Tag: defense
-
Indian APT ‘Sloppy Lemming’ Targets Defense, Critical Infrastructure
India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/india-apt-sloppy-lemming-defense-critical-infrastructure
-
Anthropic AI ultimatums and IP theft: The unspoken risk
Tags: ai, ceo, china, ciso, data, data-breach, defense, google, government, intelligence, monitoring, network, openai, risk, service, theft, toolChina’s extraction campaign: A targeting operation, not a curiosity: Anthropic’s disclosure that three China”‘based AI companies (DeepSeek, Moonshot AI, and MiniMax) ran more than 16 million interactions through roughly 24,000 fraudulent accounts is not a story about model misuse. It is a story about targeting. These campaigns went straight at Claude’s most sensitive capabilities: agentic…
-
Hacktivists Claim DHS Breach, Leak 6,600+ ICE Contractor Records
Hacktivists claim they breached DHS systems, leaking records tied to 6,681 ICE contractor applicants, including major tech and defense firms. The post Hacktivists Claim DHS Breach, Leak 6,600+ ICE Contractor Records appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-dhs-ice-contractor-data-leak-hacktivist-claim/
-
Threat actors weaponize OAuth redirection logic to deliver malware
An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/03/attackers-abusing-oauth-redirection-phishing-malware/
-
Threat actors weaponize OAuth redirection logic to deliver malware
An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/03/attackers-abusing-oauth-redirection-phishing-malware/
-
Phishing campaign exploits OAuth redirection to bypass defenses
Microsoft researchers warn that threat actors abuse OAuth redirects to target government users and deliver malware. Microsoft has warned of phishing campaigns targeting government and public-sector organizations by abusing OAuth URL redirection. Instead of stealing credentials or exploiting software flaws, attackers leverage OAuth’s legitimate by-design behavior to bypass email and browser defenses. The tactic redirects…
-
Anthropic poaches users from rival chatbots with easier migration
Tags: defenseThe controversy over Anthropic’s negotiations with the Pentagon appears to have driven increased interest in Claude. Negotiations between the Department of Defense and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/03/anthropic-claude-memory-import-feature/
-
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers.The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described First seen on thehackernews.com…
-
The New Security Reality: When AI Accelerates Both Attack and Defense
Discover how the integration of large language models is transforming software security, lowering barriers for attackers, and necessitating autonomous defense platforms to keep pace with emerging threats. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-new-security-reality-when-ai-accelerates-both-attack-and-defense/
-
7 factors impacting the cyber skills gap
Tags: ai, attack, automation, breach, business, ciso, control, cyber, cybercrime, cybersecurity, data, defense, detection, group, incident response, intelligence, jobs, risk, service, skills, strategy, technology, threat, tool, training, vulnerability2. Emerging technologies: New technologies, particularly AI, are contributing to a cyber landscape that’s evolving so quickly it’s hard for even highly skilled cybersecurity professionals to pace, says Dan Lohrmann, CISO at enterprise strategy and consulting firm Presidio.AI-driven threats keep moving the target, allowing cybercriminals to attack with unprecedented levels of speed and agility, Lohrmann…
-
How does AI contribute to cybersecurity stability
Is AI the Key to Cybersecurity Stability? Where digital threats are becoming increasingly sophisticated, one might ask: can artificial intelligence be the linchpin in fortifying our defenses and achieving cybersecurity stability? With industries like financial services, healthcare, travel, and technology double down on using innovative systems, including DevOps and security operations centers (SOC), it becomes……
-
UK Businesses told to brace cyber defenses amid Iran conflict risk
NCSC urges all to review posture as escalating tensions increase risk of indirect digital spillover First seen on theregister.com Jump to article: www.theregister.com/2026/03/02/ncsc_security_iran/
-
Scalable Security for Small and Large Enterprises
Building Adaptive Cyber Defense That Grows with Your Business The Scalability Imperative in Modern Cybersecurity Digital transformation has redefined how organizations operate. Cloud adoption, hybrid work models, SaaS platforms, and connected ecosystems have expanded the attack surface across businesses of every size. What differs is not the type of threats faced but the scale First…
-
British organizations urged to be alert to threat of Iranian cyberattacks
In an advisory, the U.K.’s National Cyber Security Centre warned British organizations to review and strengthen their cyber defenses amid the evolving situation in Iran and throughout the Middle East. First seen on therecord.media Jump to article: therecord.media/iran-britain-cyber-threats-warning
-
PCI-Compliant Authentication for Retail Enterprises
Retailers, fortify your defenses! Learn how PCI-compliant authentication protects customer data, prevents fraud, and avoids costly penalties. Click for expert strategies! First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/pci-compliant-authentication-for-retail-enterprises/
-
Cyberattack briefly disrupts Russian internet regulator and defense ministry websites
Russia’s internet regulator and defense ministry said their servers were hit by a large DDoS attack that briefly disrupted access to several government websites late last week. First seen on therecord.media Jump to article: therecord.media/cyberattack-briefly-takes-down-russian-government-websites
-
MY TAKE: The Pentagon punished Anthropic for red lines it accepted from OpenAI hours later
KINGSTON, Wash., On Friday afternoon, President Trump ordered every federal agency to stop using Anthropic’s AI technology. Defense Secretary Pete Hegseth followed by designating the company a “supply-chain risk to national security,” a label the government typically reserves for… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/my-take-the-pentagon-punished-anthropic-for-red-lines-it-accepted-from-openai-hours-later/
-
Iran Has One Card Left”, It’s Pointed at Your Network
In light of today’s attack by the U.S. and Israel on Iran, it is prudent to ask: What can Iran do? Strip away everything Iran had a year ago and ask yourself what’s left. Their nuclear program? Set back years, maybe a decade. Their air defenses? Dismantled across two conflicts. Hezbollah? Degraded to the point..…
-
OpenAI Will Deploy AI in US Military Classified Networks
Announcement Comes Hours After Trump Blacklists Anthropic. OpenAI said late Friday night it reached an agreement with the U.S. Department of Defense to deploy its large language models onto military classified networks. The announcement came hours after President Donald Trump instructed federal agencies to cease using AI developed by OpenAI rival Anthropic. First seen on…
-
Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a “supply chain risk.””This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance of…
-
Trump Escalates AI Clash With Anthropic
US President Directs Federal Agencies to Cease Use of AI Firm’s Tech. The Pentagon is escalating its feud with Anthropic after the company refused to loosen safeguards on its Claude model, threatening classified AI deployments and potentially creating months-long capability gaps across defense and contractor networks. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/trump-escalates-ai-clash-anthropic-a-30884
-
Security hole could let hackers take over Juniper Networks PTX core routers
The hole is “especially dangerous, because these devices often sit in the middle of the network, not on the fringes,” said Piyush Sharma, CEO of Tuskira. “If an attacker gains control of a PTX, the impact is bigger than a single device compromise because it can become a traffic vantage point and a control point…
-
Cities Hosting Major Events Need More Focus on Wireless, Drone Defense
Major events like the FIFA World Cup need to look beyond traditional physical and cyber security to active and passive wireless threats, say experts. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/cities-major-events-wireless-drone-defense
-
CISA Leadership Shakeup Amid DHS Shutdown
US Cyber Defense Agency Switches Acting Director Amid Shutdown Turmoil. The U.S. cyber defense agency is going through a major leadership shakeup – again – following months of staffing turnover, budget cuts and shutdowns. Acting Director Madhu Gottumukkala is moving into a senior strategy role at the Department of Homeland Security, of which CISA is…
-
Catch FireTail at RSAC 2026 FireTail Blog
Feb 27, 2026 – Alan Fagan – RSA Conference is fast approaching, and the FireTail team is packing our bags for San Francisco! We are thrilled to announce that we’ll be exhibiting at the Early Stage Expo (Booth ESE-52) this year.Whether you’re looking to secure your enterprise AI initiatives, grab some great swag, or talk…
-
Secure Enterprise Browsers Against AI Threats Blog – Menlo Security
Learn how to protect your browser from AI-driven threats, prompt injection, and HEAT attacks using predictive defense from Menlo Security. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/secure-enterprise-browsers-against-ai-threats-blog-menlo-security/
-
The Seam in Cybersecurity Defenses That Nation-States Keep Exploiting
The Notepad++ supply chain compromise is the latest proof that sophisticated adversaries are deliberately targeting the gap between two disciplines: Vulnerability management and detection and response. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/the-seam-in-cybersecurity-defenses-that-nation-states-keep-exploiting/
-
Why application security must start at the load balancer
Tags: application-security, attack, authentication, breach, business, compliance, control, credentials, defense, detection, encryption, exploit, finance, guide, healthcare, identity, incident response, infrastructure, Internet, nist, risk, service, technology, threat, tool, waf, zero-trustInternet traffic hits the load balancerThe load balancer forwards traffic as fast as possibleSecurity happens laterThe problem is simple. If the first system doesn’t enforce trust, everything behind it is already compromised by design. Example 1: Financial services: The team invested heavily in downstream security tools. But the load balancer accepted weak TLS versions and…

