Tag: defense
-
New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses
Tags: attack, authentication, credentials, cve, cyber, defense, dns, exploit, flaw, ntlm, service, threat, vulnerability, windowsA critical vulnerability in Windows Kerberos authentication that enables attackers to conduct credential-relay attacks by exploiting DNS CNAME records. Tracked as CVE-2026-20929, this flaw allows threat actors to force victims into requesting Kerberos service tickets for attacker-controlled systems, facilitating lateral movement and privilege escalation even when NTLM authentication is entirely disabled. CVE ID Vulnerability Name…
-
NDSS 2025 Compiled Models, Built-In Exploits
Tags: attack, conference, defense, exploit, framework, Hardware, Internet, network, tool, vulnerabilitySession 9B: DNN Attack Surfaces Authors, Creators & Presenters: Yanzuo Chen (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Sihang Hu (Huawei Technologies), Tianxiang Li (Huawei Technologies), Shuai Wang (The Hong Kong University of Science…
-
News alert: AppGuard reopens insider program as AI-enhanced malware outpaces detection defenses
MCLEAN, Va., Jan.15, 2026, CyberNewswire, A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/news-alert-appguard-reopens-insider-program-as-ai-enhanced-malware-outpaces-detection-defenses/
-
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026
Tags: access, ai, application-security, attack, authentication, awareness, backdoor, breach, business, captcha, cloud, compliance, container, control, credentials, credit-card, cybersecurity, data, data-breach, ddos, defense, encryption, exploit, finance, firewall, flaw, google, identity, infrastructure, intelligence, leak, malicious, mitigation, monitoring, network, pypi, risk, service, software, strategy, supply-chain, threat, tool, vulnerability, windows2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026 andrew.gertz@t“¦ Thu, 01/15/2026 – 16:48 Nadav Avital – Senior Director of Threat Research at Thales More About This Author > 2025 was a year that tested how businesses think about security. Some attacks happened in new, unexpected ways, while others employed old tricks, taken…
-
News alert: SpyCloud unveils supply chain security tool that detects compromised vendors’ employees
AUSTIN, Texas, Jan. 14, 2026, CyberNewsWire, SpyCloud, the leader in identity threat protection, today announced the launch of its Supply Chain Threat Protection solution, an advanced layer of defense that expands identity threat protection across the extended workforce,… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/news-alert-spycloud-unveils-supply-chain-security-tool-that-detects-compromised-vendors-employees/
-
Iran’s partial internet shutdown may be a windfall for cybersecurity intel
only available launchpads. A connection from the Ministry of Agriculture might not be a farmer. It’s likely a tunnel for a state actor who needs an exit node.”Ranjbar said the removal of the traffic from millions of routine Iranian business and residential users allows a powerful visibility into Iranian government traffic patterns, thereby allowing SOCs…
-
CERT-UA reports PLUGGYAPE cyberattacks on defense forces
CERT-UA reported PLUGGYAPE malware attacks on Ukraine’s defense forces, linked with medium confidence to Russia’s Void Blizzard group. The Computer Emergency Response Team of Ukraine (CERT-UA) reported new cyberattacks against Ukraine’s defense forces using PLUGGYAPE malware. Government experts attributed the attack with medium confidence to the Russian-linked group Void Blizzard (aka Laundry Bear, UAC-0190), active…
-
SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
Tags: access, ai, authentication, breach, business, communications, compliance, credentials, cybercrime, cybersecurity, dark-web, data, data-breach, defense, government, grc, group, identity, incident response, infosec, infrastructure, malware, monitoring, phishing, ransomware, risk, risk-management, service, supply-chain, technology, theft, threat, toolFor government agencies and critical infrastructure operators, supply chain threats present national security risks that demand heightened vigilance. Public sector organizations managing sensitive data and critical services increasingly rely on contractors and technology vendors whose compromised credentials could provide adversaries with pathways into classified systems or essential infrastructure. Last year alone, the top 98 Defense…
-
Ukraine appoints digital chief as defense minister to drive military reform
Ukraine’s parliament appointed Mykhailo Fedorov, the digital transformation minister who modernized public services and helped develop drone programs for the war effort, as the country’s new defense chief. First seen on therecord.media Jump to article: therecord.media/ukraine-digital-chief-transformation
-
‘Imagination the limit’: DeadLock ransomware gang using smart contracts to hide their work
New crooks on the block get crafty with blockchain to evade defenses First seen on theregister.com Jump to article: www.theregister.com/2026/01/14/deadlock_ransomware_smart_contracts/
-
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025.The activity has been attributed with medium confidence to a Russian hacking group tracked as Void Blizzard (aka Laundry Bear or UAC-0190). The threat actor is believed…
-
Ukraine’s army targeted in new charity-themed malware campaign
Officials of Ukraine’s Defense Forces were targeted in a charity-themed campaign between October and December 2025 that delivered backdoor malware called PluggyApe. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukraines-army-targeted-in-new-charity-themed-malware-campaign/
-
Microsoft Patch Tuesday addresses 112 defects, including one actively exploited zero-day
Researchers said the information disclosure zero-day exposes sensitive information that attackers can use to undermine defenses and make other exploits more reliable. First seen on cyberscoop.com Jump to article: cyberscoop.com/microsoft-patch-tuesday-january-2026/
-
Hill warning: Don’t put cyber offense before defense
A House hearing weighed the pros and cons from the Trump administration and some lawmakers to step up cyber offensive operations. First seen on cyberscoop.com Jump to article: cyberscoop.com/us-offensive-cyber-operations-defense-cisa-workforce-house-homeland-security-committee/
-
HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models
Researchers from Shanghai Jiao Tong University, the University of Illinois at Urbana-Champaign, and Zhejiang University have unveiled HoneyTrap, a groundbreaking deceptive defense framework designed to counter progressively intensifying jailbreak attacks on large language models. The novel approach leverages collaborative multi-agent systems to mislead attackers and drain their computational resources while maintaining seamless interactions with legitimate…
-
Driving Passwordless Adoption with FIDO and Biometric Authentication
Tags: access, attack, authentication, awareness, banking, breach, business, cloud, compliance, container, control, credentials, cyber, data, defense, fido, finance, fraud, government, Hardware, iam, identity, insurance, login, mobile, passkey, password, phishing, risk, service, technology, threat, trainingDriving Passwordless Adoption with FIDO and Biometric Authentication madhav Tue, 01/13/2026 – 06:13 For decades, passwords have been the default mechanism for securing digital access. They are deeply embedded in enterprise systems and workflows, yet they were never designed to withstand today’s threat landscape. Cybersecurity Sarah Lefavrais – IAM Product Marketing Manager More About This…
-
SAP Defense in Focus as Zerlang Takes Over at SecurityBridge
New CEO Jesper Zerlang Plans Global Growth, US Push and Vertical Expansion. Former Logpoint chief Jesper Zerlang, now CEO at SecurityBridge, says SAP security remains a weak link in enterprise risk strategies. As CEO of SecurityBridge, he’s launching a global expansion and leaning into the company’s product differentiators to fill the gap. First seen on…
-
How GenAI Is Aiding a Rise in Identity-Based Threats
Thales CISO Eric Liebowitz Outlines Urgent Defenses for AI-Driven Phishing Threats. The shift from brute-force attacks to AI-powered phishing is creating tougher challenges for defenders. Thales CISO, Americas, Eric Liebowitz says combining employee training with behavioral monitoring and AI guardrails is essential to mitigate identity risk. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/how-genai-aiding-rise-in-identity-based-threats-a-30493
-
GoFundMe Ignores Own Rules by Hosting a Legal-Defense Fund for the ICE Agent Who Killed Renee Good
The fundraiser for the ICE agent in the Renee Good killing has stayed online in seeming breach of GoFundMe’s own terms of service, prompting questions about selective enforcement. First seen on wired.com Jump to article: www.wired.com/story/gofundme-ice-jonathan-ross-renee-good-fundraiser/
-
Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices
Public sector cybersecurity faces outdated systems, budget gaps, and rising attacks. Learn key challenges, defense strategies, and proven best practices. First seen on hackread.com Jump to article: hackread.com/cybersecurity-public-sector-challenges-strategies-practices/
-
Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign
Rust offers evasion advantages: CloudSEK researchers said RustyWater was developed in Rust, which they said is increasingly used by malware authors for its memory safety features and cross-platform capabilities, according to the blog post. Other state-sponsored groups, including Russia’s Gossamer Bear and China-linked actors, have also deployed Rust-based malware in recent campaigns, according to security…
-
How impenetrable are modern secret defenses?
How Secure Is Your Cloud Environment With Non-Human Identities? Have you ever considered the crucial role that non-human identities (NHIs) play in modern cloud security? The concept of NHIs is rapidly gaining traction, acting as a linchpin for organizations striving to build more impenetrable secret defenses. Understanding Non-Human Identities and Their Importance NHIs refer to……
-
ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches
Also: Turning AI Data Into AI Defense, Autonomous Border Patrol Robots. In this week’s panel, four ISMG editors discussed how basic security failures are still opening the door to major breaches, how researchers are rethinking data protection in the age of AI and the implications of robots with artificial intelligence patrolling national borders. First seen…
-
Why AI-Powered Cyber Defense Is No Longer Optional for Modern Businesses
Large businesses or governments aren’t the only ones threatened by cyber attacks. Every organization is now equally threatened…. First seen on hackread.com Jump to article: hackread.com/ai-powered-cyber-defense-modern-businesses/
-
INFORM 2026: MITRE’s Updated Threat-Informed Defense Maturity Model Explained
On January 8th, MITRE’s Center for Threat-Informed Defense (CTID) published a significant update to INFORM, its threat-informed defense maturity model. This update reflects the joint efforts of MITRE researchers, AttackIQ, and several CTID members to enhance INFORM based on two years of operational use and broad security community feedback. First seen on securityboulevard.com Jump to…
-
CrowdStrike Acquires SGNL for $740 Million to Thwart AI-Powered Cyber Threats
Tags: ai, credentials, crowdstrike, cyber, cybersecurity, defense, exploit, hacker, identity, intelligence, startup, technology, threatCrowdStrike Inc. said Thursday it will acquire identity security startup SGNL in a deal valued at $740 million the latest move by the cybersecurity giant to fortify its defenses against increasingly sophisticated artificial intelligence (AI)-powered cyberattacks. The acquisition centers on SGNL’s continuous identity technology, designed to prevent hackers from exploiting user credentials as entry.. First…

