Tag: intelligence
-
Cisco Infuses Security into Networking with New Nexus Smart Switch and Hypershield Integration
At Cisco Live EMEA 2025 in Amsterdam this month, Cisco unveiled the Nexus Smart Switch and Hypershield integration, a two-in-one solution that it says addresses the mounting security management pains amid sweeping artificial intelligence (AI) adoption in data centers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/cisco-infuses-security-into-networking-with-new-nexus-smart-switch-and-hypershield-integration/
-
Police arrests suspects tied to AI-generated CSAM distribution ring
Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual abuse material (CSAM) generated using artificial intelligence (AI). First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/police-arrests-suspects-linked-to-ai-generated-csam-distribution-ring/
-
Trump administration retreats in fight against Russian cyber threats
Tags: attack, control, cyber, cybersecurity, hacking, infrastructure, intelligence, russia, threat, vulnerabilityRecent incidents indicate US is no longer characterizing Russia as a cybersecurity threat, marking a radical departure: ‘Putin is on the inside now'<ul><li>Don’t let a billionaire’s algorithm control what you read. <a href=”https://app.adjust.com/1ja835wd”>Download our free app to get trusted reporting.</li></ul>The <a href=”https://www.theguardian.com/us-news/trump-administration”>Trump administration has publicly and privately signaled that it does not believe <a href=”https://www.theguardian.com/world/russia”>Russia…
-
Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data
The Director of National Intelligence said such a demand would violate Americans’ rights and raise concerns about a foreign government pressuring a U.S.-based technology company. The post Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/gabbard-decries-britains-reported-demand-for-apple-to-provide-backdoor-access-to-users-cloud-data/
-
Belgium investigating alleged cyberattack on intelligence agency by China-linked hackers
Tags: access, china, cyberattack, cybersecurity, email, exploit, flaw, hacker, intelligence, softwareThe hackers reportedly exploited a flaw in US cybersecurity firm Barracuda’s software to access VSSE’s email server First seen on techcrunch.com Jump to article: techcrunch.com/2025/02/28/belgium-investigating-alleged-cyberattack-on-intelligence-agency-by-china-linked-hackers/
-
What is zero trust? The security model for a distributed and risky era
Tags: access, ai, authentication, best-practice, breach, business, ceo, cloud, compliance, computer, computing, control, corporate, credentials, cyberattack, data, detection, framework, government, guide, identity, infrastructure, intelligence, jobs, login, monitoring, network, nist, office, password, ransomware, regulation, risk, saas, service, technology, threat, tool, vpn, zero-trustHow zero trust works: To visualize how zero trust works, consider a simple case: a user accessing a shared web application. Under traditional security rules, if a user was on a corporate network, either because they were in the office or connected via a VPN, they could simply click the application and access it; because…
-
Army soldier linked to Snowflake attack spree allegedly tried to sell data to foreign spies
Federal prosecutors accuse Cameron Wagenius of searching how to defect to Russia days after he tried to sell stolen data to a foreign intelligence service. First seen on cyberscoop.com Jump to article: cyberscoop.com/army-soldier-alleged-cybercriminal-foreign-spies/
-
US intelligence chief Tulsi Gabbard probes UK demand for Apple’s encrypted data
A secret order issued by the UK against Apple would be a ‘clear and egregious violation’ if it provides back door access to Americans’ encrypted data, says US director of national intelligence First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366619753/US-intelligence-chief-Tulsi-Gabbard-probes-UK-demand-for-Apples-encrypted-data
-
Is Agentic AI too smart for your own good?
Agentic AI, which consists of systems that autonomously take action based on high-level goals, is becoming integral to enterprise security, threat intelligence, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/27/agentic-ai-risks/
-
Geopolitical tensions fuel surge in OT and ICS cyberattacks
New Russian group focused on Ukraine: The second new group to launch attack campaigns against industrial organizations last year, dubbed GRAPHITE, has overlaps with APT28 activities. Also known as Fancy Bear or Pawn Storm, APT28 is believed to be a unit inside Russia’s General Staff Main Intelligence Directorate (GRU).GRAPHITE launched constant phishing campaigns against hydroelectric,…
-
UK Delays Plans for AI Regulation
Some Lawmakers Fear Regulation Could Stymie Innovation. The British Labour Government has reportedly delayed plans to put forward a draft bill on artificial intelligence over concerns that binding AI regulation could stifle the country’s AI growth potential. A spokesperson said the government remains committed to bringing forward a legislation. First seen on govinfosecurity.com Jump to…
-
AI Hijacked: New Jailbreak Exploits ChainThought
Researchers Manipulate o1, o3, Gemini 2.0 Flash Thinking and DeepSeek-R1. The new generation of reasoning artificial intelligence chatbots is susceptible to a jailbreaking method that hijacks models’ safety pathways, reducing their ability to detect harmful content. The attack modifies the reasoning processes and reintegrates the changes into the original queries. First seen on govinfosecurity.com Jump…
-
Intelligence mined from exposed Black Basta internal chats
First seen on scworld.com Jump to article: www.scworld.com/brief/intelligence-mined-from-exposed-black-basta-internal-chats
-
Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions
Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about a surge in phishing campaigns targeting higher education institutions in the United States. These campaigns, observed since August 2024, have exploited the academic calendar and institutional trust to deceive students, faculty, and staff. The attacks have been linked to a broader…
-
Threat actors are increasingly trying to grind business to a halt
Palo Alto Networks’ threat intelligence firm said nearly 9 in 10 cyberattacks it responded to last year involved disrupted business operations. First seen on cyberscoop.com Jump to article: cyberscoop.com/cyberattacks-business-disruption-2025-unit-42-palo-alto-networks/
-
CIO des Jahres 2025 Wettbewerb startet
Siegerinnen und Sieger des vergangenen Jahres jubeln über ihre CIO des Jahres Awards. Machen Sie mit und bewerben Sie sich dann stehen Sie vielleicht im Oktober 2025 auf der großen Gala-Bühne und dürfen sich über die renommierteste IT-Auszeichnung Deutschlands freuen. cio.de / Tobias TschepeEs ist wieder so weit: Der renommierteste IT-Award Deutschlands ist startklar. Bis…
-
Black Basta Leaks Reveal Targeting, Planning, Escalation
Group Cross-Referenced Open-Source Victim Intelligence With Infostealer Hauls The leak of 200,000 internal chat messages for the Black Basta operation provides an overview of how a modern ransomware group organizes itself to take down victims in the most efficient, profit-maximizing manner possible, using a variety of tactics that should be, in theory, easy to repel.…
-
EU sanctions North Korean tied to Lazarus group over involvement in Ukraine war
The latest package of EU sanctions related to Russia’s invasion of Ukraine included the leader of the North Korean intelligence agency known for backing the Lazarus group and other high-profile hacking operations. First seen on therecord.media Jump to article: therecord.media/eu-sanctions-north-korea-ukraine-war-lazarus-group
-
China Using AI-Powered Surveillance Tools, Says OpenAI
Report Also Flags Threats Linked to North Korea, Iran. Chinese influence operations are using artificial intelligence to carry out surveillance and disinformation campaigns, OpenAI said in its latest threat report. The report details two major Chinese campaigns that misused AI tools, including OpenAI’s own models, to advance state-backed agendas. First seen on govinfosecurity.com Jump to…
-
Cybercriminals Impersonate Windows >>Commander Tool<< to Launch LummaC2 Malware Attack
The AhnLab Security Intelligence Center (ASEC) has uncovered a new cyberattack campaign leveraging the LummaC2 malware, which is being distributed under the guise of a cracked version of Total Commander. Total Commander is a widely used Windows file management tool offering features like advanced search, folder synchronization, and FTP/SFTP support. While the legitimate software provides…
-
New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer.The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025.A notable aspect of the stealer malware is the…
-
24th February Threat Intelligence Report
Check Point Research covers the recent ByBit hack, one of the largest thefts in digital asset history, its implications for crypto security, and security recommendations. In this event, hackers gained access to […] First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2025/24th-february-threat-intelligence-report/
-
Man vs. machine: Striking the perfect balance in threat intelligence
In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He explains that while AI … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/24/automation-human-oversight-ai-threat-intelligence/
-
North Korean APT28 Expands Cyber Espionage Campaign
A recent report from 360 Threat Intelligence Center has detailed the persistent cyber espionage activities of APT-C-28 (ScarCruft), First seen on securityonline.info Jump to article: securityonline.info/north-korean-apt-c-28-expands-cyber-espionage-campaign/
-
Russia-Linked Threat Actors Exploiting Signal Messenger to Eavesdrop on Sensitive Communications
A recent report from Google Threat Intelligence Group (GTIG) has revealed a coordinated effort by multiple Russia-aligned threat First seen on securityonline.info Jump to article: securityonline.info/russia-linked-threat-actors-exploiting-signal-messenger-to-eavesdrop-on-sensitive-communications/
-
OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
OpenAI on Friday revealed that it banned a set of accounts that used its ChatGPT tool to develop a suspected artificial intelligence (AI)-powered surveillance tool.The social media listening tool is said to likely originate from China and is powered by one of Meta’s Llama models, with the accounts in question using the AI company’s models…
-
Bloody Wolf Cybercrime Group Evolves Tactics, Expands Targets
The BI.ZONE Threat Intelligence team has released a new report detailing the evolution of the Bloody Wolf cybercrime First seen on securityonline.info Jump to article: securityonline.info/bloody-wolf-cybercrime-group-evolves-tactics-expands-targets/

