Tag: intelligence
-
Sweden detains ex-military IT consultant suspected of spying for Russia
A 33-year-old former IT consultant for Sweden’s Armed Forces has been detained on suspicions of spying for Russian intelligence, Swedish prosecutors said. First seen on therecord.media Jump to article: therecord.media/sweden-detains-it-consultant-russia
-
UK launches formal investigation into X over ‘nudification’ of children images
The move follows an eruption of complaints that began earlier this month when the platform’s artificial intelligence tool Grok was used to create sexual images of non-consenting people in response to user requests. First seen on therecord.media Jump to article: therecord.media/uk-launches-formal-investigation-x-grok-images
-
Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign
Rust offers evasion advantages: CloudSEK researchers said RustyWater was developed in Rust, which they said is increasingly used by malware authors for its memory safety features and cross-platform capabilities, according to the blog post. Other state-sponsored groups, including Russia’s Gossamer Bear and China-linked actors, have also deployed Rust-based malware in recent campaigns, according to security…
-
Intersec Dubai highlights why AI has become critical in the race against cyber attackers
Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637147/Intersec-Dubai-highlights-why-AI-has-become-critical-in-the-race-against-cyber-attackers
-
Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information.Under an initiative called Claude for Healthcare, the company said U.S. subscribers of Claude Pro and Max plans can opt to give Claude secure access to their…
-
Hacking Group “Everest” Allegedly Claims Nissan Motor Breach
The Everest hacking group has allegedly claimed responsibility for a major cyberattack on Nissan Motor Co., Ltd., one of Japan’s leading automotive manufacturers. According to threat intelligence reports observed on January 10, 2026, the cybercriminal organization claims to have exfiltrated approximately 900 GB of sensitive data from the company’s systems, though the breach remains under…
-
Generative AI in Enterprises: Security Risks Most Companies Are Not Measuring
Introduction: The Silent Expansion of Generative AI in Business Generative Artificial Intelligence has rapidly moved from experimentation to widespread adoption… First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/generative-ai-in-enterprises-security-risks-most-companies-are-not-measuring/
-
ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches
Also: Turning AI Data Into AI Defense, Autonomous Border Patrol Robots. In this week’s panel, four ISMG editors discussed how basic security failures are still opening the door to major breaches, how researchers are rethinking data protection in the age of AI and the implications of robots with artificial intelligence patrolling national borders. First seen…
-
xRAT Malware Targets Windows Users via Fake Adult Game
AhnLab Security Intelligence Center (ASEC) has uncovered a dangerous distribution campaign targeting Windows users through Korean web hard services. Threat actors are leveraging xRAT (QuasarRAT) malware, disguising it as legitimate adult game content to deceive unsuspecting users into downloading and executing malicious files. Korean webhard services have become a prime vector for malware distribution, with…
-
50 Best Free Cyber Threat Intelligence Tools 2026
Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in networks and applications. It helps with the collection and analysis of information about current and potential attacks that threaten the safety of an organization or its assets. Here you can find the Comprehensive Threat Intelligence Tools list that covers Performing…
-
Telecom sector sees steady rise in ransomware attacks
A new threat intelligence report described a potent mixture of unpatched flaws and lax perimeter controls. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/telecom-ransomware-spike-cyble/809224/
-
Former NSA insider Kosiba brought back as spy agency’s No. 2
Tim Kosiba, who has a long history of national security positions at the NSA and elsewhere, will be the signals intelligence agency’s new deputy chief. First seen on therecord.media Jump to article: therecord.media/timothy-kosiba-nsa-new-deputy-chief
-
The Definitive Guide to ISO 42001
<div cla Understanding ISO 42001 ISO/IEC 42001 is the world’s first international standard for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS). Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), ISO 42001 provides a structured framework for governing AI systems responsibly, securely, and transparently across…
-
CISA flags max-severity bug in HPE OneView amid active exploitation
Tags: api, authentication, cisa, endpoint, exploit, flaw, Hardware, intelligence, kev, monitoring, software, strategy, threat, update, vulnerabilityNot an ‘apply and move on’ solution: While CISA’s KEV inclusion raised the priority immediately, enterprises can’t treat OneView like a routine endpoint patch. Management-plane software is often deployed on-premises, sometimes on physical servers, and tightly coupled with production workflows. A rushed fix that breaks monitoring, authentication, or integrations can be almost as dangerous as…
-
Like it or not, AI will transform cyber strategy in 2026
Bubble or no bubble, from cyber skills to defensive strategies to governance, risk and compliance, artificial intelligence will remake the cyber world in 2026 First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637095/Like-it-or-not-AI-will-transform-cyber-strategy-in-2026
-
CrowdStrike Acquires SGNL for $740 Million to Thwart AI-Powered Cyber Threats
Tags: ai, credentials, crowdstrike, cyber, cybersecurity, defense, exploit, hacker, identity, intelligence, startup, technology, threatCrowdStrike Inc. said Thursday it will acquire identity security startup SGNL in a deal valued at $740 million the latest move by the cybersecurity giant to fortify its defenses against increasingly sophisticated artificial intelligence (AI)-powered cyberattacks. The acquisition centers on SGNL’s continuous identity technology, designed to prevent hackers from exploiting user credentials as entry.. First…
-
ChatGPT Health feature draws concern from privacy critics over sensitive medical data
The artificial intelligence juggernaut in a blog post encouraged its hundreds of millions of users to connect medical records and wellness app data to the new health-focused chatbot feature, adding that it will be outfitted with extra data privacy protections. First seen on therecord.media Jump to article: therecord.media/chatgpt-health-draws-concern-privacy-critics
-
React2Shell Vulnerability Hit by 8.1 Million Attack Attempts
The React Server Components (RSC) >>Flight<>React2Shell,<< has become the target of a massive exploitation campaign that shows no signs of slowing. Since the vulnerability's initial disclosure, threat intelligence firm GreyNoise has recorded over 8.1 million attack sessions, with daily attack volumes […] The post React2Shell Vulnerability Hit by 8.1 Million Attack Attempts appeared first on…
-
Phishing-Angreifer setzen vermehrt auf E-Mail-Routing-Lücken
Tags: 2fa, authentication, business, cyberattack, dmarc, dns, email, framework, infrastructure, intelligence, mail, mfa, microsoft, password, phishing, risk, service, spam, threatAngreifer missbrauchen falsch konfigurierte Richtlinien, um Phishing-E-Mails wie interne E-Mails aussehen zu lassen, Filter zu umgehen und Anmeldedaten zu stehlen.Das Threat Intelligence Team von Microsoft hat kürzlich festgestellt, dass Angreifer zunehmend komplexe E-Mail-Weiterleitungen und falsch konfigurierte Domain-Spoofing-Schutzmaßnahmen ausnutzen. Dabei lassen sie ihre Phishing-Nachrichten so aussehen, als würden sie von den angegriffenen Organisationen selbst stammen.In den…
-
ownCloud Warns Users to Enable MFA After Credential Theft Incident
ownCloud has issued an urgent security advisory urging users to enable Multi-Factor Authentication (MFA) following a credential theft incident reported by threat intelligence firm Hudson Rock. The incident, discovered in January 2026, affected organizations using self-hosted file-sharing platforms, including some ownCloud Community Edition deployments. What Happened The incident did not result from any vulnerability or…
-
Researchers Poison Stolen Data to Sabotage AI Model Accuracy
A groundbreaking cybersecurity research team has developed a novel defensive technique that renders stolen artificial intelligence databases virtually useless to attackers by deliberately poisoning proprietary knowledge graphs with plausible yet false information.”‹ The research, conducted by scientists from the Institute of Information Engineering at the Chinese Academy of Sciences, National University of Singapore, and Nanyang…
-
OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health.To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails, First…
-
FDA Takes Hands-Off Approach to AI Devices and Software
Agency: Guidance Favors Market Innovation Over Federal Scrutiny. New artificial intelligence-enabled health wearable devices and clinical decision support software will not face U.S. Food and Drug Administration regulatory scrutiny, providing the technology meets certain criteria, such as being low-risk, the agency said this week. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/fda-takes-hands-off-approach-to-ai-devices-software-a-30465
-
Neue Ransomware-Bedrohung zielt auf deutsche Unternehmen
Tags: backup, ciso, cloud, cyberattack, encryption, extortion, firewall, germany, infrastructure, intelligence, network, ransomware, threat, tool, vmware, vulnerabilityDer Ransomware-Dienst Ransomhouse nutzt jetzt eine komplexe Dual-Schlüssel-Verschlüsselung und automatisierte Angriffe auf VMware ESXi.Sicherheitsexperten haben kürzlich festgestellt, dass die Ransomware-Gruppe Jolly Scorpius ihren RaaS-(Ransomware as a Service)-Dienst Ransomhouse massiv verbessert hat. Wie das Threat-Intelligence-Team von Palo Alto Networks berichtet, nutzt die Gruppe jetzt ein fortschrittliches duales Verschlüsselungssystem.Die Angriffe basieren auf einer aktualisierten Version des Verschlüsselungs-Trojaner…

