Tag: defense
-
Hackers Exploit MSBuild LOLBin to Evade Detection in Fileless Windows Attacks
Cyber attackers are increasingly using Living Off the Land Binaries (LOLBins) to bypass security detection. By leveraging legitimate system tools, these attacks avoid signature-based defenses and operate without dropping traditional malware files. One such LOLBin now gaining attention is MSBuild.exe, a native Windows development tool signed by Microsoft. Originally designed to build and run C# code from XML-based…
-
Hackers claim control over Venice San Marco anti-flood pumps
Hackers breached Venice ‘s San Marco flood system, claiming control of pumps and the ability to disable defenses and flood coastal areas. The technologies that govern the physical world are the quiet infrastructure of modern life. From energy grids to water systems, from factories to flood defenses, operational technology (OT) has long had one essential…
-
Hackers claim control over Venice San Marco anti-flood pumps
Hackers breached Venice ‘s San Marco flood system, claiming control of pumps and the ability to disable defenses and flood coastal areas. The technologies that govern the physical world are the quiet infrastructure of modern life. From energy grids to water systems, from factories to flood defenses, operational technology (OT) has long had one essential…
-
Hungarian government creds left in the safe hands of ‘FrankLampard’
Nearly 800 state logins surfaced in breach data, including defense and NATO-linked accounts First seen on theregister.com Jump to article: www.theregister.com/2026/04/11/hungary_government_logins_breach/
-
Pentagon Memo Blasted Anthropic for PR Campaign
DOD Official: AI Firm Wanted ‘Approval Role in the Operational Decision Chain’. Internal memos used to by the Department of Defense to justify its decision to blacklist artificial intelligence firm Anthropic said the firm’s models could not be reliably controlled for military use. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/pentagon-memo-blasted-anthropic-for-pr-campaign-a-31398
-
Alleged 10 Petabyte Data Theft From China’s Tianjin Supercomputing Hub
Hacker claims a 10 petabyte data theft from China’s Tianjin Supercomputing Center, raising concerns over exposed defense-related data. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/alleged-10-petabyte-data-theft-from-chinas-tianjin-supercomputing-hub/
-
How AI Is Reshaping Wholesale Network Defense
AI is reshaping network defense, enabling real-time DDoS detection and automated mitigation across global wholesale networks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/how-ai-is-reshaping-wholesale-network-defense/
-
The cyber winners and losers in Trump’s 2027 budget
Tags: cisa, communications, compliance, corporate, cyber, cybersecurity, defense, government, group, infrastructure, international, network, office, risk, service, strategy, threatFigure 1- Top gainers in Trump’s 2027 budget. Compilation from OMB cross-cut tables. CSOSeveral smaller agencies, including the EPA, Department of Education, Tennessee Valley Authority, Federal Mine Safety and Health Review Commission, and the US Army Corps of Engineers, also stand to post modest gains under the 2027 budget. Losers: DHS, VA, and research programs…
-
Malicious password-protected files Blog – Menlo Security
Discover the rising threat of malicious password-protected files, evading defenses via encryption and alternative channels. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/malicious-password-protected-files-blog-menlo-security/
-
What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure
Tags: access, advisory, ai, attack, authentication, automation, backup, cctv, chatgpt, cisa, communications, compliance, control, credentials, crypto, cve, cyber, cybersecurity, data, data-breach, defense, detection, dns, email, exploit, finance, firewall, flaw, government, group, healthcare, infrastructure, intelligence, international, Internet, iot, iran, kev, leak, linux, malicious, malware, mitigation, mitre, monitoring, network, office, openai, password, radius, resilience, risk, router, service, siem, software, strategy, switch, technology, threat, tool, update, vpn, vulnerability, vulnerability-managementAn Iran-affiliated threat group has evolved from defacing water utility displays to deploying custom ICS malware and exploiting Rockwell Automation PLCs across multiple U.S. critical infrastructure sectors. Key takeaways: CyberAv3ngers is a state-directed threat group operating under Iran’s IRGC Cyber-Electronic Command. The U.S. Treasury sanctioned six named officials in February 2024 and the State Department…
-
Court Backs Pentagon Anthropic Ban – But the Fight Continues
Ruling Keeps Claude Models Out of Defense Systems During Separate Legal Challenges. A federal appeals court allowed the Pentagon to enforce its supply-chain risk designation against Anthropic, keeping its AI models barred from defense contracts while parallel litigation continues to challenge the policy’s legality and constitutional limits. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/court-backs-pentagon-anthropic-ban-but-fight-continues-a-31383
-
Who Controls AI on Battlefields – the Military or the Model?
Former DoD CIO Beavers on Ethics, Reliability and AI as a National Security Tool. As AI is increasingly used in defense operations, a critical question emerges: Who controls the system – the military or the model? Former DoD CIO Leslie Beavers explores challenges related to ethics and reliability, vendor risk, and autonomy as AI tools…
-
In-Memory Loader Drops ScreenConnect
IntroductionIn February 2026, Zscaler ThreatLabz discovered an attack chain where attackers used a fake Adobe Acrobat Reader download to lure victims into installing ConnectWise’s ScreenConnect. While ScreenConnect is a legitimate remote access tool, it can be leveraged for malicious purposes. In this blog post, ThreatLabz examines the various stages of this attack, from the download lure to the…
-
OpenAI Readies Rollout of New Cyber Model as Industry Shifts to Defense
OpenAI is finalizing a cybersecurity product slated for a restricted release to select partners. The new model, as reported by Axios, could signal growing anxiety among developers that their latest creations may be too dangerous for the public. The shift comes as artificial intelligence (AI) capabilities reach a critical threshold in autonomous hacking and reasoning……
-
The Most Important Cybersecurity Trends in 2026 So Far
In the first quarter of the year, cybersecurity trends have been much of the same, with some new twists. Cyber threats are always evolving, but often have much of the same foundation. The leading 2026 cybersecurity trends so far involve AI, the failure of perimeter defenses, ransomware, and nation-state attacks. Let’s talk about what’s happening…
-
The Cybersecurity Readiness Gap: Why 90% of Companies Are Still Unprepared in 2026
The Cybersecurity Readiness Gap: Why 90% of Companies Are Still Unprepared in 2026 The cybersecurity landscape of 2026 is defined by a staggering paradox: while organizations are investing more than ever in defense, the “readiness gap” continues to widen. Despite the availability of advanced tools, 90% of organizations still rely on passwords as their primary…The…
-
Don’t just fight fraud, hunt it
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings. First seen on cyberscoop.com Jump to article: cyberscoop.com/industrialized-fraud-ai-identity-theft-prevention-op-ed/
-
CMMC Non-Compliance: Violations of FCA
Key Takeaways For many defense contractors, CMMC treated as a security project. It is discussed in terms of controls, readiness work, outside assessors, documentation, and the cost of getting prepared. Of course, all of that is important. But beyond that, CMMC also affects what a contractor is saying about itself when it pursues, performs, and……
-
China’s Tianjin Supercomputer Center Allegedly Hit in 10-Petabyte Data Theft
A threat actor has allegedly executed one of the largest data heists in China’s history, siphoning an astounding 10 petabytes of highly classified information from the National Supercomputing Center (NSCC) in Tianjin. The stolen dataset reportedly includes sensitive defense documents, missile schematics, and advanced aerospace research. The Tianjin center serves as a centralized infrastructure hub…
-
RoningLoader Campaign Uses DLL Side-Loading, Code Injection to Slip Past Defenses
A sophisticated cyber-espionage group known as DragonBreath (APT-Q-27) has been linked to a new RoningLoader malware campaign that uses advanced evasion techniques such as DLL side-loading and code injection to bypass traditional security defenses. Active since at least 2022, DragonBreath has steadily evolved its capabilities. Earlier campaigns were documented by QianXin and Sophos, but recent…
-
Questions raised about how LinkedIn uses the petabytes of data it collects
CSOonline. “We do disclose that we scan for browser extensions in our privacy policy, in order to detect abuse and provide defense for site stability.” When asked whether it uses that data solely to do those things, LinkedIn did not reply. The key person behind the allegations calls himself Steven Morrell (not his legal name, which…
-
AI Is Accelerating Cyberattacks Faster Than Defenses
Okta’s Brett Winterford on Identity Threats and Agentic AI Risks. AI is accelerating cyberattacks, collapsing timelines and exposing new identity risks. Okta’s Brett Winterford explains how attackers are using AI to scale phishing, exploit credentials and infiltrate enterprises – and what CIOs must do to defend against this rapidly evolving threat landscape. First seen on…
-
The Expanding Role of Cyberattacks in Modern Conflicts
Defense of Democracies’ Mark Montgomery on Warfare Trends, Geopolitical Threats. Cyber operations now support military strategy rather than just acting alone. Mark Montgomery of the Foundation for Defense of Democracies warns that as militaries integrate cyber and kinetic action, private sector enterprises are facing greater exposure to geopolitical threats. First seen on govinfosecurity.com Jump to…
-
Arelion employs NETSCOUT Arbor DDoS protection products
Tags: ai, attack, automation, business, cyber, cyberattack, cybersecurity, ddos, defense, detection, government, infrastructure, intelligence, Internet, mitigation, monitoring, network, risk, router, service, strategy, tactics, technology, threat“As a Tier-1 Internet carrier supporting the majority of global Internet traffic, this continued collaboration reflects our ongoing investment in best-of-breed network security solutions to protect the technology ecosystem. Our partnership combines Arelion’s global network performance and NETSCOUT’s leading Arbor DDoS attack protection solutions to provide world-class experiences for our customers.” Scott Nichols, Chief Commercial…
-
6 Winter 2026 G2 Leader Badges prove this DDoS protection stands out
Leader Enterprise DDoS ProtectionMomentum Leader DDoS ProtectionRegional Leader (Asia) DDoS ProtectionLeader DDoS ProtectionLeader Web SecurityArbor Sightline was also recognized as a leader in enterprise network management. NETSCOUTWhat NETSCOUT Customers Are Saying About TMS“The Arbor Threat Mitigation System allows us to defend not only our internal systems, but our customers.”, Darren G.”“NETSCOUT delivers unmatched network visibility…
-
How botnet-driven DDoS attacks evolved in 2H 2025
Tags: ai, attack, botnet, dark-web, ddos, defense, dns, finance, government, group, infrastructure, intelligence, international, Internet, iot, jobs, law, LLM, mitigation, network, resilience, risk, service, strategy, tactics, threat, tool, usa, vulnerabilityMassive attack capacity: Demonstration attacks peaked at 30Tbps and 4 gigapackets per second, primarily launched by Internet of Things (IoT) botnets such as Aisuru and TurboMirai variants.AI integration: The use of AI, including dark-web large language models (LLMs), moved from emerging trend to operational reality, making sophisticated attacks accessible to a wider range of threat actors.Persistent threat…
-
Cyber Defense for Education & SLTTs: Doing More with Less Using MDR
e=4>Cyber threats are rising across SLTT and education environments, but most teams are already stretched thin. Learn how organizations are improving detection and response without adding staff or complexity. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cyber-defense-for-education-sltts-doing-more-less-using-mdr-a-31367
-
NWN Adds Managed Security Services With MDR Partnership, Penetration Testing, vCISO
NWN announced the launch Wednesday of a suite of managed security services with the debut of its new NWN Cybersecurity offering, which aims to boost cyber defense for staff-constrained customers with human expertise and AI-enabled assistance, NWN executives told CRN. First seen on crn.com Jump to article: www.crn.com/news/security/2026/nwn-adds-managed-security-services-with-mdr-partnership-penetration-testing-vciso
-
The zero-day timeline just collapsed. Here’s what security leaders do next
Tags: access, ai, api, attack, authentication, breach, cio, ciso, control, cyber, cybersecurity, data, data-breach, defense, endpoint, exploit, google, Internet, Intruder, leak, least-privilege, open-source, penetration-testing, resilience, service, strategy, tactics, update, vulnerability, zero-dayScaling vulnerability discovery to machine speed: Agentic AI is AI that can act, not just advise. Give it an objective, and it will plan steps, run them, learn from what happens and adjust until it succeeds or hits a hard stop. In cybersecurity, that looks like an automated operator. It can probe an application, test…

