
AI drives crypto hacks toward near‑zero cost, Ledger CTO warns
Ledger’s chief technology officer says artificial intelligence is slashing the cost and speed of cryptocurrency attacks, turning what once required high skill into a low‑cost operation. In the past year, crypto breaches have siphoned roughly $1.4 billion, highlighted by the $285 million Drift hack and the $25 million Resolv exploit.
Also developing:
By the numbers: Noma Security raises $132M Series B
UpGuard, the Hobart‑based cybersecurity firm, closed a $75 million Series C round led by Springcoast Capital, with participation from August Capital, Square Peg and Pelion Venture Partners. The capital will accelerate development of its AI‑powered cyber‑risk posture management (CRPM) platform, expand go‑to‑market operations, and fund strategic acquisitions. UpGuard now serves customers in 90 countries and maintains a presence in 14 markets, positioning it as a mid‑market leader in automated risk assessment. The raise underscores growing investor confidence in AI‑driven security solutions.
Keeper Security announced integration of the Kyber key encapsulation mechanism across its platform to deliver quantum‑resistant identity protection. The hybrid approach layers lattice‑based Kyber on existing elliptic‑curve primitives, securing backend APIs, Keeper Commander, and upcoming mobile apps. This rollout aligns...

Singapore is bolstering its cybersecurity ecosystem through a multi‑pronged strategy that includes large‑scale cyber‑drills, senior leadership training, and youth programmes to grow a skilled talent pipeline. The Cyber Security Agency and the Ministry of Digital Development coordinate rapid response to...

UFP Technologies, a $600 million medical‑device maker, disclosed a cyberattack detected on February 14 that compromised several IT systems. The company isolated the breach, removed the threat and engaged external advisors, but confirmed that data was stolen and some functions, such as...
One of the big advantage we have here at CXO Advisor is threat intel. We talk to security leaders across industries every week and the same concerns surface independently. Interestingly, it's not the complex theoretical threats, it's the basics: AI...

Cisco Duo unveiled Delegated Access, a feature that lets Managed Service Provider (MSP) technicians authenticate to client applications using a single Duo user account. The solution centralizes MFA policy, logs, and monitoring on the parent account while granting access to...
Clalit Health Services, Israel’s largest HMO, announced it is probing a suspected cyberattack after the Iranian‑linked group Handala claimed to have breached its systems. The hackers released thousands of documents containing patients' personal and medical information on public platforms. Clalit...

The Financial Action Task Force (FATF) warned that cyber‑enabled fraud is now a top money‑laundering threat in 90% of the jurisdictions it assessed. Singapore alone saw a 61% jump in scam cases over the past two years, while the United...

U.S. Cybersecurity and Infrastructure Security Agency (CISA) is reportedly operating at roughly 38% of its pre‑Trump staffing levels, after losing about one‑third of its workforce during the administration’s first year. The cuts have crippled core programs, including the counter‑ransomware initiative...

The Pentagon released an OT‑specific zero‑trust roadmap, the “fan chart,” outlining 84 baseline and 21 advanced activities to protect military operational technology. The guidance emphasizes asset visibility, risk‑operations centers, network segmentation, passive monitoring, and AI‑driven automation. Agencies are urged to...

ProGlove runs a SaaS platform on AWS using an account-per-tenant architecture, currently operating about 6,000 tenant accounts—half active—with over 120,000 service instances and a million Lambda functions. The approach gives each customer isolated compute, storage, and IAM boundaries, simplifying security,...

Choosing a VPN today means sifting through countless features, but the author argues that multi‑hop capability is the single most critical attribute. Multi‑hop routes traffic through multiple servers, preventing any one node from seeing both the user’s IP and the...

The PCI Security Standards Council published its inaugural 2025 annual report, the first since its 2006 founding, outlining a surge in payment‑system threats and the council’s expanding role. The report highlights accelerated attacks leveraging AI, ransomware incidents such as BridgePay,...

PXL Vision, Idiap Research Institute and Innosuisse have released a deepfake detector integrated into the PXL Ident platform. The tool, developed under the ROSALIND project, targets face‑swapping, reenactment and fully synthetic identities in ID documents. A companion Idiap paper benchmarks...
Space ISAC has announced a new quantum initiative, launching its first Quantum Community of Interest (COI) meeting on Feb. 25, co‑hosted with MITRE. The COI will explore how quantum technologies can strengthen security and resilience across space systems, which underpin critical...
UC Irvine computer scientists have uncovered a critical flaw in camera‑based autonomous target‑tracking drones, dubbed the FlyTrap attack. By attaching a specially designed visual pattern to an ordinary umbrella, attackers can trick drones into believing the target is receding, causing...

Resilience’s 2025 Cyber Risk Report reveals a decisive shift from ransomware‑focused disruption to extortion attacks that rely on stolen data. Data‑theft‑only extortion claims rose to 65 % of incidents in the second half of last year, turning cyber incidents into multi‑year...

Caspia Technologies announced the general availability of CODAx V2026.1, an AI‑enhanced RTL security analyzer that checks over 150 insecure coding practices against more than 1,000 hardware vulnerability references. The tool can scan half‑million lines of RTL in under an hour,...

Wynn Resorts disclosed that an unauthorized party accessed employee data after the casino‑hospitality firm appeared on ShinyHunters' extortion leak site. The group claims to have stolen more than 800,000 records, including Social Security numbers, from Wynn's Oracle PeopleSoft HR platform....

The United States and the European Union are negotiating the Enhanced Border Security Partnership (EBSP), which would grant visa‑free travel to EU citizens in exchange for access to European biometric databases. The latest draft does not explicitly prohibit the use...

The China‑aligned threat group UnsolicitedBooker has begun targeting telecommunications providers in Kyrgyzstan and Tajikistan. The campaign employs two custom backdoors, LuciDoor and MarsSnake, delivered through phishing emails that embed malicious Office macros and loaders such as LuciLoad. These implants can...

Georgia Tech researchers have uncovered critical weaknesses in the global threat‑intelligence supply chain, highlighting how inconsistent data quality and limited sharing impede rapid response. Their study, presented at the NDSS Symposium, found that while 67% of vendors sandbox suspicious binaries,...

PowerSchool and Chicago Public Schools have agreed to a $17.25 million settlement to resolve a class‑action lawsuit accusing the ed‑tech firm of covertly recording student communications. The fund will be divided among more than 10 million potential class members and obligates PowerSchool...
German startup Solarsecure Tech introduced the SolarSecure Vision gateway, a hardware‑agnostic device installed at the meter connection point that intercepts and validates inverter‑to‑cloud communications. The gateway blocks unverified kill‑switch commands while allowing authenticated signals, including mandatory grid‑operator directives, to pass via a...
New threat intel shows a financially motivated threat actor using commercial generative AI tools to compromise more than 600 FortiGate devices across 55+ countries by exploiting exposed management ports and weak credentials, not zero-day vulnerabilities. AI is amplifying basic security...

Russia‑linked threat group UAC‑0550, also known as DaVinci Group, launched a sophisticated social‑engineering campaign against a European financial institution that supports Ukraine. The attackers sent legal‑themed phishing emails from a counterfeit Ukrainian judicial domain, directing victims to download a ZIP...

Praetorian unveiled its AI‑driven CVE Researcher pipeline, automating the end‑to‑end analysis of new vulnerabilities from CISA’s KEV catalog. The system ingests a CVE ID and outputs research reports, technology reconnaissance, asset correlation, and validated Nuclei detection templates within minutes. Reported...

The NDSS 2025 paper introduces Borrowed Time, a countermeasure that protects integrated circuits from emerging static side‑channel attacks such as static power analysis, laser logic state imaging, and impedance analysis. By continuously monitoring a device and securely erasing key‑dependent data...

News publishers are increasingly replacing passwords with email‑based magic links or one‑time passcodes. Small‑scale outlets using platforms like Ghost, Substack, and Beehiiv cite reduced security overhead and faster onboarding as primary benefits. Industry voices argue that magic links combat password...
This interview freaked me out. The security "AI"pocalypse is here. The founders of https://t.co/yNcyjm5j7B, Arbaaz Mahmood and Matt Busigin, talk me through why security professionals are freaked out by AI and trying to prepare the world's businesses as fast as they...
RT High-level policies aren't enough. It's time for audits, training, DSPM, and privacy-by-design in AI workflows. If privacy isn't built into how data moves, you're hoping - not leading. #DataGovernance #AI #CIO @Star_CIO https://t.co/Naq82FuMWZ

Scattered LAPSUS$ Hunters (SLH) is paying women $500 to $1,000 per call to conduct voice‑phishing attacks against IT help desks. The group supplies pre‑written scripts and leverages legitimate proxy services and tunneling tools to evade detection. These vishing campaigns aim...
I've had a few queries on this one (which isn't unusual for a large incident), mostly to the effect of "but I've never bought tyres in Canada". So, firstly, this isn't a tyre retailer, there are a heap of other...

I love this directness: “in order to be useful Galaxy AI needs data” which is why @SamsungMobile created “keep” to make sure the user’s info is kept safe https://t.co/EK7ZvUFZTr

Netskope introduced NewEdge AI Fast Path, a suite of network‑optimizing capabilities that route AI traffic through low‑latency, secure paths across public, private and neo‑cloud environments. The service cuts time‑to‑first‑token for conversational models, speeds up multi‑prompt agentic workflows, and enhances retrieval‑augmented...
"Using the built-in update mechanism the actor downgraded a vSmart controller to a version with...known local privilege escalation vulnerabilities.... Achieving...persistence as the user ‘root’, the actor [then] restored..controller to [previous] version" https://t.co/PcdPHtzgCR
Most founders optimize for the first milestone: launch fast, check the box, move on. @DrataHQ optimized for what comes after. “When you need more than SOC 2 - which happens when you’re successful - we’re right there with you.” Feature vs. platform thinking....

OpenClaw, an AI‑driven automation framework with a modular skill marketplace, has sparked intense discussion across developer forums and security‑research channels. Critical flaws—including CVE‑2026‑25253, which enables one‑click remote code execution, and a lack of skill sandboxing—expose users to credential theft and...
Cyberattacks Overtake Inflation and Recession Concerns as the #1 Threat to SMBs in 2026, New VikingCloud Research Finds https://t.co/O8FsxVZLOe
Nomma Zarubina, who once drunk-texted an FBI agent saying "Catch me baby. So many spies," is heading to U.S. prison for spying for Russian intelligence. https://t.co/UnZ15LNWq6
Telehealth’s rapid expansion has spotlighted privacy and security anxieties among clinicians, largely because these topics were never part of standard medical training. Fear‑driven HIPAA instruction and vague regulatory language amplify uncertainty, while the shift to digital platforms adds perceived technical...
Cyber resilience goes beyond stopping attacks. It’s keeping the organization running when systems fail, and data is uncertain. Prevention helps, but resilience ensures the business keeps moving. https://t.co/iRvh9PxW7z

SentinelOne launched the Singularity Identity portfolio to protect non‑human identities such as AI agents, service accounts, APIs, and workloads. The solution moves beyond static authentication, requiring continuous validation of intent across endpoints, browsers, and AI workflows. By tying identity data...

The article outlines five common triage failures that inflate business risk, from decisions made without execution evidence to manual, error‑prone processes. It shows how interactive sandboxes—exemplified by ANY.RUN—provide rapid execution evidence, enabling analysts to reach evidence‑backed verdicts within seconds. Reported...

Veza announced the launch of Veza Access Agents, AI‑driven tools that automate identity and access governance for both human users and autonomous AI agents. The agents, built on AWS Bedrock, provide natural‑language interfaces for risk queries, permission visualizations, and AI‑assisted...

CloudCasa has upgraded its backup and recovery platform to better serve Red Hat OpenShift deployments across core, edge, and hybrid cloud environments. The update adds native SMB protocol support as a backup target, letting customers use existing SMB storage or operator‑deployed...

Researchers at StrongestLayer analyzed about 5,000 phishing emails that evaded secure email gateways between December 2025 and early 2026. They found that telephone‑oriented attack delivery (TOAD), which consists solely of a phone number, represented roughly 28 % of all bypasses and...

Cherry Bekaert announced a strategic alliance with Enkrypt AI, integrating the firm’s risk and compliance expertise with Enkrypt’s automated AI security platform. The partnership delivers real‑time guardrails, testing, validation, and continuous monitoring to help clients meet emerging standards such as...
South Korea is preparing amendments to its Network Act and Personal Information Protection Act after a wave of high‑profile data breaches in telecommunications, retail and finance. The revisions aim to tighten data protection, reinforce security governance, and boost the effectiveness...

UK law firms are increasingly targeted by cybercriminals, with 60% of attacks now stemming from credential compromise. Legacy on‑premise systems and fragmented security tools leave firms vulnerable, while modern SaaS platforms like OneAdvanced offer continuous patching, real‑time monitoring, and built‑in...