
Project Compass, a Europol‑led operation backed by 28 nations including the Five Eyes, began in January 2025 to dismantle the transnational youth‑focused cybercrime network known as The Com. Since its launch the initiative has secured 30 arrests, fully or partially identified 179 perpetrators and pinpointed up to 62 victims while safeguarding four confirmed victims. The Com is divided into Hacker, In‑Real‑Life and Extortion sub‑groups, each employing sophisticated anonymity and money‑laundering tactics. Project Compass leverages an information‑sharing hub to coordinate investigations across specialized units in partner countries.
The Senate Health, Education and Labor Committee approved the bipartisan Health Care Cybersecurity and Resiliency Act by a 22‑1 vote, with only Sen. Rand Paul dissenting. The legislation obliges the Department of Health and Human Services to craft a cybersecurity...

FedRAMP 20x redesigns the federal cloud‑security authorization process by eliminating the agency sponsor requirement and introducing a cloud‑native path that can deliver approvals in weeks instead of years. Automation replaces narrative controls with machine‑readable evidence, targeting over 80% validation through continuous‑monitoring...
IonQ has rolled out Romania’s National Quantum Communication Infrastructure (RoNaQCI), creating a 1,500‑kilometer quantum‑key‑distribution (QKD) network that links six major cities. The system comprises 36 quantum‑secured links, accounting for more than 20% of Europe’s terrestrial quantum communications capacity. Leveraging wavelength‑division...

Former public servant Mike Pezzullo addressed the Universities Australia Solutions Summit, reflecting on the 2019 cyber‑attack that compromised nearly 20 years of Australian National University (ANU) student and staff records. The breach, attributed to Chinese state‑linked threat actors, exposed bank...

Low‑Code by Design reframes identity governance automation by building reusable, metadata‑driven integration modules instead of bespoke scripts. The approach captures application attributes such as account models and correlation rules, allowing a single tested component to be configured for many systems....
Huawei is participating in 16 Horizon Europe research projects despite being labeled a high‑risk supplier by the European Commission. Fifteen of the contracts were signed before the 2023 ban, while a sixth‑year project was deemed outside the restriction scope. The...

Federal prosecutors charged two Connecticut men with a $3 million fraud scheme that exploited knowledge‑based authentication on FanDuel, DraftKings and BetMGM. The perpetrators harvested personal data from roughly 3,000 victims using services such as TruthFinder and BeenVerified to open fraudulent gambling...

AWS Security Hub Extended introduces a bundled plan that lets enterprises procure, deploy, and manage a full‑stack security suite covering endpoints, identity, email, network, data, browsers, cloud, AI, and security operations from a single console. The offering expands protection beyond...
During Prime Minister Narendra Modi’s state visit, India and Israel signed multiple agreements to deepen cooperation in technology and cybersecurity. The pacts create a joint innovation fund, enable real‑time cyber‑threat intelligence sharing, and launch collaborative projects in artificial intelligence, quantum...

ManoMano, a leading European DIY e‑commerce platform, disclosed a data breach affecting roughly 38 million customers after hackers compromised a Tunis‑based third‑party customer support provider. The breach exposed personal details such as names, email addresses, phone numbers, and support ticket communications,...

NIST’s Open Security Controls Assessment Language (OSCAL) gives state and local governments a machine‑readable alternative to spreadsheets, Word files, and PDFs for security‑control documentation. By encoding controls, implementations, and assessment results in JSON, XML or YAML, agencies can automate validation,...

Accounting firms are facing a surge in data‑exfiltration attacks, where cybercriminals silently steal sensitive financial records to extort victims or sell the data. Traditional detection tools often miss covert channels, encrypted uploads, and traffic mimicry, leaving firms vulnerable. The average...

Juniper Networks disclosed a critical CVE‑2026‑21902 vulnerability in the On‑Box Anomaly Detection framework of its Junos OS Evolved running on PTX Series routers. The flaw lets an unauthenticated attacker reach a root‑level service over an external port, enabling full device...

Olympique de Marseille confirmed it was the target of an attempted cyberattack after a threat actor claimed to have breached its servers and leaked a sample of a database containing staff and supporter information. The club said its technical teams...

Aeternum, a newly discovered botnet loader, has moved its command‑and‑control (C2) infrastructure onto the Polygon blockchain, using smart contracts to issue instructions. By writing commands as immutable blockchain transactions, the botnet eliminates the traditional servers and domains that law‑enforcement typically...
A Greek court sentenced four individuals, including two Israelis, to prison for operating the illegal Predator spyware that targeted politicians, journalists and business executives. The defendants—linked to the Israeli firm Intellexa—were convicted of breaching telephone confidentiality and illegal data access....

Cisco Talos has identified a new threat cluster, UAT-10027, delivering a novel backdoor called Dohdoor that leverages DNS‑over‑HTTPS for command‑and‑control. The malware uses DLL side‑loading through legitimate Windows executables and drops a Cobalt Strike beacon that unhooks NTDLL calls to evade...
Europe faces its most contested security decade since the Cold War, with the digital backbone—networks, data infrastructures and connectivity—now the primary frontline. Recent blackouts in Portugal and Spain illustrate how digital failures become national security events, while adversaries target subsea...

Contrast Security’s integration with ServiceNow Application Vulnerability Response (AVR) streams verified, runtime‑backed vulnerabilities directly into ServiceNow tickets, uniting detection and remediation workflows. The bidirectional sync supplies exploitability evidence, code location and environment context, eliminating manual validation steps. This enables security...

Chainalysis reports ransomware victims paid only 28% of demanded sums in 2025, the lowest rate on record despite a 50% surge in attacks. Total on‑chain ransomware payments are near $820 million and could exceed $900 million as attribution improves. While the number...

Versa has introduced the world’s first sovereign SASE‑as‑a‑Service, extending its earlier sovereign SASE model to a fully managed, in‑country offering. The service provides local control, management, and storage to satisfy data‑residency regulations such as the U.S. CLOUD Act. Versa reports...

Agent Tesla’s newest campaign leverages a multi‑stage, fileless delivery chain that begins with a phishing email containing a RAR‑packed JSE loader. The loader fetches an AES‑encrypted PowerShell script, which executes entirely in memory and uses process hollowing to inject malicious...

Mean Time to Respond (MTTR) is a critical KPI linking security speed to business risk. The article explains that poor threat visibility—stale data, alert overload, fragmented tools—drives MTTR higher, while high‑quality, execution‑verified threat intelligence can compress response times. ANY.RUN’s sandbox‑derived...

Passware Kit Mobile 2026 v2 introduces a proprietary method to decrypt Samsung Galaxy S20 and S21 devices powered by Exynos 990 and 2100 chipsets, supporting security patches up to April 2025. The update also adds full‑disk encryption support for Unisoc‑based phones and accelerates password...

Revolut’s latest report shows encrypted messaging apps now dominate Authorised Push Payment (APP) fraud, with Telegram accounting for over 58% of job‑related scams. The platform’s share of total APP fraud rose more than 30% year‑over‑year, overtaking WhatsApp in several categories....

Microsoft has broadened its first‑sign‑in restore experience, part of Windows Backup for Organizations, to include hybrid‑managed devices, multi‑user setups, and Windows 365 Cloud PCs. The feature lets users who sign in with a Microsoft Entra ID account restore personal settings and...

Cybercriminals are increasingly targeting high‑net‑worth individuals, exploiting the wealth of personal and financial data stored online. The FBI reports $16.6 billion lost to internet‑enabled crimes in 2024, highlighting the scale of the threat. Family offices, positioned as trusted advisors, can extend...

Almost a third of UK businesses experienced a remote‑working related cyber breach in the past year, with phishing responsible for 85% of incidents. The Cyber Security Breaches Survey 2025 shows larger firms are most affected, reporting breach rates of 67%...

Enterprise adoption of generative AI tools is soaring, with nearly one in twenty companies regularly using them and internal data uploads to public models increasing thirty‑fold year‑on‑year. Employees often paste confidential contracts or credentials into tools like ChatGPT, unintentionally turning...

Meta’s 2021 global outage highlighted how a coordinated, cross‑functional incident response team can limit downtime and reputational harm. The article uses that case to illustrate the challenges smaller firms face when structuring such teams. It outlines essential roles—Incident Commander, Technical...

Security firm Truffle Security revealed that publicly exposed Google API keys can be upgraded to full‑access Gemini credentials, enabling data exfiltration from any organization using them. A November scan uncovered 2,863 such keys, affecting major banks, security vendors, and even...

Ribbon Communications announced a strategic collaboration with Amazon Web Services to deliver a cloud‑native, secure voice communications suite on AWS Marketplace. The offering bundles Ribbon’s Session Border Controller, policy routing engine, and centralized management platform as containerized services optimized for...

ResidentBat is a custom Android spyware implant deployed by the Belarusian KGB to turn seized smartphones into persistent surveillance tools. The malware is sideloaded via Android Debug Bridge after physical access, granting extensive data collection and remote‑wipe capabilities. First disclosed...

The EU Cyber Resilience Act (CRA) is set to overhaul security requirements for the global rail supply chain, targeting connected products and software. Nomad Digital hosted a webinar with experts from Alstom, Durham University and its own security team to...

Quantum‑era risk is no longer a distant theory; adversaries are already harvesting encrypted data to decrypt later when quantum computers mature. This "harvest‑now, decrypt‑later" model threatens long‑life information across government, finance, healthcare and private‑sector IP. CEOs must shift focus from...
To meet the stringent data‑privacy demands of enterprise insurance, the company abandoned the traditional multi‑tenant SaaS model and built a single‑tenant AI platform where each client receives an isolated database and compute environment. By eliminating middleware and moving business logic...

TrendAI, the enterprise arm of Trend Micro, released patches for eight vulnerabilities in its Apex One endpoint security suite. Two critical CVEs (2025‑71210 and 2025‑71211) could let remote attackers upload malicious code and execute commands via the management console, while six high‑severity...

Payments platform Ecommpay released a free whitepaper titled “E‑commerce fraud defence: A quick guide for merchants.” The guide details nine top fraud threats, including friendly fraud, refund fraud, account takeover and AI‑powered deepfakes, and offers actionable mitigation tactics. Ecommpay claims...

Samsung SDS released its 2026 cybersecurity outlook, highlighting five priority threats: AI‑driven attacks, ransomware, cloud misconfigurations, phishing/account takeovers, and data security gaps. The report, based on 667 Korean security professionals, warns that generative AI and autonomous agents will intensify phishing,...

Wireshark 4.6.4 releases address two critical dissector vulnerabilities—a crash in the HTTP3 dissector and an infinite loop in the MEGACO dissector. The update also resolves a plugin compatibility problem introduced by an API/ABI change in version 4.6.1, restoring functionality for...

The IRS Criminal Investigation report shows tax‑related financial crimes hit $4.5 billion in FY 2025, a 111.8 % jump from the prior year, signaling heightened risk this tax season. Cybercriminals are leveraging generative AI to produce hyper‑personalized phishing, deepfake voice and video scams,...

Intellicheck launched an enriched Desktop Application that lets organizations of any size stop identity theft and fraud instantly, without needing system integration. The solution works with existing scanners, incurs minimal cost, and stores transaction history securely in the cloud via...

The Ministry of Housing, Communities and Local Government (MHCLG) has released a Local Government Reorganisation Digital and Cyber Playbook to help councils navigate digital, data and cybersecurity challenges during structural changes. Developed with input from local and central government, sector...

LM Studio and Tailscale have launched LM Link, a feature that lets developers access remote GPU rigs as if they were locally attached. The solution replaces public APIs and SSH tunnels with a private, WireGuard‑encrypted tunnel built on Tailscale’s userspace tsnet...
_(36).jpg)
From 4 March 2026 the Australian government will enforce minimum security standards for all smart devices sold in the market, shifting compliance from voluntary guidance to mandatory requirement. The IoT Alliance Australia (IoTAA) is spearheading a voluntary Security Labelling Scheme, slated to...
UpGuard, the Hobart‑based cybersecurity firm, closed a $75 million Series C round led by Springcoast Capital, with participation from August Capital, Square Peg and Pelion Venture Partners. The capital will accelerate development of its AI‑powered cyber‑risk posture management (CRPM) platform, expand go‑to‑market operations,...
Keeper Security announced integration of the Kyber key encapsulation mechanism across its platform to deliver quantum‑resistant identity protection. The hybrid approach layers lattice‑based Kyber on existing elliptic‑curve primitives, securing backend APIs, Keeper Commander, and upcoming mobile apps. This rollout aligns...

Singapore is bolstering its cybersecurity ecosystem through a multi‑pronged strategy that includes large‑scale cyber‑drills, senior leadership training, and youth programmes to grow a skilled talent pipeline. The Cyber Security Agency and the Ministry of Digital Development coordinate rapid response to...

UFP Technologies, a $600 million medical‑device maker, disclosed a cyberattack detected on February 14 that compromised several IT systems. The company isolated the breach, removed the threat and engaged external advisors, but confirmed that data was stolen and some functions, such as...