Tag: defense
-
Anthropic’s DXT poses “critical RCE vulnerability” by running with full system privileges
Difference are ‘stark’: Principal AI Security Researcher at LayerX Security Roy Paz said that he tested DXT against Perplexity’s Comet, OpenAI’s Atlas, and Microsoft’s CoPilot, and the differences were stark.”When you ask Copilot, Atlas, or Perplexity to use a tool, then it will use that tool for you. But Claude DXT allows tools to talk…
-
Black Basta Bundles BYOVD With Ransomware Payload
Researchers discovered a newly disclosed vulnerable driver embedded in Black Basta’s ransomware, illustrating the increasing popularity of the defense-evasion technique. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/black-basta-bundles-byovd-ransomware-payload
-
AI Revolution Reshapes CISO Spending for 2026: Security Leaders Prioritize Defense Automation
The cybersecurity landscape is undergoing a fundamental shift as chief information security officers (CISOs) shift their 2026 budgets to artificial intelligence (AI) and realign traditional defense strategies. Nearly 80% of senior security executives are prioritizing AI-driven solutions to counter increasingly sophisticated threats, a new report from Glilot Capital Partners reveals. The survey, which polled leaders..…
-
Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors
A threat cluster tracked as >>Vortex Werewolf<< (also known as SkyCloak) has been observed targeting Russian government and defense organizations. The attack begins not with a typical malicious attachment, but with a highly credible phishing link. Vortex Werewolf distributes URLs that masquerade as legitimate Telegram file-sharing resources. These links, often hosted on domains designed to…
-
Singapore Launches Largest-Ever Cyber Defense Operation After UNC3886 Targets All Major Telcos
Singapore has launched its largest-ever coordinated cyber defense operation following a highly targeted cyberattack on telecommunications that affected all four of the country’s major telecommunications operators. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/singapore-unc3886-telecom-cyberattack/
-
Black Basta Ransomware Integrates BYOVD Technique to Evade Defenses
A recent campaign by the Black Basta ransomware group has revealed a significant shift in attack tactics. This is a departure from standard operations, where attackers typically deploy a separate tool to turn off security software before running the actual ransomware. In this specific campaign, the ransomware payload bundles a vulnerable driver known as the…
-
Russia Hacked the Polish Electricity Grid. Now What?
Stymied Attack Leaves Poland No Good Options in Responding to Provocation. Poland’s online defenses stopped a Russian cyberattack against the energy grid, but now the Warsaw government is in a bind about how to respond to a digital assault that was a lot more than a crime, but a sliver less than an act of…
-
Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack
A worrying shift in the tactics of >>Transparent Tribe,<< a notorious threat group also known as APT36. Historically focused on Indian government, defense, and educational sectors, the group has now expanded its scope to target India's growing startup ecosystem. This new campaign uses sophisticated lures themed around real startup founders to infect victims with the…
-
OpenAI Launches Trusted Access to Strengthen Cybersecurity Protections
OpenAI has unveiled Trusted Access for Cyber, a new identity- and trust-based framework designed to enhance cybersecurity defenses while mitigating risks posed by its most advanced AI models. The initiative centers on GPT-5.3-Codex, OpenAI’s most cyber-capable frontier-reasoning model, which can operate autonomously for hours or days to complete complex security tasks. Enhanced Capabilities for Defenders…
-
The Other Offense and Defense
Alan discovers how the Super Bowl acts as a live-fire exercise in cybersecurity, requiring seamless coordination to manage massive attack surfaces and ensure integrity and trust in real time. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/the-other-offense-and-defense/
-
OpenAI Launches Trusted Access for Cyber to Expand AI-Driven Defense While Managing Risk
OpenAI has announced a new initiative aimed at strengthening digital defenses while managing the risks that come with capable artificial intelligence systems. The effort, called Trusted Access for Cyber, is part of a broader strategy to enhance baseline protection for all users while selectively expanding access to advanced cybersecurity capabilities for vetted defenders. First seen…
-
APT27 Launches Stealthy Attacks on Corporate Networks, Evades Detection
A new, highly sophisticated cyberattack campaign that reveals how attackers are bypassing modern defenses to infiltrate corporate networks. The investigation points to a stealthy, multi-stage intrusion likely orchestrated by the threat group known as APT-Q-27, or >>GoldenEyeDog<<. The attack began with a common, everyday task: a customer support agent clicking a link in a support…
-
Why Good Cyber Defense Rarely Stops Attackers
Global Cyber Alliance: as AI Fuels Cybercrime, Outcomes Keep Getting Worse. Security teams report stronger controls and broader collaboration each year. Yet cybercrime outcomes continue to worsen. Brian Cute of the Global Cyber Alliance says artificial intelligence-based attacks are tipping the scales against cyber defenders. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/good-cyber-defense-rarely-stops-attackers-a-30692
-
CISA gives federal agencies one year to rip out endlife devices
The U.S. cyber defense agency issued an operational directive on Thursday mandating federal agencies to “remove any hardware and software devices that is no longer supported by its original equipment manufacturer.” First seen on therecord.media Jump to article: therecord.media/cisa-gives-federal-agencies-one-year-end-of-life-devices
-
Attackers exploit decade”‘old Windows driver flaw to shut down modern EDR defenses
The kill list excluded Huntress: The EDR killer binary used in the Huntress-observed attack packed a 64-bit Windows executable and a custom encoded kernel driver payload, which it decoded into OemHwUpd.sys and installed as a kernel-mode service. Because Windows still honors its cryptographic signature, the attackers were able to load the driver.Once the vulnerable driver…
-
Securing Agents Isn’t the Customer’s Job, It’s the Platform’s
Securing AI agents can’t fall on customers. Platform providers must own data protection, prompt injection defense and agent guardrails. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/securing-agents-isnt-the-customers-job-its-the-platforms-2/
-
Cybercrime mittels Prävention zurückdrängen: Ausführungen zur Zusammenarbeit von Ermittlern und Staatsanwaltschaft auf der ‘IT-DEFENSE 2026″
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/cybercrime-pravention-zuruckdraengung-zusammenarbeit-ermittler-staatsanwaltschaft-it-defense-2026
-
IT-DEFENSE: Ausgebuchte 20. Auflage in Würzburg gestartet
Tags: defenseFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/it-defense-20-auflage-wuerzburg-start
-
Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes
The U.S. military digitally disrupted Iranian air missile defense systems during its operation last year against the country’s nuclear program, some of the most sophisticated action Cyber Command has taken to date against Iran. First seen on therecord.media Jump to article: therecord.media/iran-nuclear-cyber-strikes-us
-
Interlock Ransomware Exploits Zero-Day in Gaming Anti-Cheat Driver to Disable EDR, AV
Interlock ransomware operators have been observed using a new process”‘killing tool that abuses a zero”‘day flaw in a gaming anti”‘cheat kernel driver to try to shut down endpoint defenses (EDR/AV). The activity was documented during an intrusion against a North Americabased education organization and shows Interlock continuing to evolve its internal tooling rather than relying…
-
Microsoft and Google Platforms Abused in New Enterprise Cyberattacks
A dangerous shift in phishing tactics, with threat actors increasingly hosting malicious infrastructure on trusted cloud platforms like Microsoft Azure, Google Firebase, and AWS CloudFront. Unlike traditional phishing campaigns that rely on newly registered suspicious domains, these attacks leverage legitimate cloud services to bypass security defenses and target enterprise users globally. When malicious content is…
-
TAMECAT Exposed: APT42’s Fileless Backdoor Targets Defense Chiefs
The post TAMECAT Exposed: APT42’s Fileless Backdoor Targets Defense Chiefs appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/tamecat-exposed-apt42s-fileless-backdoor-targets-defense-chiefs/
-
Frequently Asked Questions About Notepad++ Supply Chain Compromise
Tags: advisory, attack, backdoor, china, credentials, cve, cyber, cybercrime, defense, espionage, government, group, Hardware, infrastructure, malware, ransomware, security-incident, service, software, supply-chain, threat, update, vulnerability, windowsThreat actors compromised the update infrastructure for Notepad++, redirecting traffic to an attacker controlled site for targeted espionage purposes. Key takeaways: Beginning in June 2025, threat actors compromised the infrastructure Notepad++ uses to distribute software updates. The issue has been addressed and Notepad++ have released 8.9.1 which now includes XML signature validation (XMLDSig) for security…
-
Poland detains defense ministry employee on suspicion of spying for Russia
The 60-year-old detainee, a Polish national, worked in the Ministry of National Defense’s strategy and planning department, including on military modernization projects, officials said. He was arrested at his workplace at the ministry’s headquarters in Warsaw. First seen on therecord.media Jump to article: therecord.media/poland-detains-defense-ministry-employee-spying
-
Outages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard.
Tags: access, ai, attack, breach, business, cloud, compliance, computing, container, control, csf, cyberattack, data, defense, detection, dora, encryption, finance, framework, government, nist, regulation, resilience, service, software, strategy, technologyOutages Happen to Everyone. Building a Resilient Architecture Doesn’t Have to Be Hard. madhav Tue, 02/03/2026 – 05:21 No company is spared the pain of outages. But their impact can be mitigated by how resilient you build your business architecture. And who you choose to partner with can significantly determine how effective that will be.…
-
British military to get legal OK to swat drones near bases
Armed Forces Bill would let troops take action against unmanned threats around defense sites First seen on theregister.com Jump to article: www.theregister.com/2026/02/03/armed_forces_bill_drones/
-
NSA Tells Feds: Zero Trust Must Go Beyond Login
New NSA Guidance Demands Continuous Access Checks, Implementation Overhaul. The National Security Agency’s new zero trust guidance instructs agencies to move beyond login-based security by continuously assessing user behavior and app-layer activity in real time, aiming to close gaps that allow post-authentication abuse and elevate federal defenses against modern threats. First seen on govinfosecurity.com Jump…
-
AI Threats in 2026: A SecOps Playbook
As AI-driven threats accelerate in 2026, security teams must evolve their defenses to manage new risks and maintain resilience. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/ai-threats-in-2026-a-secops-playbook/

