
Offensive AI is reshaping cyber attacks, with large language models generating and morphing malware in real time. Recent incidents such as Anthropic’s AI‑orchestrated espionage campaign and ClickFix steganography attacks show adversaries bypassing traditional endpoint detection (EDR). Network Detection and Response (NDR) complements EDR by spotting behavioral anomalies and lateral movement across networks, providing a safety net against AI‑driven evasion. Integrating NDR and EDR is becoming essential as remote work and multi‑domain threats expand the attack surface and increase complexity.

Deep‑fake “nudify” services now turn a single photo into realistic, eight‑second explicit videos, offering dozens of sexual scenarios for a small fee. Platforms ranging from web sites to Telegram bots automate image‑to‑video generation, with AI models capable of adding audio...

IonQ announced a definitive agreement to acquire SkyWater Technology for $35 per share, valuing the semiconductor foundry at roughly $1.8 billion in a cash‑and‑stock transaction. The deal creates a vertically integrated quantum platform that combines IonQ’s fault‑tolerant quantum processors with SkyWater’s...
A new crime‑ware toolkit called Stanley is being sold on Russian‑language forums for $2,000 to $6,000. The kit disguises itself as the Notely note‑taking extension and guarantees that its malicious Chrome extension will pass Google’s Web Store review. Once installed,...

Security researchers uncovered two critical 0‑day flaws—CVE‑2025‑34164 and CVE‑2025‑34165—in NetSupport Manager versions up to 14.10.4.0. The bugs reside in an undocumented broadcast feature and can be chained to achieve unauthenticated remote code execution by corrupting heap memory and reading stack...
Phone‑based scams have moved from a niche consumer problem to a material risk for banks, with U.S. consumers losing over $12.5 billion in 2024, many through voice attacks. Fraudsters exploit the inherent trust of human speech and caller‑ID spoofing to impersonate...

Decentralized exchange aggregator Matcha Meta disclosed a security breach originating from its primary liquidity provider, SwapNet, which allowed an attacker to siphon between $13.3 million and $16.8 million on the Base network. The exploit leveraged an arbitrary call flaw in SwapNet’s router...
In this episode Adrian Bridgwater discusses F5’s new AI security offerings—AI Guardrails and AI Red Team—designed to protect enterprise AI models throughout their lifecycle. The Guardrails provide both out‑of‑the‑box and custom‑built runtime protections that enforce policies, prevent data leaks, and...

Microsoft Entra ID will automatically enable passkey profiles and add synced passkey support starting March 2026. The update moves passkey profiles to general availability and introduces a new passkeyType property that lets admins choose device‑bound, synced, or both types of passkeys....

Microsoft’s Military Affairs team has expanded the Software and Systems Academy (MSSA) into a nationwide veteran‑to‑tech pipeline, graduating more than 4,000 service members since its 2013 pilot. The program now offers three core learning paths—cloud development, cloud administration, and cybersecurity...

Firewalla introduced a zero‑trust, microsegmentation approach that lets homeowners modernize large, flat Wi‑Fi networks without renumbering IP addresses or reconfiguring devices. Using the AP7 and Orange appliances, users can keep existing SSIDs while automatically isolating legacy IoT, newer smart devices,...

A sophisticated phishing campaign has been leveraging Vercel's *.vercel.app subdomains since November 2025 to deliver remote‑access malware. The attackers disguise malicious pages as invoice portals or document viewers, then conditionally serve a signed GoTo Resolve installer after fingerprinting the victim’s browser....

Brakeman is an open‑source static analysis scanner that inspects Ruby on Rails codebases for security flaws without executing the application. It evaluates controllers, models, views, templates, and dependency versions, flagging injection, XSS, unsafe redirects, and authentication weaknesses. The tool integrates...

Consensys submitted a comment letter to the FTC urging technology‑agnostic security standards in the agency’s settlement with Nomad Capital Labs over the 2022 $190 million bridge hack. The firm warns that prescriptive measures such as mandatory circuit‑breaker mechanisms could clash with...

Ryan Seymour, VP of Consulting and Education at ConnectSecure, draws on over twenty years of incident‑response work to explain why many failures begin before an attack even starts. He shows that teams often hesitate when alerts appear, not because of...

Amazon Web Services has released an updated PCI PIN compliance package for its Payment Cryptography service, confirming a recent third‑party audit with zero findings. The package includes a PCI PIN Attestation of Compliance and a Responsibility Summary that outlines customer obligations. The...
In this episode Jason Wagner outlines how account takeover (ATO) has shifted from brute‑force logins to stealthy session hijacking, MFA fatigue, and credential reuse tied to real identities. He explains that attackers now harvest active session tokens and device fingerprints,...

User Managed Access (UMA) extends OAuth 2.0 by letting data owners set granular sharing policies. It introduces components such as Resource Owner, Authorization Server, and Requesting Party Token to mediate consent. In enterprise SSO, UMA decouples resource data from policy logic,...
NordVPN research finds more than 26 million people may have been lured to malicious sites via fake QR codes. Scammers embed these codes in “brushing” packages, a tactic that now delivers 26 % of all malicious links. Seventy‑three percent of Americans admit...

The NDSS 2025 paper introduces RContainer, a secure container architecture that leverages ARM Confidential Computing Architecture (CCA) hardware primitives to protect containers from untrusted operating systems. By deploying a lightweight trusted mini‑OS alongside the host OS, RContainer monitors control‑flow interactions...

Solana validators were urged to install Agave v3.0.14 after a critical security advisory revealed two vulnerabilities that could crash nodes or stall consensus. Early adoption was slow, with only 18% of stake on the patched client, exposing the network to...
E‑commerce merchants are increasingly hit by fraud that begins with fake but technically valid email sign‑ups. Fraudsters use these accounts for low‑value card‑testing transactions and to harvest welcome coupons, driving chargebacks and an estimated $89 billion in annual coupon abuse losses....

Microsoft is investigating Windows 11 boot failures marked by the UNMOUNTABLE_BOOT_VOLUME stop code after the January 2026 Patch Tuesday cumulative update (KB5074109). The problem impacts Windows 11 version 25H2 and all editions of version 24H2 on physical devices, displaying a black crash screen and requiring...

Government CISOs are being urged to reframe cybersecurity discussions around financial fraud and AI‑generated scams rather than traditional technical jargon. Pandemic‑relief programs alone saw over $300 billion in fraudulent payments, while consumer fraud hit $12.5 billion in 2024, underscoring the fiscal stakes....

Microsoft issued emergency out‑of‑band (OOB) updates on Saturday to address a critical Outlook freeze affecting PST files stored in cloud services such as OneDrive and Dropbox. The problem, introduced by the January 2026 Patch Tuesday roll‑out, caused Outlook to become...
Google reported a widespread Gmail outage on January 24, 2026, affecting spam filtering and email classification. The issue began around 5 a.m. Pacific, causing promotional and social messages to appear in the Primary inbox and legitimate emails to trigger spam warnings....

Non‑Human Identities (NHIs) are machine credentials that now underpin most cloud‑native environments. Effective NHI management couples secret rotation, permission controls, and continuous monitoring to reduce breach risk and streamline compliance. Organizations that automate discovery, classification, and remediation see faster incident...

Non‑Human Identities (NHIs), or machine identities, are becoming the backbone of AI‑driven cybersecurity operations. By pairing encrypted secrets with server‑granted permissions, NHIs function like digital passports that enable secure automated interactions. AI enhances NHI management through real‑time threat analytics, lifecycle...

Non‑human identities (NHIs) or machine identities are becoming central to digital secrets management, especially as enterprises expand across hybrid cloud environments. Effective NHI platforms automate discovery, lifecycle handling of secrets, and real‑time monitoring, reducing breach risk and compliance burdens. AI...

AI security is shifting focus toward Non‑Human Identities (NHIs), the machine credentials that underpin modern cloud and AI workloads. Organizations confront challenges in discovering, classifying, and governing these identities, which lack the natural lifecycle of human users. Emerging solutions integrate...

The article evaluates enterprise‑grade cybersecurity platforms, outlining key criteria such as AI/ML capabilities, coverage breadth, autonomous response, total cost of ownership, and scalability. It reviews five leading solutions—Darktrace, CrowdStrike, SentinelOne, Palo Alto Networks, and Microsoft Defender—detailing each vendor’s strengths and...

Plaid reported a 55% increase in new European customers and a 53% annual rise in UK open‑banking payments as it expands its footprint across the continent. The fintech data‑connectivity provider added virtual‑account processing for over half of its European transactions...
Metriport, a YC‑backed open‑source platform that moves patient data for over 300 million individuals, is hiring a senior security engineer in San Francisco. The role will harden its HIPAA‑compliant infrastructure, building audit‑logging, RBAC, and security policies. The company reports multi‑million ARR,...

Researchers at NDSS 2025 introduced Laputa, a framework that adds fine‑grained policy enforcement to Apache Spark by inspecting physical execution plans. The system isolates Spark workloads using confidential computing compartments, protecting data from malicious users and compromised cloud managers. Laputa’s...

Institutional perception of self‑custody is shifting from a retail‑only risk to core crypto infrastructure. New hardware wallets, multi‑party authorization, and non‑custodial delegation let firms retain direct asset control while satisfying compliance requirements. Proof‑of‑Stake networks now support staking without transferring ownership,...
North Korean hacker group Konni, linked to APT37, is deploying AI‑generated PowerShell malware to infiltrate blockchain developers. The campaign uses Discord‑hosted links that deliver a ZIP file containing a PDF lure and a malicious LNK shortcut. The shortcut triggers a...

The article contrasts modern Dynamic Application Security Testing (DAST) with traditional and AI‑driven penetration testing, highlighting how AI‑powered tools are built on advanced DAST architectures. Modern DAST now offers CI/CD integration, business‑logic testing, and a graph‑based knowledge model that feeds...
Telehealth platform Call‑On‑Doc is accused of a data breach that may have exposed more than 1.1 million patient records, according to a listing on a hacking forum. The alleged leak includes personal identifiers, contact details, medical conditions and payment amounts, with...

The Department of Justice disclosed that operatives from the Department of Government Efficiency (DOGE) may have improperly accessed and shared Social Security Administration (SSA) data. Internal emails show a password‑protected file containing roughly 1,000 individuals’ names and addresses was transmitted...
Founder oversight transforms security from a static checklist into a living, strategic asset. By staying involved in access controls, audits, and vendor management, leaders spot hidden vulnerabilities before they become costly incidents. This hands‑on approach reinforces compliance, reduces downtime, and...

ISO 27001:2022 supersedes the 2013 version, introducing a streamlined set of 93 controls organized into four thematic categories—Organizational, People, Physical, and Technological. The update adds 11 new controls targeting cloud security, threat intelligence, secure coding, and data protection, while tightening requirements...
Businesses now view protection as safeguarding decisions, trust, continuity, and reputation rather than physical assets. The rise of AI intensifies risk, as models trained on sensitive data can be compromised, leading to regulatory, reputational, and financial fallout. Companies are turning...

The Ethereum Foundation announced a dedicated Post‑Quantum team, elevating quantum‑resistant security to a top strategic priority. Led by Thomas Coratger and supported by Emile, the group will accelerate wallet safety upgrades, research prizes and test networks. A bi‑weekly developer session...

Equifax unveiled Synthetic Identity Risk, an AI‑driven solution that flags synthetic identity fraud using machine‑learning analysis of identity data, credit histories, and behavioral signals. The tool can be deployed at account opening or continuously for ongoing monitoring, enabling lenders to...

CertiK co‑founder and CEO Ronghui Gu told reporters at Davos that the blockchain security firm is still weighing a public listing, with a current valuation of roughly $2 billion. While no concrete IPO timeline exists, Gu said the company would need additional...
Digital wallets are software platforms that store payment credentials and enable instant, encrypted transactions via smartphones or computers. They combine convenience, security features like biometrics and tokenization, and financial organization tools such as spending categorization. For merchants, offering wallet payments...

OpenAI announced that upcoming updates to its Codex code‑generation model will push it into the “High” cybersecurity risk tier in the company’s internal risk framework, the first time a model has reached that level. The “High” designation means Codex could...

Researchers from Southern University of Science and Technology and ByteDance presented WAVEN, a WebAssembly memory virtualization layer designed for trusted execution environments (TEEs). WAVEN enables cross‑module memory sharing and page‑level access control, addressing the linear memory model’s limitations in Wasm‑based...

Blockchain security firm CertiK dissected a sophisticated exploit on the MakinaFi DeFi protocol that drained approximately 1,299 ETH, valued at $4.13 million. The attacker leveraged massive flash loans to manipulate Curve pool valuations, inflating the protocol’s share price and extracting USDC from...
NETSCOUT has been named a leader in network detection and response (NDR) by Quadrant Knowledge Solutions’ 2025 SPARK Matrix. The company’s Omnis Cyber Intelligence platform leverages Adaptive Service Intelligence to inspect packets at up to 100 Gbps, delivering deep, context‑rich metadata...