Tag: technology
-
TDL 016 – Speed, Risk, and Responsibility in the Age of AI – Rafael Ramirez
Tags: access, ai, antivirus, automation, awareness, business, ciso, cloud, control, country, cyber, data, defense, detection, dns, firewall, governance, government, hacker, ibm, incident response, intelligence, Internet, law, linkedin, login, mfa, microsoft, network, risk, saas, service, skills, software, startup, strategy, technology, threat, tool, training, update, vulnerability, windows, zero-trustSummary In a recent episode of The Defenders Log, host David Redekop sat down with cyber security expert Rafael Ramirez to navigate the rapidly shifting landscape of AI security. As we move deeper into 2026, the duo explored how artificial intelligence has evolved from simple chatbots into powerful, autonomous “agentic” systems. The Double-Edged Sword of…
-
ISMG Editors: No Honor Among Ransomware Thieves
Also: AI, Machine Identity Risks; Europe’s Digital Sovereignty Push. In this week’s panel, four ISMG editors examined how cybercriminals may be turning on each other, what security leaders are really saying about machine identities and AI risk, and how shifting U.S.-Europe dynamics are reshaping technology resilience and digital sovereignty. First seen on govinfosecurity.com Jump to…
-
AI in the SOC: Why Complete Autonomy Is the Wrong Goal
Dan Petrillo, VP of Product at BlueVoyant As artificial intelligence (AI) becomes more deeply embedded in security operations, a divide has emerged in how its role is defined. Some argue the security operations centre (SOC) should be fully autonomous, with AI replacing human analysts. Others believe that augmentation is the right path, using AI to support and extend existing teams. Augmentation probably reflects…
-
AI in the SOC: Why Complete Autonomy Is the Wrong Goal
Dan Petrillo, VP of Product at BlueVoyant As artificial intelligence (AI) becomes more deeply embedded in security operations, a divide has emerged in how its role is defined. Some argue the security operations centre (SOC) should be fully autonomous, with AI replacing human analysts. Others believe that augmentation is the right path, using AI to support and extend existing teams. Augmentation probably reflects…
-
Ex-Google engineers charged with orchestrating high-tech secrets extraction
A federal grand jury has indicted three Silicon Valley engineers on charges in a scheme to steal trade secrets from Google and other leading technology companies. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/20/google-trade-secrets-theft-charges/
-
Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case
A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea’s fraudulent information technology (IT) worker scheme.In November 2025, Oleksandr “Alexander” Didenko pleaded guilty to wire fraud conspiracy and aggravated identity theft for stealing the identities of U.S. citizens and selling them to IT…
-
Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center
A UMMC cyberattack has disrupted operations at the largest academic health science center in Jackson, Mississippi. The incident forced the shutdown of critical information technology systems, the closure of clinics across the state, and the cancellation of numerous medical procedures. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/ummc-cyberattack-clinic-closures-it-shutdown/
-
Red Flags for OT Abound in Dragos Review of 2025
Ransomware, Lack of Visibility, Mischaracterizations and Nation-States, Oh My. There is a silent epidemic of ransomware attacks on commercial operational technology systems, which are mischaracterized as IT incidents even though they impact operational systems, claims a comprehensive annual review of cyberattacks targeting OT, published this week by security firm Dragos. First seen on govinfosecurity.com Jump…
-
Why Banks Need AI-Driven Segmentation Against Ransomware
AI-powered ransomware compresses attacks from weeks to minutes. Michael Villar, director of field security technology at Akamai, says banks need AI-driven segmentation to contain intruders fast, limit lateral movement and protect sensitive data before extortion begins. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/banks-need-ai-driven-segmentation-against-ransomware-i-5524
-
NDSS 2025 Defending Against Backdoor Attacks On Graph Neural Networks Via Discrepancy Learning
Tags: attack, backdoor, conference, defense, framework, Internet, ml, network, risk, technology, threat, vulnerabilitySession 12D: ML Backdoors Authors, Creators & Presenters: Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National University of Defense Technology), Jun Wang (National University of Defense Technology), Tao Xiang (Chongqing University), Meng Shen (Beijing Institute of Technology, Beijing, China), Xinwang Liu (National University of Defense Technology) PAPER DShield: Defending…
-
Why White Label MSP Services Are Key to Growing Businesses
Originally published at Why White Label MSP Services Are Key to Growing Businesses by EasyDMARC. Running a modern business means relying on technology … First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/why-white-label-msp-services-are-key-to-growing-businesses/
-
Hackers target Microsoft Entra accounts in device code vishing attacks
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/
-
CredShields Leads OWASP Smart Contract Top 10 2026 as Governance and Access Failures Drive Onchain Risk
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?quality=50&strip=all 1200w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=300%2C200&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=768%2C512&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=1024%2C683&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=150%2C100&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=1046%2C697&quality=50&strip=all 1046w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=252%2C168&quality=50&strip=all 252w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=126%2C84&quality=50&strip=all 126w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=720%2C480&quality=50&strip=all 720w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=540%2C360&quality=50&strip=all 540w, b2b-contenthub.com/wp-content/uploads/2026/02/OWASP1.png?resize=375%2C250&quality=50&strip=all 375w” width=”1024″ height=”683″ sizes=”auto, (max-width: 1024px) 100vw, 1024px”> Cyber NewsWireGovernance and Privilege Failures DominateThe highest-ranked risks for 2026 include:Access Control VulnerabilitiesBusiness Logic VulnerabilitiesPrice Oracle ManipulationFlash LoanFacilitated AttacksProxy & Upgradeability VulnerabilitiesAnalysis of 2025 incidents shows…
-
Citizen Lab Finds Evidence of Mobile Data Extraction from Detained Kenyan Activist
Citizen Lab says it found forensic evidence that Cellebrite’s mobile extraction technology was used on a Samsung Android phone belonging to detained Kenyan activist and politician Boniface Mwangi while the device was in police custody in July 2025. The group warns the case highlights how high-powered forensic tools can be used to access sensitive personal…
-
A Busy Week for Cybersecurity Speaking Engagements
I have a busy week with podcasts, webinars, and a keynote! Communicating and sharing is vital to the cybersecurity industry. It is how we leverage shared knowledge and experiences to make more informed decisions and gain better positions against our adversaries. Yesterday (Tuesday Feb 17th) I was speaking on Convene Chats webinar with the amazing…
-
Koi Purchase Bolsters Palo Alto’s AI Attack Surface Defense
$300M Acquisition Strengthens Palo Alto Networks’ XDR and AI Governance Platform. Palo Alto Networks plans to acquire Koi Security for $300 million to address growing AI-driven endpoint risks. The startup’s technology adds deep visibility into AI agents plug-ins and nonbinary code, enhancing Cortex XDR and Prisma AIRS as enterprises confront a growing unmanaged AI attack…
-
Figure Breach Enters New Phase After Data Leak Claims
The data breach disclosed by fintech lender Figure Technology Solutions is moving beyond a contained security incident, as reports that stolen customer information is circulating online coincide with early legal investigations. The developments mark the point where an internal breach begins to create broader consumer risk and potential liability. Latest Developments Data associated with the……
-
Palo Alto Networks Moves to Secure Agentic Endpoints with Koi Deal
Palo Alto Networks has agreed to acquire Israeli startup Koi Security, marking a timely strategic push to confront the risks of AI agents operating inside corporate systems with broad access to data yet limited oversight. Palo Alto Networks plans to integrate Koi’s technology, known as Agentic Endpoint Security, into its Prisma AIRS AI security platform..…
-
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident’s phone, making it the latest case of abuse of the technology targeting civil society.The interdisciplinary research unit at the University of Toronto’s Munk School of Global…
-
Securing our Critical Infrastructure with Zero Trust
We are seeing a steady rise in cyberattacks against critical infrastructure and it’s not surprising. Many of these systems rely on legacy software riddled with known vulnerabilities. When these systems fail, the impact moves quickly from networks to operations, and from operations to public safety. There is still a dangerous misconception that operational technology (OT)……
-
Data breach at fintech firm Figure affects nearly 1 million accounts
Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure Technology Solutions, a self-described blockchain-native financial technology company. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/
-
From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses
The shadow technology problem is getting worse. Over the past few years, organizations have scaled microservices, cloud-native apps, and partner integrations faster than corporate governance models could keep up, resulting in undocumented or shadow APIs. We’re now seeing this pattern all over again with AI systems. And, even worse, AI introduces non-deterministic behavior, autonomous actions,…
-
Discipline is the new power move in cybersecurity leadership
Tags: automation, cyber, cybersecurity, data, group, incident response, intelligence, metric, risk, risk-management, service, siem, soc, technology, threat, tool, update, vulnerability, vulnerability-managementHow to do more with less: 1. Review contracts, renegotiate them or change the operations to a new partner Scope, service-level agreements and performance metrics should be revisited because many contracts were established under different risk profiles, urgency and pricing conditions. Modernizing contracts to focus on outcomes rather than activities, revalidating pricing and service assumptions…
-
Will Your Organization Take the Quantum Leap in 2026? Read This First
Explore how organizations can prepare for the quantum age by developing quantum security intelligence, establishing governance plans, and prioritizing system updates. Learn strategies for building resilience without exorbitant investments as quantum computing technology advances First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/will-your-organization-take-the-quantum-leap-in-2026-read-this-first/
-
Chatbots, IT Outages, Devices Top 2026 Health Tech Hazards
AI chatbots rank as the number-one health tech hazard in 2026, followed by digital darkness and legacy medical device cyber issues, said Rob Schluth and Scott Luney, technology and security experts at patient safety group ECRI Institute, which compiles an annual top10 list. They explained why. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/chatbots-outages-devices-top-2026-health-tech-hazards-i-5525
-
Citizen Lab: Kenyan authorities used Cellebrite to break into phone of dissident
Traces of commercial surveillance technology manufactured by the Israeli spyware maker Cellebrite were found on a prominent Kenyan dissident’s phone, the latest in a series of abuses of the technology targeting civil society. First seen on therecord.media Jump to article: therecord.media/spyware-kenya-cellebrite-activist
-
Palo Alto Networks’ Koi acquisition is all about keeping AI agents in check
The company says it will integrate Koi’s technology into its security offerings to improve visibility into AI-driven activity on workplace devices. First seen on cyberscoop.com Jump to article: cyberscoop.com/palo-alto-networks-acquires-koi-agentic-ai-security/
-
Data-only extortion grows as ransomware gangs seek better profits
Businesses should prioritize securing one type of technology in particular, the security firm Arctic Wolf said in a new report. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ransomware-extortion-bec-arctic-wolf/812321/
-
Ahead of the Curve: Hickman County School District’s Proactive Approach to Student Safety
How Cloud Monitor provides long-term value and consistent student protection in Google Workspace In Centerville, Tennessee, Hickman County School District serves approximately 2,500 students across nine schools with a small but highly capable technology team. Leading that effort is Brad Gilbert, Director of Technology, a forward-thinking IT leader who has long recognized that student safety…

