
Step Finance, a Solana‑based DeFi portfolio tracker, disclosed a treasury breach that saw 261,854 SOL—about $27 million—unstaked and transferred. The hack triggered an over‑80% plunge in its governance token STEP within 24 hours. The platform has engaged cybersecurity firms but has not revealed how the attacker gained access or whether user assets were affected. The incident underscores persistent security risks for DeFi projects operating on Solana.

Ledger announced new BIP32 derivation rules that require hardened prefixes for its Bitcoin, Dogecoin and Bitcoin Cash applications. The change isolates each app’s key subtree, preventing cross‑application key exposure even if a single app is compromised. Enforcement begins on February 26...

Journalists across the US and Europe face escalating legal attacks, from arrests to super‑injunctions, aimed at silencing critical reporting. A new EU SLAPP report shows 167 lawsuits filed in 2024, with Italy, Germany and Serbia leading, and two‑thirds initiated by...

PropertyGPT leverages large language models to automatically generate formal verification properties for smart contracts, using a retrieval‑augmented pipeline that pulls similar human‑written properties from a vector database. The system iteratively refines generated properties with compilation and static‑analysis feedback to ensure...
Bangladesh Election Commission’s online accreditation portal inadvertently displayed the personal data of roughly 14,000 journalists. The leak included National ID numbers, mobile numbers, and full application documents submitted for election accreditation and vehicle stickers. The flaw surfaced on Saturday afternoon...

Security researcher Jatin Banga uncovered that Instagram’s private‑profile pages sometimes embed direct CDN links to private photos in the HTML response, exposing them to unauthenticated visitors. His testing showed about 28% of the private accounts he examined leaked such links....

Agentic AI systems—software that can make decisions and act independently—are increasingly embedded in consumer devices, enterprise tools, and critical infrastructure. Their growing autonomy promises efficiency gains but also introduces privacy breaches, security vulnerabilities, and ethical dilemmas when actions exceed human...

Mandiant reports a surge in ShinyHunters‑style vishing campaigns that harvest SSO credentials and MFA codes to infiltrate SaaS environments. The attacks, attributed to UNC6661, UNC6671, and UNC6240, impersonate IT staff and use fake credential‑harvesting sites to enroll attackers’ devices for...

A confidential informant told the FBI in 2017 that Jeffrey Epstein hired a personal hacker, described as an Italian from Calabria with expertise in iOS, BlackBerry and Firefox vulnerabilities. The informant claimed the hacker created zero‑day exploits and sold them...

Moltbook is a Reddit‑style forum populated entirely by AI agents, with over 35,000 bots generating content without human input. The platform runs on OpenClaw, an open‑source harness that lets these models control a host computer’s messengers, email, and web browsers....
Berlin‑based startup Amutable, founded by former Red Hat and Microsoft engineers including systemd creator Lennart Poettering, announced a mission to bring determinism and verifiable integrity to Linux systems. The company plans to replace heuristic security with cryptographic verification of boot processes and...

Researchers at NDSS 2025 introduced AutoAR, a system that automatically recognizes anti‑reentrancy patterns in Ethereum smart contracts. By leveraging a novel RentPDG graph representation and a graph auto‑encoder with clustering, AutoAR can detect twelve common protective patterns with 89% accuracy....

Regtech firm Prove warns that the Super Bowl’s evolution into a months‑long betting marathon is amplifying fraud risks for gaming platforms. The surge in sign‑ups, logins and transactions on game day attracts credential‑theft attacks, with multi‑factor authentication being evaded in...

Security researchers uncovered roughly 175,000 Ollama AI servers worldwide that are publicly reachable because they are bound to all network interfaces instead of localhost. These misconfigured instances lack authentication, allowing attackers to perform "LLMjacking"—hijacking the models to generate spam, malware,...

Microsoft announced that NTLM authentication will be disabled by default in future Windows Server and client releases. The change follows a three‑phase transition—auditing tools in Windows 11 24H2 and Server 2025, introduction of IAKerb and a Local KDC in late 2026, and final...

Poland’s Computer Emergency Response Team confirmed that Russian state‑linked hackers infiltrated wind, solar and a heat‑and‑power plant by exploiting default passwords and the absence of multi‑factor authentication. The attackers deployed wiper malware that disabled monitoring systems at renewable sites, though...

Operation Switch Off, a joint effort by Europol, Eurojust and Interpol led by Italy’s Catania prosecutor and State Police, seized three industrial‑scale illegal IPTV services—IPTVItalia, migliorIPTV and DarkTV—across 14 countries. The crackdown dismantled servers in Romania and Africa, identified 31...

The NDSS 2025 paper tackles the lack of provable guarantees in machine‑unlearning by introducing a certification framework for (q, η)-learnability. It proposes Provably Unlearnable Examples (PUEs) that tighten certification bounds and resist simple weight‑recovery attacks. Experiments show PUEs cut certified learnability...

Labyrinth Chollima has split into three distinct North Korean hacking groups—Labyrinth Chollima, Golden Chollima, and Pressure Chollima—according to CrowdStrike. While Labyrinth Chollima continues espionage against defense, manufacturing and critical‑infrastructure firms, the new Golden and Pressure factions focus on cryptocurrency theft. Each group employs a unique...
Blue Cross Blue Shield of Montana disclosed a cyber incident that may have exposed the protected health information of up to 462,000 members through its third‑party vendor Conduent. The breach was discovered on July 1, 2025, investigated internally, and reported to the...

Lawmakers introduced a minibus package that adds $20 million to expand the Cybersecurity and Infrastructure Security Agency (CISA) and extends the Cybersecurity Information Sharing Act through September 30. Experts warn that the stop‑and‑go extensions erode confidence in real‑time threat reporting, creating...
Researchers at Zimperium’s zLabs have uncovered Arsink, an Android remote‑access trojan that masquerades as over 50 popular apps, including WhatsApp and TikTok. The campaign has infected roughly 45,000 devices in 143 countries, using Telegram, Discord and MediaFire links to distribute...

Nvidia has released a security update addressing four high‑severity GPU driver vulnerabilities that affect Windows, Linux, virtual GPU, and cloud‑gaming platforms. The flaws—CVE‑2025‑33217 through CVE‑2025‑33220—are use‑after‑free and integer‑overflow bugs with a CVSS rating of 7.8, enabling arbitrary code execution and...
In January 2026, ESET’s Tony Anscombe highlighted four major security incidents: Nike faced a ransomware claim involving 1.4 TB of data, cyber‑fraud surpassed ransomware as CEOs’ top concern, unsecured Zendesk support systems powered a massive spam campaign, and ServiceNow patched the...

A new industry report warns that “shadow AI” – unsanctioned artificial‑intelligence tools used by employees and managers – is spreading rapidly across enterprises. The study found a 45% year‑over‑year increase in the use of unapproved AI applications, driven by workers’...
The second NHIcon 2026 conference highlighted that traditional identity and access management (IAM) is ill‑suited for the rise of agentic AI and non‑human identities (NHIs). Speakers argued that static roles, long‑lived credentials, and session‑based trust amplify risk as autonomous agents act...
South Korea's SK Telecom, after acknowledging a massive personal data leak, is fighting a $91 million regulator fine and has turned down a consumer‑agency settlement proposal. The breach exposed millions of customers' personal information, prompting intense regulatory scrutiny. SK Telecom's legal...

Microsoft has resolved a bug in classic Outlook that blocked users from opening emails encrypted with the “Encrypt Only” permission after a December 2025 update. The defect replaced the encrypted payload with a message_v2.rpmsg attachment, making the content unreadable in...

Metropolitan Technologies, a Toronto‑based cybersecurity startup, has built an operational‑technology platform that secures critical‑infrastructure assets such as mines, energy grids, water treatment plants, and transportation networks. The company graduated from Rogers Cybersecure Catalyst’s eight‑month Cyber Challenge, receiving $20,000 in non‑dilutive...

Wallarm announced a multi‑pronged growth push, adding a new chief operating officer and field CISO while expanding its employee base by 41% in 2025. The company unveiled API Session Blocking and Schema‑Based Testing to tighten real‑time API defenses and shift...

Thoropass introduced Smart Sort AI, an AI‑driven feature inside its Audit Lifecycle Platform that automatically organizes exported data from any GRC system into audit‑ready evidence. The tool requires no integration, analyzing files, mapping them to the correct controls, and inserting...
LexisNexis Risk Solutions launched IDVerse for Insurance, an AI‑powered document authentication and identity verification platform targeting U.S. personal lines insurers. The solution uses biometric face matching, liveness checks, and proprietary neural‑network models to verify IDs and digital identities within seconds...

Iranian state‑sponsored group APT42 deployed a new PowerShell‑based backdoor named TAMECAT, targeting Microsoft Edge and Google Chrome to harvest saved login credentials. The malware is delivered via a VBScript downloader that checks for antivirus products before fetching an AES‑encrypted loader...

Andesite announced it has earned Cloud Security Alliance AI-STAR Level 2 certification, becoming only the third organization globally to achieve the credential. The AI-STAR assessment validates Andesite’s AI security, risk management and governance practices across its Human‑AI SOC platform. The...

HarfangLab uncovered the RedKitten campaign, an AI‑assisted operation delivering the SloppyMIO malware to Iranian human‑rights activists and NGOs. The attack uses shock‑value Excel files masquerading as forensic records to lure victims into enabling macros. Once activated, SloppyMIO pulls additional payloads...

Microsoft has postponed the migration of Microsoft Sentinel from the Azure portal to the Microsoft Defender portal, setting a new sunset date of March 31 2027—about nine months later than originally planned. The shift responds to extensive customer and partner feedback requesting...

Orange Cyberdefense compiled a dataset of 418 publicly announced law‑enforcement actions against cybercrime from 2021 to mid‑2025. The analysis shows extortion, malware distribution and hacking as the most frequently targeted offenses, with arrests accounting for 29% of responses. The United...

Researchers uncovered a sophisticated traffic‑distribution system (TDS) that leverages education‑themed domains to deliver phishing pages, scams, and malware. The infrastructure is hosted on bullet‑proof providers in AS202015 (HZ Hosting) and shares WHOIS details such as oreshnik@mailum.com and Regway nameservers. A...

In January 2026 six high‑profile data breaches—Nike, Melwood, SNP Transformations, Venezia Bulk Transport, Global Shop Solutions, and Grubhub—highlight a shift toward exposure through internal access paths and third‑party tools. Breaches ranged from a 1.4 TB internal data exfiltration at Nike to a...

NatWest Bank and the UK National Crime Agency have launched a joint awareness campaign to combat invoice fraud, a cyber‑crime that siphons millions from businesses each year. The partnership highlights the scale of the threat, citing September 2025 data where...

Annex Security uncovered a malicious VS Code extension in the Open VSX registry that pretended to be the Angular Language Service, amassing 5,066 downloads before activating sophisticated malware. The extension decrypts a payload with AES‑256‑CBC, contacts a Solana blockchain address for command‑and‑control,...

Healthcare SaaS vendors now face a non‑negotiable requirement: integrate Single Sign‑On with hospital identity providers to secure access and meet procurement standards. Data breaches in the sector average $12 million per incident, driving CISOs to demand instant revocation and compliance‑ready authentication....

Ad fraud is escalating into a systemic threat that undermines the digital economy’s trust. In 2024 mobile ad fraud rose 21% and programmatic scams siphoned nearly $50 billion, while the ad‑fraud detection market is set to exceed $2 billion by 2034. Dhiraj...
ESET researchers identified a new data‑wiping malware, DynoWiper, used against a Polish energy company in December 2025. Technical analysis attributes the campaign to the Russian‑aligned Sandworm group with medium confidence, noting similarities to the previously observed ZOV wiper. The malware deployed...

Cardamon, a RegTech firm specializing in secure AI for compliance, has entered Microsoft’s AI Partnership Program to deliver enterprise‑grade, auditable AI solutions to highly regulated organizations. The collaboration combines Cardamon’s rapid delivery platform, which claims to automate up to 95%...

Online learning has become core campus infrastructure, but passwords remain the weakest link, exposing grades, payments, and personal data. Passwordless authentication replaces reusable secrets with device‑bound credentials such as passkeys, security keys, magic links, OTPs, and push approvals. The shift...

Arkose Labs unveiled Arkose Titan, a unified platform that defends against both human‑driven and AI‑powered fraud, scraping, and bot attacks. The solution consolidates bot detection, device and email intelligence, API security, behavioral biometrics, and phishing protection into a single API...

Intruder announced record 2025 growth, with enterprise annual recurring revenue climbing 81% year‑over‑year. The surge was fueled by a 51% rise in new business and a 2.5‑fold jump in expansion revenue, alongside the rollout of Cloud Security Posture Management and...

The Electronic Frontier Foundation (EFF) has launched the "Encrypt It Already" campaign, urging major tech firms to fulfill announced end‑to‑end encryption promises, enable encryption by default, and broaden encrypted storage. The initiative groups demands into three categories—Keep your promises, Defaults...

Cyble Research & Intelligence Labs uncovered ShadowHS, a Linux post‑exploitation framework that operates entirely in memory. The tool leverages a weaponized version of hackshell with an AES‑256‑CBC encrypted loader, enabling fileless execution via /proc//fd/. ShadowHS provides an operator‑controlled environment for...