
AI drives crypto hacks toward near‑zero cost, Ledger CTO warns
Ledger’s chief technology officer says artificial intelligence is slashing the cost and speed of cryptocurrency attacks, turning what once required high skill into a low‑cost operation. In the past year, crypto breaches have siphoned roughly $1.4 billion, highlighted by the $285 million Drift hack and the $25 million Resolv exploit.
Also developing:
By the numbers: Noma Security raises $132M Series B
Huawei is participating in 16 Horizon Europe research projects despite being labeled a high‑risk supplier by the European Commission. Fifteen of the contracts were signed before the 2023 ban, while a sixth‑year project was deemed outside the restriction scope. The projects span cloud computing, 5G/6G telecom, AI and data‑privacy research, involving universities and firms across nine EU countries and granting Huawei joint IP ownership. The EU is simultaneously tightening its Cybersecurity Act and limiting Chinese firms in public contracts.

Federal prosecutors charged two Connecticut men with a $3 million fraud scheme that exploited knowledge‑based authentication on FanDuel, DraftKings and BetMGM. The perpetrators harvested personal data from roughly 3,000 victims using services such as TruthFinder and BeenVerified to open fraudulent gambling...

AWS Security Hub Extended introduces a bundled plan that lets enterprises procure, deploy, and manage a full‑stack security suite covering endpoints, identity, email, network, data, browsers, cloud, AI, and security operations from a single console. The offering expands protection beyond...
During Prime Minister Narendra Modi’s state visit, India and Israel signed multiple agreements to deepen cooperation in technology and cybersecurity. The pacts create a joint innovation fund, enable real‑time cyber‑threat intelligence sharing, and launch collaborative projects in artificial intelligence, quantum...
"Prompt injection attacks in the wild" https://t.co/wXEOcvcpdX <- if you have coffee in your hand, set it down now. Snort attack likely :-)

ManoMano, a leading European DIY e‑commerce platform, disclosed a data breach affecting roughly 38 million customers after hackers compromised a Tunis‑based third‑party customer support provider. The breach exposed personal details such as names, email addresses, phone numbers, and support ticket communications,...

NIST’s Open Security Controls Assessment Language (OSCAL) gives state and local governments a machine‑readable alternative to spreadsheets, Word files, and PDFs for security‑control documentation. By encoding controls, implementations, and assessment results in JSON, XML or YAML, agencies can automate validation,...

Accounting firms are facing a surge in data‑exfiltration attacks, where cybercriminals silently steal sensitive financial records to extort victims or sell the data. Traditional detection tools often miss covert channels, encrypted uploads, and traffic mimicry, leaving firms vulnerable. The average...
Insights On Preventing Fraud and Identity Theft in The AI Era by @ChuckDBrooks https://t.co/Z1DoLfU6rP #CyberSecurity #identitytheft

Juniper Networks disclosed a critical CVE‑2026‑21902 vulnerability in the On‑Box Anomaly Detection framework of its Junos OS Evolved running on PTX Series routers. The flaw lets an unauthenticated attacker reach a root‑level service over an external port, enabling full device...
CIOs and CISOs face AI-driven attacks that outpace traditional defenses. The answer: automated AI security, zero-trust frameworks, centralized identity, and regular training. Fighting fire with fire is how we protect organizations. https://t.co/HSIY5JYyPE

Olympique de Marseille confirmed it was the target of an attempted cyberattack after a threat actor claimed to have breached its servers and leaked a sample of a database containing staff and supporter information. The club said its technical teams...

Aeternum, a newly discovered botnet loader, has moved its command‑and‑control (C2) infrastructure onto the Polygon blockchain, using smart contracts to issue instructions. By writing commands as immutable blockchain transactions, the botnet eliminates the traditional servers and domains that law‑enforcement typically...

(Sponsor) If pentest reporting takes weeks, remediation stalls. ⏱️ PlexTrac replaces spreadsheet tracking with a findings-to-fix workflow and exec-ready reporting. See Demo: https://t.co/NuE4kH3FXK https://t.co/DbP8Xmotdx
A Greek court sentenced four individuals, including two Israelis, to prison for operating the illegal Predator spyware that targeted politicians, journalists and business executives. The defendants—linked to the Israeli firm Intellexa—were convicted of breaching telephone confidentiality and illegal data access....

Cisco Talos has identified a new threat cluster, UAT-10027, delivering a novel backdoor called Dohdoor that leverages DNS‑over‑HTTPS for command‑and‑control. The malware uses DLL side‑loading through legitimate Windows executables and drops a Cobalt Strike beacon that unhooks NTDLL calls to evade...
Europe faces its most contested security decade since the Cold War, with the digital backbone—networks, data infrastructures and connectivity—now the primary frontline. Recent blackouts in Portugal and Spain illustrate how digital failures become national security events, while adversaries target subsea...

Contrast Security’s integration with ServiceNow Application Vulnerability Response (AVR) streams verified, runtime‑backed vulnerabilities directly into ServiceNow tickets, uniting detection and remediation workflows. The bidirectional sync supplies exploitability evidence, code location and environment context, eliminating manual validation steps. This enables security...

Forescout Technologies and Netskope announced a strategic integration that unifies Zero Trust security across managed and unmanaged devices, including IT, OT, IoT, and IoMT assets. The solution merges Forescout’s real‑time device intelligence with Netskope’s AI‑driven cloud security to enforce consistent...

Chainalysis reports ransomware victims paid only 28% of demanded sums in 2025, the lowest rate on record despite a 50% surge in attacks. Total on‑chain ransomware payments are near $820 million and could exceed $900 million as attribution improves. While the number...

Versa has introduced the world’s first sovereign SASE‑as‑a‑Service, extending its earlier sovereign SASE model to a fully managed, in‑country offering. The service provides local control, management, and storage to satisfy data‑residency regulations such as the U.S. CLOUD Act. Versa reports...

Black Duck's 2026 Open Source Security and Risk Analysis report finds open source vulnerabilities in commercial codebases have more than doubled year‑on‑year. The average application now contains 581 vulnerabilities, a 107% increase, with 98% of codebases using open source components....

Agent Tesla’s newest campaign leverages a multi‑stage, fileless delivery chain that begins with a phishing email containing a RAR‑packed JSE loader. The loader fetches an AES‑encrypted PowerShell script, which executes entirely in memory and uses process hollowing to inject malicious...

Mean Time to Respond (MTTR) is a critical KPI linking security speed to business risk. The article explains that poor threat visibility—stale data, alert overload, fragmented tools—drives MTTR higher, while high‑quality, execution‑verified threat intelligence can compress response times. ANY.RUN’s sandbox‑derived...

Passware Kit Mobile 2026 v2 introduces a proprietary method to decrypt Samsung Galaxy S20 and S21 devices powered by Exynos 990 and 2100 chipsets, supporting security patches up to April 2025. The update also adds full‑disk encryption support for Unisoc‑based phones and accelerates password...

Revolut’s latest report shows encrypted messaging apps now dominate Authorised Push Payment (APP) fraud, with Telegram accounting for over 58% of job‑related scams. The platform’s share of total APP fraud rose more than 30% year‑over‑year, overtaking WhatsApp in several categories....

Google allegedly found "severe security issues" with Pixel 4 series, blocking Google Wallet use ✅ Details - https://t.co/lnyNOXovE7 https://t.co/gJTaZoudLA

Microsoft has broadened its first‑sign‑in restore experience, part of Windows Backup for Organizations, to include hybrid‑managed devices, multi‑user setups, and Windows 365 Cloud PCs. The feature lets users who sign in with a Microsoft Entra ID account restore personal settings and...

Cybercriminals are increasingly targeting high‑net‑worth individuals, exploiting the wealth of personal and financial data stored online. The FBI reports $16.6 billion lost to internet‑enabled crimes in 2024, highlighting the scale of the threat. Family offices, positioned as trusted advisors, can extend...

Almost a third of UK businesses experienced a remote‑working related cyber breach in the past year, with phishing responsible for 85% of incidents. The Cyber Security Breaches Survey 2025 shows larger firms are most affected, reporting breach rates of 67%...

Enterprise adoption of generative AI tools is soaring, with nearly one in twenty companies regularly using them and internal data uploads to public models increasing thirty‑fold year‑on‑year. Employees often paste confidential contracts or credentials into tools like ChatGPT, unintentionally turning...

Meta’s 2021 global outage highlighted how a coordinated, cross‑functional incident response team can limit downtime and reputational harm. The article uses that case to illustrate the challenges smaller firms face when structuring such teams. It outlines essential roles—Incident Commander, Technical...

Security firm Truffle Security revealed that publicly exposed Google API keys can be upgraded to full‑access Gemini credentials, enabling data exfiltration from any organization using them. A November scan uncovered 2,863 such keys, affecting major banks, security vendors, and even...

Ribbon Communications announced a strategic collaboration with Amazon Web Services to deliver a cloud‑native, secure voice communications suite on AWS Marketplace. The offering bundles Ribbon’s Session Border Controller, policy routing engine, and centralized management platform as containerized services optimized for...

ResidentBat is a custom Android spyware implant deployed by the Belarusian KGB to turn seized smartphones into persistent surveillance tools. The malware is sideloaded via Android Debug Bridge after physical access, granting extensive data collection and remote‑wipe capabilities. First disclosed...

The EU Cyber Resilience Act (CRA) is set to overhaul security requirements for the global rail supply chain, targeting connected products and software. Nomad Digital hosted a webinar with experts from Alstom, Durham University and its own security team to...

Quantum‑era risk is no longer a distant theory; adversaries are already harvesting encrypted data to decrypt later when quantum computers mature. This "harvest‑now, decrypt‑later" model threatens long‑life information across government, finance, healthcare and private‑sector IP. CEOs must shift focus from...
To meet the stringent data‑privacy demands of enterprise insurance, the company abandoned the traditional multi‑tenant SaaS model and built a single‑tenant AI platform where each client receives an isolated database and compute environment. By eliminating middleware and moving business logic...

TrendAI, the enterprise arm of Trend Micro, released patches for eight vulnerabilities in its Apex One endpoint security suite. Two critical CVEs (2025‑71210 and 2025‑71211) could let remote attackers upload malicious code and execute commands via the management console, while six high‑severity...

Payments platform Ecommpay released a free whitepaper titled “E‑commerce fraud defence: A quick guide for merchants.” The guide details nine top fraud threats, including friendly fraud, refund fraud, account takeover and AI‑powered deepfakes, and offers actionable mitigation tactics. Ecommpay claims...
The UK’s £9.4B loss to deepfake-enabled fraud is not a headline, it’s a warning. AI-powered scams are scaling faster than legacy identity and compliance systems can adapt. If the US doesn’t harden digital onboarding, verification, and cross-sector fraud defenses now, the bill...

Samsung SDS released its 2026 cybersecurity outlook, highlighting five priority threats: AI‑driven attacks, ransomware, cloud misconfigurations, phishing/account takeovers, and data security gaps. The report, based on 667 Korean security professionals, warns that generative AI and autonomous agents will intensify phishing,...

Wireshark 4.6.4 releases address two critical dissector vulnerabilities—a crash in the HTTP3 dissector and an infinite loop in the MEGACO dissector. The update also resolves a plugin compatibility problem introduced by an API/ABI change in version 4.6.1, restoring functionality for...

The IRS Criminal Investigation report shows tax‑related financial crimes hit $4.5 billion in FY 2025, a 111.8 % jump from the prior year, signaling heightened risk this tax season. Cybercriminals are leveraging generative AI to produce hyper‑personalized phishing, deepfake voice and video scams,...

Intellicheck launched an enriched Desktop Application that lets organizations of any size stop identity theft and fraud instantly, without needing system integration. The solution works with existing scanners, incurs minimal cost, and stores transaction history securely in the cloud via...
The Ministry of Housing, Communities and Local Government (MHCLG) has released a Local Government Reorganisation Digital and Cyber Playbook to help councils navigate digital, data and cybersecurity challenges during structural changes. Developed with input from local and central government, sector...

LM Studio and Tailscale have launched LM Link, a feature that lets developers access remote GPU rigs as if they were locally attached. The solution replaces public APIs and SSH tunnels with a private, WireGuard‑encrypted tunnel built on Tailscale’s userspace tsnet...
_(36).jpg)
From 4 March 2026 the Australian government will enforce minimum security standards for all smart devices sold in the market, shifting compliance from voluntary guidance to mandatory requirement. The IoT Alliance Australia (IoTAA) is spearheading a voluntary Security Labelling Scheme, slated to...
FedRAMP, the federal cloud security authorization program, is becoming a critical benchmark for eDiscovery solutions as U.S. courts anticipate over 400,000 lawsuits this year. Legal teams must verify that their cloud‑based discovery tools meet FedRAMP standards to prevent security breaches,...
Been reading the @Persona_IDV incident write up as a bunch of people have asked “will the data be going into @haveibeenpwned?” Easy answer: no, because there’s no data: https://t.co/4oxtwYBxj2