Tag: intelligence
-
Police created ‘intelligence profile’ of BBC journalist subject to phone surveillance
Police and MI5 conducted seven unlawful operations to obtain phone data relating to former BBC journalist Vincent Kearney, the Investigatory Powers Tribunal heard today First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639366/Police-created-intelligence-profile-of-BBC-journalist-subject-to-phone-surveillance
-
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
Tags: ai, api, cybersecurity, exploit, flaw, intelligence, remote-code-execution, theft, vulnerabilityCybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials.”The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables executing First seen on thehackernews.com Jump to article: thehackernews.com/2026/02/claude-code-flaws-allow-remote-code.html
-
Chinese cyberspies breached dozens of telecom firms, govt agencies
Google’s Threat Intelligence Group (GTIG), Mandiant, and partners disrupted a global espionage campaign attributed to a suspected Chinese threat actor that used SaaS API calls to hide malicious traffic in attacks targeting telecom and government networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-cyberspies-breached-dozens-of-telecom-firms-govt-agencies/
-
Survey Surfaces Increased Cybersecurity Risks Following AI Adoption
A global survey of 2,000 IT decision makers published today shows cybersecurity risks are rising as more organizations embrace artificial intelligence (AI) applications. Conducted by Sapio Research on behalf of Fastly, the survey finds that cybersecurity incidents impacting organizations that have integrated AI into core processes incur 135% more costs than organizations that have not……
-
2026ForceIntelligence-Index KI-gesteuerte Angriffe nehmen zu, da grundlegende Sicherheitslücken Unternehmen exponieren
IBM hat den <> veröffentlicht, aus dem hervorgeht, dass Cyberkriminelle grundlegende Sicherheitslücken in dramatisch höherem Maße ausnutzen, was nun durch KI-Tools beschleunigt wird, mit denen Angreifer Schwachstellen schneller als je zuvor identifizieren können. IBM X-Force beobachtete einen Anstieg von 44 % bei Angriffen, die mit der Ausnutzung öffentlich zugänglicher Anwendungen begannen, […] First seen on…
-
Akquisition von Sevco Security stärkt proaktive Sicherheitsstrategien von Arctic Wolf durch Integration von Asset-Intelligence und Exposure-Assessment
Arctic Wolf gibt die Akquisition von Sevco Security bekannt, einem Vorreiter im Bereich Exposure-Assessment-Plattformen. Die cloudnative Technologie von Sevco wird auf der Arctic-Wolf-Aurora-Plattform wirken und vereint Asset-Intelligence, Vulnerability-Kontext sowie die Abdeckung von Sicherheitskontrollen. So werden Unternehmen dabei unterstützt, Exposures in hybriden Umgebungen kontinuierlich zu identifizieren und zu priorisieren. Im 2025 Gartner-Magic-Quadrant für Exposure-Assessment-Platforms wurde Sevco…
-
How Relevant Is the Chief AI Officer? CAIO as Change Agent Orchestrating AI Across Strategy, Operations, and Culture
How Relevant Is the Chief AI Officer in the AI Era? Over the past few years, artificial intelligence has shifted from isolated experimentation to a…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/02/how-relevant-is-the-chief-ai-officer-caio-as-change-agent-orchestrating-ai-across-strategy-operations-and-culture/
-
Sicherheitslücken exponieren Unternehmen: KI-gesteuerte Angriffe nehmen zu
IBM hat den 2026 X-Force Threat Intelligence Index veröffentlicht, aus dem hervorgeht, dass Cyberkriminelle grundlegende Sicherheitslücken in dramatisch höherem Maße ausnutzen, was nun durch KI-Tools beschleunigt wird, mit denen Angreifer Schwachstellen schneller als je zuvor identifizieren können [1]. IBM X-Force beobachtete einen Anstieg von 44 % bei Angriffen, die mit der Ausnutzung öffentlich zugänglicher Anwendungen……
-
Neuer Developer Hub öffnet Armis Asset Intelligence für Integrationen
Das Portal bietet eine klar strukturierte, leistungsstarke Umgebung für den Aufbau sicherer und skalierbarer Integrationen mit Armis Centrix, der Cyber-Exposure-Management-Plattform von Armis. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neuer-developer-hub-oeffnet-armis-asset-intelligence-fuer-integrationen/a43815/
-
Boards don’t need cyber metrics, they need risk signals
Tags: access, advisory, ai, attack, automation, awareness, business, ciso, control, cyber, cybersecurity, data, framework, governance, intelligence, metric, phishing, riskThe seduction of counting: Even when metrics are not too technical and align with business impact, another problem emerges: What gets counted can crowd out what matters.Wendy Nather, a longtime CISO who is now an advisor at EPSD, cautions against equating measurement with understanding. “When you are reporting to the board, there are some things…
-
Threat intelligence supply chain is full of weak links, researchers find
And they’re being stressed by geopolitical concerns that threaten to slow important data-sharing efforts First seen on theregister.com Jump to article: www.theregister.com/2026/02/25/threat_intelligence_supply_chain_research/
-
Autonomer KI-Agent für das Human-Risk-Management
KnowBe4 führt AIDA-Orchestration ein. Dabei handelt es sich um den achten KI-gestützten Agenten in der KnowBe4-Suite, bekannt als AIDA (Artificial-Intelligence-Defense-Agents). Der AIDA-Orchestration-Agent ist ein autonomes, KI-gestütztes System für das Human-Risk-Management. Er erstellt, plant und verwaltet unabhängig personalisierte Phishing-Sicherheitstests und Security-Awareness-Trainings auf Benutzerebene, die sich dynamisch an das Risikoprofil jeder Person anpassen. Dadurch entfallen manuelle Kampagnen,…
-
North Korean Hackers Continue to Target US Healthcare
Tags: attack, extortion, group, hacker, healthcare, intelligence, lazarus, north-korea, ransomware, threatReport: Lazarus Group Pivoting to Medusa Ransomware for Extortion Attacks. North Korean-state backed Lazarus Group hackers are using Medusa ransomware in extortion attacks on U.S. healthcare entities despite a 2024 U.S. indictment of Rim Jong Hyok, an alleged member of the Lazarus subgroup Stonefly, according to a new threat intelligence report. First seen on govinfosecurity.com…
-
Threat Actors Exploit Weaponized AI to Seize Full Domain Access in Under 30 Minutes
Threat actors are rapidly weaponizing artificial intelligence to move from initial access to full domain compromise in under half an hour, leaving defenders with almost no room for error or delay. As enterprises adopt AI across development, identity, and cloud workflows, adversaries are abusing the same tools to script lateral movement, automate reconnaissance, and scale…
-
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Tags: attack, group, healthcare, intelligence, korea, lazarus, middle-east, north-korea, ransomware, threatThe North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team.Broadcom’s threat intelligence division said it also identified the same threat actors mounting an unsuccessful…
-
AI Arms Race Shrinks Breakout Time to 29 Minutes as Adversaries Turn GenAI on the Enterprise
Artificial intelligence is no longer just a defensive tool; it is now a core accelerant for cybercriminals and nation-state actors alike. That is the central message from CrowdStrike’s newly released 2026 Global Threat Report, which paints 2025 as the “year of the evasive adversary”, defined by speed, identity abuse and direct attacks on AI systems…
-
Model Inversion Attacks: Growing AI Business Risk
In an era where artificial intelligence (AI) and machine learning (ML) are driving unprecedented innovation and efficiency, a new class of cyber threats has emerged that puts sensitive data and entire business operations at serious risk. Among these threats, model inversion attacks have become particularly concerning for organizations that rely on machine learning models trained……
-
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude’s capabilities to improve their own models.The distillation attacks generated over 16 million exchanges with its large language model (LLM) through about 24,000 fraudulent accounts in violation of its terms First seen…
-
The rise of the evasive adversary
Tags: access, ai, attack, authentication, breach, china, cloud, credentials, crime, crowdstrike, crypto, data, defense, endpoint, exploit, finance, firewall, group, identity, infrastructure, intelligence, korea, lazarus, leak, mail, malicious, malware, microsoft, monitoring, network, north-korea, open-source, phishing, ransomware, remote-code-execution, russia, saas, service, software, strategy, supply-chain, tactics, theft, threat, tool, update, vpn, vulnerability, windows, zero-dayBig game hunters tighten their grip: CrowdStrike’s research highlights how big game hunting (BGH) ransomware actors have remained the dominant force in the eCrime landscape.Punk Spider, a group responsible for developing and maintaining Russian-language Akira ransomware, and its associated Akira dedicated leak site, conducted 198 intrusions in 2025, a 134% increase year over year. Victim-shaming operations…
-
Anthropic Facing Allegations from Musk Over Large”‘Scale Data Misuse
Tech billionaire Elon Musk has publicly condemned the artificial intelligence firm Anthropic, accusing the company of massive data theft and hypocrisy. This confrontation follows Anthropic’s recent claims that competing Chinese artificial intelligence models unlawfully extracted training data from its flagship Claude model. The Distillation Controversy Earlier this week, Anthropic published a report accusing Chinese AI…
-
Moving From Anomalies to Connections in Fraud Defense
Shared Network Intelligence Adds Ecosystem Visibility to AI Models. Fraudsters collaborate, but most banks still detect fraud alone. This imbalance has defined fraud prevention for years. Now CISOs and fraud practitioners are rethinking their approach using network intelligence signals. Network intelligence shifts the lens by focusing on relationships across banks. First seen on govinfosecurity.com Jump…
-
APT28 Targeted European Entities Using Webhook-Based Macro Malware
The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe.The activity, per S2 Grupo’s LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze. “The campaign relies on basic tooling and the exploitation of…
-
Forescout Partners with E-ISAC to Bring Threat Intelligence and Research to North American Utilities
Forescout Technologies has joined the Electricity Information Sharing and Analysis Center Vendor Affiliate Program, a move that will expand the sharing of threat intelligence with utilities and government partners working to protect North America’s power grid. The program is run by the Electricity Information Sharing and Analysis Center(E-ISAC), which operates under the North American Electric…
-
Open-Weight AI Models Fail the Jailbreak Test
Cisco: One Prompt May Not Break Most AI Models, But a Conversation Will. Cisco tested eight major open-weight artificial intelligence models and found multi-turn jailbreak attacks succeeded nearly 93% of the time, exposing a blind spot in how enterprises assess and deploy large language models safety. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/open-weight-ai-models-fail-jailbreak-test-a-30823
-
Russian-speaking hackers used gen AI tools to compromise 600 firewalls, Amazon says
A Russian-speaking threat actor used commercial generative artificial intelligence tools to help compromise more than 600 FortiGate firewall devices across more than 55 countries earlier this year, researchers have found. First seen on therecord.media Jump to article: therecord.media/gen-ai-fortigate-hackers-russia
-
Ukraine says cyberattacks on energy grid now used to guide missile strikes
Russian cyberattacks targeting Ukraine’s energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, Ukrainian cybersecurity officials said. First seen on therecord.media Jump to article: therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes
-
AI-powered campaign compromises 600 FortiGate systems worldwide
A Russian-speaking cybercriminal used commercial generative AI tools to hack over 600 FortiGate devices across 55 countries. Amazon Threat Intelligence reports that a Russian-speaking, financially motivated threat actor used commercial generative AI services to compromise more than 600 FortiGate devices in 55 countries. The activity, observed between January 11 and February 18, 2026, highlights how…

