Q-Day: Bank Quantum Attack Could Cost US Economy Trillions, Warns Citi
Citi warns that quantum computers could break public‑key encryption within the next decade, estimating a 19‑34% probability of a widespread breach by 2034 and 60‑82% by 2044. A successful quantum attack on a major U.S. bank could generate $2‑3.3 trillion in indirect GDP‑at‑risk, slashing real GDP by 10‑17% during a six‑month recession. The crypto sector is also exposed, with roughly 25% of Bitcoin holdings vulnerable. Citi urges firms to launch structured quantum‑readiness programs, leveraging existing post‑quantum standards despite implementation challenges.

Windows 11 KB5077181 Fixes Boot Failures Linked to Failed Updates
Microsoft has released Windows 11 update KB5077181, fully fixing the UNMOUNTABLE_BOOT_VOLUME boot failure that struck some enterprise machines after recent security patches. The bug, linked to a failed December 2025 update and exacerbated by the January 13, 2026 KB5074109 rollout, affected devices running 25H2...
How Satisfied Are Companies After Integrating NHIs in Compliance Frameworks?
The episode explores how companies are evaluating the integration of Non‑Human Identities (NHIs) into their compliance frameworks, highlighting the benefits of reduced risk, improved regulatory adherence, and operational efficiency. It outlines best‑practice steps such as discovery, automated secret rotation, behavioral...
What Makes an Agentic AI System Safe for Medical Records Management?
The episode explores how Non‑Human Identities (NHIs)—machine credentials like tokens and keys—are reshaping cybersecurity in healthcare, especially as cloud adoption and Agentic AI expand. It outlines a lifecycle‑focused NHI management strategy that includes discovery, classification, continuous threat monitoring, and context‑aware...
How Are NHIs Ensuring Protected Data Exchanges in Financial Services?
The episode explores how Non‑Human Identities (NHIs), or machine identities, are essential for securing protected data exchanges in financial services. It explains the lifecycle of NHIs—from discovery and classification to secret rotation and decommissioning—and why holistic management platforms outperform point...
Can Businesses Truly Trust Agentic AI with Sensitive Data Handling?
The episode explores how Non‑Human Identities (NHIs)—machine credentials and permissions—are essential to securing sensitive data, especially in cloud environments. It outlines a full lifecycle approach to NHI management, from discovery and classification to real‑time monitoring, automated secret rotation, and threat...

The Year Ahead: 2026 Cybersecurity Predictions for the Hotel Industry
Hospitality cyber risk escalates in 2026 as AI-driven phishing, ransomware‑as‑a‑service, and deepfake fraud target increasingly connected hotel environments. Regulatory pressure intensifies with the EU’s NIS2 directive and Cyber Resilience Act, forcing global compliance and tighter insurance terms. Smart‑room IoT devices...

CTM360: Lumma Stealer and Ninja Browser Malware Campaign Abusing Google Groups
CTM360 uncovered an active campaign that hijacks more than 4,000 Google Groups and 3,500 Google‑hosted URLs to distribute credential‑stealing malware. The threat actors deliver Lumma Info‑Stealer to Windows devices and a trojanized “Ninja Browser” to Linux systems, embedding organization‑specific keywords to boost...

What Are the Impacts of GNSS Outages?
Global Navigation Satellite System (GNSS) outages are emerging as a systemic risk for modern infrastructure, affecting both positioning and, critically, precise timing. Interference such as jamming and spoofing can disrupt multiple constellations simultaneously, while system‑level faults can degrade services worldwide....
Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack
Nevada’s Governor’s Technology Office unveiled a statewide data classification policy, introducing four distinct categories—public, sensitive, confidential, and restricted. The initiative follows a costly ransomware attack that disrupted state systems and cost roughly $1.5 million in response. Agencies must now assign a...

Snail Mail Letters Target Trezor and Ledger Users in Crypto-Theft Attacks
Physical letters masquerading as official communications from Trezor and Ledger are being used to lure hardware‑wallet owners into scanning QR codes that lead to counterfeit setup sites. The sites prompt victims to enter their 12‑, 20‑, or 24‑word recovery phrases...
Guernsey Medical Practice Sanctioned After Cyber Criminals Access Patient Data Through Email Account
Guernsey’s Data Protection Authority has sanctioned First Contact Health after a phishing attack compromised an employee’s email, exposing confidential patient data. The breach was discovered by the practice, which reported it to authorities, but regulators found the organization lacked adequate...
New “Kurd Hackers Forum” Focuses on Middle Eastern Data Breaches and Leaks
A new online community called the Kurd Hacker Forum has emerged, focusing on data breaches across Iran, Syria, and Turkey. The clear‑net site, registered on Jan 28 2026, mirrors the layout of BreachForums and hosts threads in English and Kurdish. It currently...

Indian Pharmacy Chain Giant Exposed Customer Data and Internal Systems
India’s largest pharmacy chain, DavaIndia, part of Zota Healthcare, suffered a critical security breach that gave unauthenticated attackers full administrative control of its platform. The flaw exposed roughly 17,000 online orders and allowed manipulation of product listings, pricing, and prescription...

CISA Adds SolarWinds, Microsoft, Apple, Notepad++ Vulnerabilities to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, covering SolarWinds Web Help Desk, Microsoft Configuration Manager, Apple operating systems, and Notepad++. The SolarWinds flaw (CVE‑2025‑40536) and the Microsoft SQL‑injection...

Zscaler-SquareX Deal Boosts Zero Trust, Secure Browsing Capabilities
Zscaler announced the acquisition of Singapore‑based startup SquareX, adding its Chromium‑based browser extension to the Zero Trust Exchange platform. SquareX’s browser detection and response (BDR) technology provides real‑time threat detection inside browsers on managed and personal devices. The deal, closed...

Attribution of Sprawling Cyberespionage Campaign Allegedly Held Back Amid China Retaliation Fears
Palo Alto Networks' Unit 42 researchers linked the sprawling TGR‑STA‑1030 cyberespionage campaign to an Asian state‑aligned group, but chose not to publicly attribute it to China. Sources say the decision was driven by fears of retaliation, as Palo Alto's security software...

Google Gemini Weaponized in State-Sponsored Attacks
Google’s Gemini large‑language model is being weaponized by multiple state‑sponsored threat actors, according to the Google Threat Intelligence Group. North Korean UNC2970 and several Chinese groups such as Mustang Panda, Judgment Panda, APT41 and UNC795 are using Gemini for rapid...

Fintech Lending Giant Figure Confirms Data Breach
Fintech lender Figure Technology confirmed a data breach after an employee fell for a social‑engineering attack, allowing the hacking group ShinyHunters to exfiltrate roughly 2.5 GB of customer files. The leaked data includes full names, home addresses, dates of birth and...

From Perimeter to Protocol: Reducing Telecom Attack Surface with Privacy-First Mobile Technology
Telecom operators are confronting nation‑state campaigns such as Salt Typhoon and Volt Typhoon that exploit signaling and subscriber identity systems, rendering traditional perimeter defenses inadequate. In a briefing hosted by the Institute for Critical Infrastructure Technology, experts advocated privacy‑first mobile‑carrier...

Sex Toys Maker Tenga Says Hacker Stole Customer Information
Japanese sex‑toy manufacturer Tenga disclosed a data breach after a hacker accessed a staff member’s professional email account, potentially exposing customer names, email addresses, and order details. The intrusion allowed the attacker to view historical correspondence and send spam to...

1,800+ Windows Servers Hit by BADIIS SEO Malware
Elastic researchers uncovered a large‑scale SEO poisoning campaign that has compromised more than 1,800 Windows servers running Microsoft IIS. The BADIIS malware installs as a native IIS module, intercepting crawler traffic and injecting malicious backlinks to promote illicit gambling and...

What You Need to Know About GSA's New CUI Security Framework
In early 2026 the General Services Administration issued CIO‑IT Security‑21‑112 Revision 1, a procedural guide that shifts CUI contractor verification to a NIST Risk Management Framework (RMF) model rather than the DoD’s Cybersecurity Maturity Model Certification (CMMC). The guidance mandates case‑by‑case...
Network Jobs Watch: Hiring, Skills and Certification Trends
Network and infrastructure roles are rapidly evolving as AI‑driven automation, multicloud, and zero‑trust solutions gain traction. Recent Foote Partners data show a 1.9% decline in pay premiums for traditional network administration, while network architecture commands an 18% premium and AI‑related...
IT Bonuses Reward Network, Security Skills that Can’t Be Automated
Foote Partners’ Q4 2023 IT Skills and Certifications Pay Index reveals that premium pay is shifting from routine, execution‑level tasks to high‑order engineering, architecture, and risk‑ownership roles. Security‑focused skills such as risk analytics, security architecture, and threat detection command cash...

NAVWAR Cyber Directorate’s Mission to Secure, Survive, Comply
The Naval Information Warfare Systems Command (NAVWAR) created a new cyber directorate last August to centralize its cybersecurity efforts. The directorate targets three pillars—zero‑trust adoption, secure software development, and cutting‑edge defensive technologies—while automating risk‑management framework (RMF) compliance. By feeding feedback...

Microsoft Under Pressure to Bolster Defenses for BYOVD Attacks
Microsoft faces mounting pressure as ransomware groups increasingly leverage bring‑your‑own‑vulnerable‑driver (BYOVD) attacks to neutralize endpoint security tools. While Windows has introduced driver signing enforcement and a vulnerable driver blocklist, legacy compatibility rules allow drivers with expired or revoked certificates to...

Navy Installations Shift to Continuous Cybersecurity Model
The U.S. Navy is moving to a continuous cybersecurity model that relies on artificial intelligence to detect and mitigate threats in real time. Navy Installations Command (CNIC) is replacing its legacy risk‑management framework with the Cybersecurity Risk Management Construct, emphasizing...

Cyberintelligence Institute Launches CYROS App to Warn Against Cyber Threats
The Cyberintelligence Institute (CII) has released CYROS, a free smartphone app that warns users of emerging cyber threats such as ransomware, phishing, and digital sabotage. The platform aggregates alerts from Germany's Federal Office for Information Security, consumer‑protection groups, and security...

What Interoperability in Healthcare Really Means for Security and Privacy
Healthcare interoperability is accelerating data exchange among hospitals, labs, insurers and pharmacies, but each connection expands the sector's attack surface. Misconfigured integrations, outdated protocols and weak identity controls can leak sensitive patient records, turning routine sharing into a security liability....

NATO Must Impose Costs on Russia, China over Cyber and Hybrid Attacks, Says Deputy Chief
At the Munich Cyber Security Conference, NATO Deputy Secretary General Radmila Shekerinska warned that the alliance must make cyber and hybrid attacks by Russia and China more costly. She cited a December cyber‑attack on Poland’s energy infrastructure as a recent...

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
Google Threat Intelligence Group disclosed a coordinated campaign by state‑sponsored actors from China, Iran, Russia and North Korea targeting the defense industrial base. The operations concentrate on battlefield technologies used in the Russia‑Ukraine war, recruitment‑process infiltration, edge‑device entry points, and...

China May Be Rehearsing a Digital Siege, Taiwan Warns
Taiwan’s senior security adviser warned that China is using a secret cyber‑training platform called "Expedition Cloud" to simulate attacks on critical infrastructure. The platform creates digital twins of power grids, transport and communications networks, allowing Beijing’s teams to rehearse disruptive...
SMART Toolkit Helps Map Healthcare Cyber Risk
Intermountain Health’s chief information security officer Erik Decker unveiled the SMART toolkit, a framework that maps an organization’s critical clinical and administrative functions to assess cyber‑risk exposure. The tool helps leaders identify which services must remain operational during a breach...

Deepfake Business Risks Are Growing – Here's What Leaders Need to Know
Deepfake attacks have moved from a niche concern to a mainstream cybersecurity priority, with 62% of organizations reporting at least one incident in the past year. Hackers are leveraging publicly available AI models, such as Google Gemini, to create convincing...

Fake North Korean IT Workers Are Rampant on LinkedIn – Security Experts Warn Operatives Are Stealing Profiles to Apply for...
Security Alliance (SEAL) reports that North Korean actors are hijacking authentic LinkedIn profiles to pose as remote IT workers and infiltrate companies worldwide. By leveraging stolen personal data, verified workplace emails and AI‑generated imagery, they pass background checks and secure...

Munich Security Conference: Cyber Threats Lead G7 Risk Index, Disinformation Ranks Third
The Munich Security Index 2026 released at the MSC shows G7 nations rank cyber‑attacks as their top security risk for the second consecutive year. Disinformation campaigns sit in third place, while economic crises occupy the second slot. In contrast, the...

Dutch Carrier Odido Discloses Data Breach Impacting 6 Million
Dutch mobile carrier Odido announced a data breach that exposed personal information of more than 6 million customers, including names, addresses, phone numbers, email, dates of birth, bank account and passport or driver‑license details. The intrusion occurred on February 7‑8 and targeted...

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Researchers uncovered a wave of malicious Chrome extensions that siphon data from corporate tools, social platforms, AI assistants, and general browsing activity. The CL Suite add‑on steals Meta Business Suite credentials and analytics, while VK‑styled extensions hijacked roughly 500,000 VKontakte...

The $17 Billion Wake-Up Call: Securing Crypto in the Age of AI Scams
The 2026 Chainalysis report estimates crypto‑related scams cost $17 billion, driven by a 1,400% surge in impersonation attacks and a 456% jump in AI‑enabled fraud. Machine‑learning tools have turned scams into factory‑scale operations, making them 4.5 times more profitable than traditional...

The Cyber Express Weekly Roundup: Escalating Breaches, Regulatory Crackdowns, and Global Cybercrime Developments
The Cyber Express weekly roundup highlights a series of high‑profile cyber incidents across continents. The European Commission’s mobile device management system was breached but contained within nine hours, while Senegal’s national identity services were crippled by ransomware. In Australia, FIIG...

Npm’s Update to Harden Their Supply Chain, and Points to Consider
npm completed a major authentication overhaul in December 2025, revoking classic long‑lived tokens and moving to short‑lived session tokens with MFA default for publishing. The changes also promote OIDC Trusted Publishing, giving CI systems per‑run credentials. However, MFA phishing attacks...

60,000 Records Exposed in Cyberattack on Uzbekistan Government
Uzbekistan’s Digital Technologies Ministry confirmed that a cyberattack on three government information systems in late January exposed roughly 60,000 individual data records, not the personal data of 15 million citizens as earlier rumors suggested. The breach, which lasted from January 27‑30, was...

Japanese Broker Rakuten Securities to Change MT4 Login Method to Enhance Security
Rakuten Securities will overhaul the MetaTrader 4 login process. Beginning Saturday, February 28 2025, the broker will issue random passwords for its MT4, MT4 Securities CFD and MT4 Commodity CFD accounts. After Saturday, February 28 2026, direct MT4 logins will be permanently disabled, requiring traders...
Kaspersky Warns Against ‘Valentine’s Gift’ Card Scams
Kaspersky warns that scammers are targeting the surge in Valentine's Day gift‑card purchases with sophisticated phishing campaigns. The security firm’s latest global survey shows 80% of consumers plan to buy digital gifts, prompting fraudsters to create fake verification sites and...

8,000+ ChatGPT API Keys Left Publicly Accessible
Cyble Research and Intelligence Labs uncovered more than 8,000 publicly accessible ChatGPT API keys, including over 5,000 GitHub repositories and roughly 3,000 live production websites. The keys were hard‑coded in source code, configuration files, and client‑side JavaScript, making them instantly...
Supply Chain Cyber Attacks Continue to Evolve in 2026: Group-IB
Group-IB’s High‑Tech Crime Trends Report 2026 warns that supply‑chain cyber attacks have matured into self‑contained ecosystems, with threat actors focusing on upstream vendors rather than direct targets. By exploiting trusted relationships, attackers can infiltrate downstream networks, as illustrated by 263...
Should Healthcare Organizations Transition to Biometric Security?
Biometric authentication is now mainstream in U.S. healthcare, with roughly 78% of organizations deploying fingerprint or facial‑recognition systems. The technology promises stronger identity assurance, faster workflow access, and reduced patient misidentification, directly addressing HIPAA compliance and safety concerns. However, high...

Passwordless PostgreSQL: IAM Authentication with Pulumi
Pulumi now offers reusable components to enable AWS IAM authentication for Aurora PostgreSQL, allowing applications to connect using short‑lived tokens instead of static passwords. The setup provisions an RDS cluster with IAM authentication, creates IAM‑enabled database users, and configures IRSA...

The Cyber Siege of Private Practices: Are You at Risk?
The Identity Theft Resource Center’s 2025 Data Breach Report reveals a 79 % surge in U.S. data compromises, with 534 incidents targeting health‑care providers. Private‑practice physicians face precise, AI‑driven attacks that exploit patient records and vendor relationships. Transparency in breach notifications...