public Google API keys can be used to expose Gemini AI data
Researchers found that Google API keys long treated as harmless can now unlock access to Gemini. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/public-google-api-keys-can-be-used-to-expose-gemini-ai-data/
-
Millions at Risk as Android Mental Health Apps Expose Sensitive Data
Oversecured flagged 1,575 flaws in 10 Android health apps with 14.7M installs, putting chats, CBT notes, and mood logs at risk, per BleepingComputer. The post Millions at Risk as Android Mental Health Apps Expose Sensitive Data appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-android-mental-health-apps-14-7-million-installs/
-
French DIY etailer ManoMano admits customer data stolen
Crooks claim they helped themselves to over 37M accounts during January hit on subcontractor First seen on theregister.com Jump to article: www.theregister.com/2026/02/27/manomano_breach/
-
French DIY etailer ManoMano admits customer data stolen
Crooks claim they helped themselves to over 37M accounts during January hit on subcontractor First seen on theregister.com Jump to article: www.theregister.com/2026/02/27/manomano_breach/
-
French DIY etailer ManoMano admits customer data stolen
Crooks claim they helped themselves to over 37M accounts during January hit on subcontractor First seen on theregister.com Jump to article: www.theregister.com/2026/02/27/manomano_breach/
-
Künstliche Intelligenz entwickelt sich zur neuen Insider-Bedrohung für Organisationen
Laut dem <> stellt die künstliche Intelligenz für 71 Prozent der Unternehmen in Deutschland das größte Risiko für die Datensicherheit dar. KI-Systeme erhalten zunehmend breiteren Zugriff auf Unternehmensdaten in verschiedenen Umgebungen, weshalb Unternehmen die Sichtbarkeit und Verschlüsselung von Daten als zentrale Sicherheitsinfrastruktur behandeln sollten. KI-gestützte Deepfakes und Falschinformationen erhöhen die Wirksamkeit […] First seen on…
-
Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities
Tags: ai, attack, cyber, data, data-breach, intelligence, metric, service, software, supply-chain, threat, vulnerabilityThe 2026 State of DevSecOps report reveals a critical tension between development velocity and security. While organizations rapidly adopt AI-assisted coding, many fail to manage dependencies properly, leaving their software supply chains highly vulnerable to threat actors.”‹ Threat Intelligence Data Threat Vector Key Metric Security Impact Deployed Services 87% of organizations have known vulnerabilities”‹. High…
-
Dohdoor Malware Targets U.S. Schools and Healthcare with Multi-Stage Attack
A new backdoor dubbed Dohdoor is actively targeting schools and health care organizations in the United States through a stealthy multi-stage attack chain. UAT-10027 focuses on education and health care entities in the U.S., sectors that handle highly sensitive personal and medical data but often have limited security budgets and legacy systems. Cisco Talos assesses with low…
-
Data Broker Breaches Fueled Nearly $21 Billion in Identity-Theft Losses
A report copublished by WIRED sparked a probe into opt-out pages hidden by data brokers. Now congressional Democrats say breaches tied to the industry have cost people tens of billions of dollars. First seen on wired.com Jump to article: www.wired.com/story/data-broker-breaches-fueled-dollar209-billion-in-identity-theft-losses/
-
Europe’s ManoMano Hit: 38M Customer Records Compromised in Vendor Breach
ManoMano is notifying 38 million customers after a third-party customer service breach exposed personal data, highlighting growing supply chain security risks. The post Europe’s ManoMano Hit: 38M Customer Records Compromised in Vendor Breach appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-manomano-38m-third-party-data-breach/
-
Thales Data Threat Report zeigt KI als neue Insider-Bedrohung für Organisationen
KI ersetzt traditionelle Bedrohungen nicht, sondern verstärkt sie vielmehr, indem sie deren Geschwindigkeit, Umfang und Reichweite erhöht. Da automatisierte Systeme einen immer umfassenderen Zugang zu Unternehmensdaten erhalten, müssen Organisationen Identität, Verschlüsselung und Datentransparenz als Kerninfrastruktur neu überdenken. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/thales-data-threat-report-zeigt-ki-als-neue-insider-bedrohung-fuer-organisationen/a43844/
-
ManoMano data breach impacted 38 Million customer accounts
European DIY platform ManoMano suffered a data breach via a third-party provider, exposing personal data of 38 million customers. European DIY e-commerce platform ManoMano disclosed a major data breach affecting 38 million customers. Hackers accessed personal information by compromising a third-party service provider, prompting notifications and potential security measures for impacted users across multiple countries.…
-
1 Million Records from Dutch Telco Odido Leaked Online in Massive Data Breach
The Dutch telecommunications company Odido suffered a massive data breach that exposed the personal information of nearly 700,000 customers. The incident, which included an extortion attempt, has raised serious concerns about customer privacy and data security in the telecom sector. Following the breach, attackers leaked the stolen information online in two separate dumps. Extent of…
-
OpenClaw Insights: A CISO’s Guide to Safe Autonomous Agents FireTail Blog
Tags: access, ai, api, breach, ciso, compliance, control, data, data-breach, detection, endpoint, finance, firewall, framework, governance, guide, LLM, network, open-source, risk, risk-management, software, strategy, technology, tool, vulnerabilityFeb 27, 2026 – Alan Fagan – The “OpenClaw” crisis has board members asking, “Could this happen to us?” The answer isn’t to ban AI agents. It’s to govern them. By now, the dust is settling on the OpenClaw (aka MoltBot) incident. The technical post-mortems (including our own) have been written, the exposed ports have…
-
Ransomware groups switch to stealthy attacks and long-term access
Tags: access, application-security, attack, ciso, control, crime, cyber, cybercrime, cybersecurity, data, detection, encryption, endpoint, exploit, extortion, group, identity, intelligence, monitoring, organized, ransomware, service, software, strategy, supply-chain, switch, theft, threat, tool, vulnerability38% drop in encryption over the past 12 months as more cybercriminals turn to silently exfiltrating data for extortion as their main stock in trade.Picus’ suggestion that the volume of ransomware attacks is dropping is disputed by other experts.Tony Anscombe, chief security evangelist at endpoint security vendor Eset, offered a contrasting perspective.”In the recent Eset…

