
Reality Defender partners with Orange Business to embed deep‑fake detection
U.S. AI‑security firm Reality Defender has signed a deal to integrate its multimodal deep‑fake detection technology into Orange Business, the enterprise arm of French telecom giant Orange. The solution will protect Orange’s video‑conferencing, contact‑center and voice‑telephony services through real‑time, API‑driven analysis of audio, video, images and documents.

Open‑source AI pentesting tools are reaching production‑grade performance, with BugTrace‑AI, Shannon, and the Cybersecurity AI Framework (CAI) each demonstrating distinct strengths in a lab test. BugTrace‑AI acts as a low‑noise reconnaissance assistant, flagging likely flaws without launching exploits. Shannon takes a more aggressive stance, automatically exploiting and documenting high‑risk vulnerabilities. CAI serves as a modular “Lego‑set” that lets teams stitch together LLMs and existing security utilities to create custom agents for broader attack surfaces. All three deliver meaningful results for a few dollars in API tokens, though they still require human validation.
Mandiant Google’s shiny hunters scattered lapsus okta internal sso phishing blog. Imagine trying to parse that sentence in twenty years ago. Mandiant’s acquisition Google used their shiny hunters to scatter the Lapsus Okta internal sso phishing blog.

The NSA released Phase One and Phase Two of its Zero Trust Implementation Guidelines, outlining 36 and 41 activities respectively to achieve 30 and 34 distinct capabilities. The guidance builds on earlier Primer and Discovery Phase documents and aligns with...
Port scanners ranked after 15+ years: Nmap → depth Naabu → simplicity RustScan → speed Pro tip: naabu -nmap-cli gives you best of both 🔗 https://t.co/8qHOyCzgAg | https://t.co/LFDCFb3Rgg | https://t.co/d56KN90GG9 https://t.co/WGqy7g65sd

Pompelmi is an open‑source toolkit that adds inline malware scanning to Node.js file‑upload handlers. It inspects files in memory, applying configurable policies on extensions, size, MIME types, and archive contents before any data reaches storage. The library offers pluggable scanning...

Crypto theft surged to $370.3 million in January 2026, a near‑four‑fold rise from a year earlier, according to security firm CertiK. A single phishing scam accounted for $284 million of the loss, while phishing overall stole $311.3 million. The month’s biggest individual hacks...

Entrust CIO Rishi Kaushal explains how security leaders should brief corporate boards on cyber risk, linking cryptography, certificates, and authentication to tangible business outcomes such as revenue loss, outages, fraud, and regulatory exposure. He demystifies the digital‑trust layer, arguing that...

Digital finance’s rapid expansion has amplified convenience while exposing users to sophisticated online scams. Fraudsters now deploy phishing, fake investment sites, and cloned e‑commerce stores that closely resemble legitimate brands. Verifying a website before any financial transaction—checking domain age, security...

Researchers uncovered a supply‑chain breach of the Open VSX Registry where a legitimate developer’s credentials were hijacked to publish malicious updates of four popular extensions. The poisoned versions, released on Jan 30 2026, embedded the GlassWorm loader and were downloaded over 22,000...

The Cloud Security Alliance reports that AI‑generated identities are being treated like traditional non‑human accounts, exposing them to the same IAM weaknesses such as credential sprawl and unclear ownership. AI systems create and retire identities at unprecedented speed, overwhelming legacy...

In this episode, Alex Gaynor and Paul Kehrer discuss the Python cryptography library’s decision to move away from OpenSSL as its primary backend, citing long‑standing maintenance headaches and architectural constraints. They explain the technical challenges they faced with OpenSSL’s API...

The UK’s push to curb illegal deep‑fake content on X exposed a broader vulnerability: dependence on US‑based platforms for national‑security enforcement. Recent clashes with Elon Musk and a fine against Cloudflare illustrate how American firms can resist or complicate European...

CrossCurve, a cross‑chain bridge protocol, confirmed a security breach that resulted in roughly $3 million being stolen across several blockchain networks. The exploit targeted a smart‑contract vulnerability that allowed attackers to spoof cross‑chain messages and unlock tokens without proper validation. CrossCurve...

Enterprises are increasingly relying on automated rotation systems to protect cloud secrets tied to Non‑Human Identities (NHIs). By continuously updating credentials, these solutions shrink the window of exposure for machine‑identity attacks, a threat that 68% of organizations have already faced....

Non‑human identities (machine identities) now account for roughly 68% of IT security incidents, making their management a top priority for organizations undergoing digital transformation. A lifecycle‑focused NHI management platform offers discovery, classification, monitoring, and remediation, surpassing point solutions like secret...

Non‑Human Identities (NHIs), also called machine identities, are becoming essential for securing cloud‑based environments as organizations scale. Effective NHI management couples encrypted secrets with granular permissions, providing a passport‑visa model for automated services. Integrating Agentic AI enables autonomous secret rotation,...
The article explains that non‑human identities (NHIs)—machine credentials such as passwords, tokens and keys—are critical for securing cloud‑native environments. It argues that comprehensive NHI management platforms provide visibility, automated secret rotation, and threat detection across the identity lifecycle, delivering cost...

A recent security study uncovered that Android AI applications have collectively leaked nearly 730 terabytes of user data, alongside hard‑coded secrets that expose cloud infrastructure and payment systems. The research examined dozens of popular AI‑driven apps on Google Play, finding API...
given that gpt-4 (June 2023) had function calling and tried to escape its own VM by hacking it i'd guess that's when something like clawdbot would've been possible to release by the labs

Researchers at TU Wien and Princeton introduced Alba, a Pay2Chain bridge that leverages off‑chain payment channels to trigger conditional payments on target blockchains. Unlike traditional light‑client or zk‑based bridges, Alba avoids costly on‑chain inclusion proofs, cutting communication overhead and on‑chain...
Didier Stevens published a concise January roundup highlighting two Python tool updates—zipdump.py 0.0.33 and hash.py 0.0.14—and three SANS Internet Storm Center diary entries covering a basic geography quiz, the release of Wireshark 4.6.3, and YARA‑X 1.11.0’s new hash function warnings....
NetBird is a German open‑source zero‑trust networking platform that uses WireGuard to create a peer‑to‑peer overlay, positioning itself as a Tailscale‑style alternative to legacy VPNs. It delivers instant deployment, SSO/MFA integration, dynamic posture checks, and centralized policy management across Linux,...
Global Trustnet announced enhancements to its client intake and internal case review frameworks, emphasizing security, verification discipline, and structured governance. The new standardized onboarding workflow aims to improve data accuracy, traceability, and consistency as digital‑asset trading volumes rise. Parallel upgrades...

Ondas Inc.’s Optimus drone, built by American Robotics, has earned Blue List status from the Defense Contract Management Agency, placing it on the Department of War’s approved UAS directory. The designation confirms compliance with stringent cybersecurity, supply‑chain and operational standards,...
Yes, this is giving "interaction with [malicious] external smart contract" vibes a la The DAO 😬

Blockchain penetration testing simulates real‑world attacks on decentralized ledgers to expose flaws in smart contracts, consensus mechanisms, nodes, and wallets before they can be exploited. Recent incidents such as the $2.17 billion crypto thefts in 2025 and the 17‑hour Solana outage...

AI‑powered penetration testing combines machine‑learning models, autonomous agents, and traditional security tools to simulate real‑world attacks faster and more comprehensively than manual testing. Recent research shows AI agents achieved 82 % precision and outperformed nine out of ten human testers in...
IoT penetration testing evaluates the entire IoT ecosystem—from hardware and firmware to cloud services—by simulating multi‑stage attacks. The practice uncovered critical flaws in high‑profile incidents, such as Southern Water’s water‑monitoring hack and an NHS Trust breach, both caused by outdated...
I helped design and implement the secure tip line at the New York Times in 2016. Who can access what, when, where, and how is just as important as the specific apps, tools, and settings that are used. https://t.co/bXZ9qmWkqy
RINA Accountants & Advisors, a U.S. accounting firm, has agreed to establish a $400,000 settlement fund to resolve a class‑action lawsuit stemming from a 2022 data breach. The breach exposed client‑sensitive information, prompting legal action from affected parties. The settlement...
The Minimal project publishes a suite of open‑source, production‑ready container images built daily with Chainguard’s apko and Wolfi packages. By including only essential components, the images achieve near‑zero CVEs and are typically patched within 24‑48 hours of disclosure. Each image is...
Comcast has reached a $117.5 million settlement to resolve 24 class‑action lawsuits stemming from the 2023 Citrix Bleed data breach, which potentially exposed personal information of more than 30 million current and former customers. A federal judge in the Eastern District...
The anti‑ICE activist platform StopICE suffered a massive data breach, exposing personal details of over 100,000 registered users. Hackers accessed names, login credentials, phone numbers and precise GPS locations, then transmitted the information to the FBI, ICE and Homeland Security...

Step Finance, a Solana‑based DeFi portfolio tracker, disclosed a treasury breach that saw 261,854 SOL—about $27 million—unstaked and transferred. The hack triggered an over‑80% plunge in its governance token STEP within 24 hours. The platform has engaged cybersecurity firms but has not...

New court record from the FBI details the state of the devices seized from Washington Post reporter Hannah Natanson: phone was on w/Lockdown Mode; personal laptop was off; work laptop was on w/Touch ID; several Signal chats used disappearing messages....

Ledger announced new BIP32 derivation rules that require hardened prefixes for its Bitcoin, Dogecoin and Bitcoin Cash applications. The change isolates each app’s key subtree, preventing cross‑application key exposure even if a single app is compromised. Enforcement begins on February 26...

Journalists across the US and Europe face escalating legal attacks, from arrests to super‑injunctions, aimed at silencing critical reporting. A new EU SLAPP report shows 167 lawsuits filed in 2024, with Italy, Germany and Serbia leading, and two‑thirds initiated by...
Alleged crypto theft by son of government contractor raises a critical question: Is the U.S. ready for a strategic reserve? @kkirkbos says we may need a Bitcoin Fort Knox 👇 https://t.co/tti17Z1eKJ

PropertyGPT leverages large language models to automatically generate formal verification properties for smart contracts, using a retrieval‑augmented pipeline that pulls similar human‑written properties from a vector database. The system iteratively refines generated properties with compilation and static‑analysis feedback to ensure...
Bangladesh Election Commission’s online accreditation portal inadvertently displayed the personal data of roughly 14,000 journalists. The leak included National ID numbers, mobile numbers, and full application documents submitted for election accreditation and vehicle stickers. The flaw surfaced on Saturday afternoon...

Security researcher Jatin Banga uncovered that Instagram’s private‑profile pages sometimes embed direct CDN links to private photos in the HTML response, exposing them to unauthenticated visitors. His testing showed about 28% of the private accounts he examined leaked such links....

Agentic AI systems—software that can make decisions and act independently—are increasingly embedded in consumer devices, enterprise tools, and critical infrastructure. Their growing autonomy promises efficiency gains but also introduces privacy breaches, security vulnerabilities, and ethical dilemmas when actions exceed human...

Researchers from Georgia Tech and collaborators introduced a quantum‑memory‑free Quantum Secure Direct Communication (QSDC) protocol that relies on universal hashing and privacy amplification of coded sequences. The information‑theoretic analysis proves security against collective attacks without requiring quantum storage or complex...

Mandiant reports a surge in ShinyHunters‑style vishing campaigns that harvest SSO credentials and MFA codes to infiltrate SaaS environments. The attacks, attributed to UNC6661, UNC6671, and UNC6240, impersonate IT staff and use fake credential‑harvesting sites to enroll attackers’ devices for...

A confidential informant told the FBI in 2017 that Jeffrey Epstein hired a personal hacker, described as an Italian from Calabria with expertise in iOS, BlackBerry and Firefox vulnerabilities. The informant claimed the hacker created zero‑day exploits and sold them...
With autonomous agents who have access to the command line, like Claude code and Open Claw, you don't only have to worry about prompt injection that executes commands and operations, but you also have to worry about prompt injection that...

Moltbook is a Reddit‑style forum populated entirely by AI agents, with over 35,000 bots generating content without human input. The platform runs on OpenClaw, an open‑source harness that lets these models control a host computer’s messengers, email, and web browsers....
Berlin‑based startup Amutable, founded by former Red Hat and Microsoft engineers including systemd creator Lennart Poettering, announced a mission to bring determinism and verifiable integrity to Linux systems. The company plans to replace heuristic security with cryptographic verification of boot processes and...

Researchers at NDSS 2025 introduced AutoAR, a system that automatically recognizes anti‑reentrancy patterns in Ethereum smart contracts. By leveraging a novel RentPDG graph representation and a graph auto‑encoder with clustering, AutoAR can detect twelve common protective patterns with 89% accuracy....

Regtech firm Prove warns that the Super Bowl’s evolution into a months‑long betting marathon is amplifying fraud risks for gaming platforms. The surge in sign‑ups, logins and transactions on game day attracts credential‑theft attacks, with multi‑factor authentication being evaded in...