
AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+
Pindrop’s 2025 report reveals a 1,210% surge in AI‑enabled voice and virtual‑meeting fraud, dwarfing the 195% rise in traditional scams. Synthetic voice bots and deepfake executives are now bypassing contact‑center IVRs and infiltrating remote interviews, financial transactions, and other trust‑based interactions. Healthcare and retail sectors are hit hardest, with bots exploiting IVR reconnaissance to steal health‑savings accounts and orchestrate low‑value return fraud. The rapid, cheap, and scalable nature of AI fraud forces CISOs to rethink authentication and detection frameworks.

Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure
The U.S. healthcare sector experienced twice as many cyber breaches in 2025 as in 2024, with average insured losses exceeding $2 million per incident. Resilience’s analysis of claims data identified five high‑ROI controls that materially reduce risk, including anti‑fraud training, breach‑and‑attack...

Cisco, F5 Patch High-Severity Vulnerabilities
Cisco and F5 released emergency patches this week addressing multiple high‑severity flaws across their flagship products. Cisco fixed two critical bugs—CVE‑2026‑20119, a remote, unauthenticated DoS in TelePresence CE and RoomOS, and CVE‑2026‑20098, an authenticated file‑upload that grants root command execution...

Microsoft Launches LiteBox, a Security-Focused Open-Source Library OS
Microsoft unveiled LiteBox, an open‑source library operating system designed to act as a secure kernel layer for protecting guest kernels through hardware virtualization. Developed alongside the Linux Virtualization Based Security (LVBS) project, LiteBox runs security‑critical code in a hardened, isolated...

US FDA Reissues Cybersecurity Guidance to Reflect QMSR Transition and ISO 13485 Alignment
The FDA reissued its final medical‑device cybersecurity guidance on February 4, updating references to reflect the new Quality System Management Regulation (QMSR) that took effect on February 2. The revision aligns the guidance with ISO 13485:2016, embedding the international standard into the U.S....

AiStrike Introduces AI-Powered MDR to Reduce Costs and Alert Fatigue
AiStrike has launched AiStrike MDR, an AI‑powered managed detection and response service that replaces traditional human‑intensive SOCs with an AI‑led, expert‑guided model. The platform unifies threat intelligence, detection, investigation and response across cloud, endpoint and identity data, delivering automated triage...
Software Supply Chain Risks Join the OWASP Top 10 List, Access Control Still on Top
The 2025 OWASP Top 10 introduces software supply chain failures and mishandling of exceptional conditions as new entries, while broken access control retains the top spot after 20 years. Security misconfiguration rises to second place, and AI‑generated code is highlighted in the...

Smart Glasses Are Back, Privacy Issues Included
After the failure of Google Glass, smart glasses are re‑emerging, led by the Ray‑Ban Meta collaboration that blends fashion with AI‑enabled camera and microphone. Harvard students showed the device’s video can be fed into facial‑recognition systems to identify strangers, while...

Cyberhaven Introduces Unified AI and Data Security Platform
Cyberhaven launched a unified AI‑driven Data Security Posture Management platform that integrates DSPM, DLP, insider risk management and AI security across endpoints, SaaS, cloud and on‑prem environments. The solution leverages comprehensive data lineage and agentic AI to provide continuous visibility,...

Cybersecurity Planning Keeps Moving Toward Whole-of-Society Models
National governments are reshaping cybersecurity into whole‑of‑society frameworks that link risk management, workforce development, technology standards, and cross‑sector coordination. Centralized authorities act as hubs for incident response, intelligence sharing, and international cooperation, while private operators remain pivotal for critical infrastructure...

Measuring AI Use Becomes a Business Requirement
A Larridin survey reveals a 16‑point visibility gap between executives and directors on AI usage, highlighting pervasive shadow AI and fragmented governance. Large enterprises run an average of 23 AI tools, yet only 38 percent maintain a comprehensive inventory, leaving many...

Tribunal Partially Overturns Ruling on Bunnings Privacy Breach
The Administrative Review Tribunal (ART) partially overturned the Australian Information Commissioner’s finding that Bunnings breached privacy law with its facial‑recognition trial. While the tribunal accepted Bunnings’ reasonable belief that the technology was necessary to combat retail crime, it cleared the...
Two Ivy League Universities Had Donor Information Breaches. Will Donors Be Notified?
Harvard University disclosed a November phishing attack that exposed alumni, donor and limited staff data, while the University of Pennsylvania confirmed a ShinyHunters intrusion that accessed Salesforce, SAP and other systems, compromising roughly 1.2 million students, alumni and donors. Both breaches...

Tenable Pops After Blowout Earnings and Bullish 2026 Outlook
Tenable Holdings posted a strong fiscal fourth‑quarter, reporting adjusted earnings of $0.48 per share and revenue of $260.5 million, both surpassing analyst expectations. Year‑over‑year revenue grew 11% to $999.4 million, while calculated billings rose 8% to $327.8 million. The company added 502 new...
Threat Actors Hijack Web Traffic After Exploiting React2Shell Vulnerability: Report
Researchers at Datadog Security Labs report that threat actors are exploiting the React2Shell vulnerability (CVE‑2025‑55182) in React Server Components to compromise NGINX servers managed via Boato Panel, hijacking web traffic and redirecting users to malicious sites. The attacks target a...

IT Gives, Security Takes Away, and Configuration Drift Is the Hidden Cost
Configuration drift—incremental, often unnoticed changes to security settings—has become a major hidden threat for enterprises. Modern, hyper‑configurable security platforms and frequent temporary exceptions cause the drift to accelerate, eroding a company’s security posture over time. High‑profile breaches such as Colonial...

Insider Threat Cited in $22M Iowa Bank Fraud Case
Prosecutors allege that an Iowa bank employee colluded with Curtis Weston to create 66 fraudulent loans worth $22 million, exploiting customer information from a previous employer. The scheme used 26 stolen identities and cycled funds through multiple banks and an online...

Critical N8n Flaws Disclosed Along with Public Exploits
Multiple critical flaws identified as CVE‑2026‑25049 let any authenticated n8n user execute arbitrary code on the host server. The vulnerabilities stem from weak sandboxing of user‑written JavaScript and bypass the prior CVE‑2025‑68613 fix. Versions prior to 2.5.2 and 1.123.17 are...

AT&T Turns to Autonomous AI Agents to Slash Fraud and Customer Wait Times
AT&T is rolling out autonomous AI agents to combat spam and fraud calls while streamlining internal processes. The network‑integrated digital receptionist, ActiveArmor, engages unknown callers in real time, disconnecting suspicious interactions or taking messages. Internally, the company’s partnership with Microsoft...

Ingress-Nginx Vulnerability Enables Code Execution in Kubernetes
A critical vulnerability (CVE‑2026‑24512) in ingress‑nginx allows authenticated attackers to inject arbitrary Nginx directives via the rules.http.paths.path field, leading to code execution and secret disclosure in Kubernetes clusters. The flaw affects all ingress‑nginx releases before v1.13.7 and v1.14.3. Exploitation requires...

Reclaiming Privacy: The 8th Street’s Mission to Safeguard Spaces
The 8th Street, founded by former cybersecurity experts, is launching its flagship Hidden Camera Detector to combat the surge of covert surveillance in homes, offices, and hotels. The compact device combines RF and GPS detection to locate hidden cameras with...

What Is Malvertising and Protecting Yourself From Ad-Based Attacks Online
Malvertising—a form of malicious advertising—saw a 42% month‑over‑month surge in the first half of 2023, underscoring its rapid adoption by cybercriminals. A recent case involved Lowe’s employees being duped by spoofed Google ads that mimicked the MyLowesLife portal, leading to...

Don’t Panic: 0apt’s Listings and Data Leaks Are Fakes — Researchers
Researchers at DataBreach.com have uncovered that the new ransomware‑style group 0apt is not delivering real stolen data. The site lists high‑profile companies, but each download streams infinite random bits generated by /dev/random, producing only white noise. The tactic creates the...

Chrome Vulnerabilities Allow Code Execution and Browser Crashes
Google released a Chrome update that patches two high‑severity vulnerabilities, CVE‑2026‑1862 and CVE‑2026‑1861, affecting the V8 engine and libvpx video decoder. The V8 type‑confusion flaw can enable arbitrary code execution, while the libvpx heap overflow may cause crashes or be...

CISA: VMware ESXi Flaw Now Exploited in Ransomware Attacks
CISA confirmed that ransomware gangs are exploiting a high‑severity VMware ESXi sandbox‑escape flaw, CVE‑2025‑22225, which Broadcom patched in March 2025 alongside two related vulnerabilities. The vulnerability enables an arbitrary kernel write, allowing attackers with privileged VMX process access to break...

'A Bet for the Future of Cybersecurity' – Nord Security Hits 400 Patents as Race for Solutions Against Next-Gen Threats...
Nord Security announced it now holds over 400 patents worldwide, a four‑fold increase since 2023, underscoring a rapid escalation in its R&D efforts. The bulk of the filings target VPN protocols, advanced identity management, machine‑learning threat detection, and quantum‑resistant cryptography....

ACFW Firewall Test Prologue – Still Failing at the Basics
The forthcoming Advanced Cloud Firewall (ACFW) test reveals that a significant number of cloud firewall vendors are unable to block basic application‑layer attacks such as SQL injection, command injection, SSRF and API abuse, with detection rates often below 20%. While...

Global SystemBC Botnet Found Active Across 10,000 Infected Systems
Silent Push has identified more than 10,000 active SystemBC infections across data‑centre and government servers in the US, Europe and Asia. The multi‑platform proxy malware turns compromised hosts into SOCKS5 relays, a technique frequently observed before ransomware campaigns. A previously unknown...

Significant Ransomware & Firewall Misconfiguration Breach
Marquis, a fintech provider, suffered a ransomware breach traced to misconfigured legacy SonicWall firewalls and exposed backup files. The attackers leveraged publicly accessible configuration data to map the network and deploy ransomware without triggering traditional alerts. The incident highlights how...

When Documents Become the Attack Vector: Inside APT28’s Latest Microsoft Office Exploit
APT28, a Russia‑linked threat group, is exploiting a newly disclosed Microsoft Office zero‑day through crafted Office and RTF documents delivered via phishing emails. The vulnerability enables unauthorized code execution without macros, allowing lightweight loaders to establish command‑and‑control while evading traditional...

Google Ads Adds a Second Set of Eyes for High-Risk Account Changes
Google Ads has introduced multi‑party approval, a security layer that obliges a second administrator to sign off on high‑risk actions such as adding or removing users and changing roles. When an admin initiates such a change, an in‑product request is...

CISA Warns of Five-Year-Old GitLab Flaw Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has ordered all federal agencies to patch the five‑year‑old GitLab SSRF vulnerability (CVE‑2021‑39935) after confirming it is being actively exploited. The flaw, fixed by GitLab in December 2021, allows unauthenticated users to access...

ConnectSecure Introduces Linux Patching Capability to Simplify Cross-Distro Updates
ConnectSecure unveiled a cross‑platform Linux patching capability that consolidates updates for Red Hat, Ubuntu, Debian, and CentOS into a single console. The tool automates kernel and OS patch identification and deployment, cutting manual effort by up to 80 %. It also introduces...

The Double-Edged Sword of Non-Human Identities
Flare’s 2025 analysis uncovered more than 10,000 Docker Hub images exposing API keys, cloud tokens, and AI model credentials. The leaks illustrate how non‑human identities—tokens, service accounts, and workload identities—are embedded in containers and can persist for years, as seen...

New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure
Group‑IB uncovered new technical markers that expand the ShadowSyndicate cybercrime infrastructure, adding two fresh SSH fingerprints and revealing server‑transfer tactics that link dozens of servers to a single operator. The cluster consistently reuses OpenSSH keys and hosts on the same...

Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials
Chinese‑linked hacking group Mustang Panda launched a covert espionage campaign in late 2025, distributing counterfeit US diplomatic briefings to government officials across Asia and Eastern Europe. The malicious PDFs triggered infection simply by being opened, deploying the PlugX DOPLUGS downloader...
BOXX Unveils Complete Cyber and Tech E&O Coverage
BOXX Insurance launched Tech E&O by BOXX, a comprehensive errors‑and‑omissions policy tailored for technology firms ranging from startups to enterprises. The product combines traditional E&O with integrated cyber coverage, 24/7 incident response, and a risk‑management platform. It introduces novel protections...

TP-Link Vulnerabilities Let Hackers Take Full Control of Devices
TP‑Link disclosed nine critical authenticated command‑injection flaws in its Archer BE230 v1.2 router firmware, each assigned a separate CVE and scoring 8.5‑8.6 on the CVSS v4.0 scale. The vulnerabilities affect web, VPN, cloud, and configuration modules, allowing attackers with high‑privilege access to...

AI Drives Doubling of Phishing Attacks in a Year
Cofense reports that phishing attacks doubled in 2025, with security filters catching one malicious email every 19 seconds, up from one every 42 seconds in 2024. The surge is driven by AI, which threat actors now use as a core...

ID.me Appoints Former State Executive and Government Modernization Leader Mitch Melis as Field CTO, Public Sector
ID.me announced the appointment of Mitch Melis as Field Chief Technology Officer for the public sector. Melis will act as a trusted advisor to government agencies, helping them scale digital identity solutions while meeting compliance and fraud‑prevention requirements. He brings...

Why Moltbook Changes the Enterprise Security Conversation
Moltbook is a social platform where AI agents register, read, and post content autonomously, creating a hidden communication channel that bypasses traditional human‑centric security controls. Enterprises can deploy agents that interact with Moltbook long after an initial prompt, exposing data...
Essential Practices for Keeping Business Technology Fully Secure
Businesses face escalating cyber threats, making comprehensive technology security essential. The article outlines a layered strategy that starts with regular risk assessments to pinpoint vulnerabilities and allocate defenses. It emphasizes strong password policies, multi‑factor authentication, and automated software patching as...
MomentProof Deploys Patented Digital Asset Protection
MomentProof, Inc. has deployed its patented MomentProof Enterprise platform for AXA, enabling cryptographically sealed, AI‑resilient digital assets in the insurer's claims process. The technology certifies images, video, audio and metadata at capture, providing deterministic authenticity verification. AXA reports eliminated probabilistic...

Why Operational Threat Intelligence Needs AI Agents Now, Not Later
Operational threat intelligence is being overwhelmed by noise and slow manual processes, prompting a shift toward AI agents. Gartner highlights that most organizations lack end‑to‑end AI integration across the intelligence lifecycle, with only 43% reporting tangible benefits. AI agents can...

Microsoft Rolls Out Native Sysmon Monitoring in Windows 11
Microsoft has begun rolling out native Sysmon functionality to Windows 11 Insider builds in the Beta and Dev channels. The built‑in service mirrors the popular Sysinternals Sysmon tool, logging process, file and clipboard events to the Windows Event Log. It remains...
Former Nuance Communications Employee Facing More Charges in 2023 Geisinger Data Breach Case
Former Nuance Communications employee Max Vance has been hit with two additional false‑statement counts after a superseding indictment revealed he lied to FBI agents about downloading protected health information. The indictment follows his original charge of unlawfully accessing data belonging...

Banks Are Not Prepared for the Industrialization of Crypto Theft
Drainer‑as‑a‑Service (DaaS) platforms are industrializing crypto theft, letting low‑skill actors launch high‑value heists at scale. Traditional bank compliance, reliant on static blacklists, cannot keep pace with the real‑time, multi‑domain attacks these services enable. The author urges banks to shift from...
Noah Taps Sumsub for Reusable KYC
Financial infrastructure firm Noah has teamed up with identity‑verification specialist Sumsub to embed a reusable KYC framework across its platform. The integration enables users verified by any of Sumsub’s 4,000+ partner institutions to onboard on Noah‑powered wallets, exchanges and payment...

DMARC Alerts in Slack
EasyDMARC now pushes DMARC and email‑authentication alerts straight into Slack, turning a traditionally passive control into an active operational signal. The integration delivers high‑signal events—such as DNS record changes, authentication‑failure spikes, and policy shifts—complete with domain, severity and rationale, while...

SECNAP CloudJacket MXDR Integrates SOC, SIEM, and NDR
SECNAP Network Security launched CloudJacket MXDR, a managed extended detection and response platform that unifies SOC, SIEM, and NDR functions under a single pane of glass. Built on the patented CloudJacket foundation, the solution adds multi‑tenant capabilities, AI‑augmented analyst workflows,...