Cybersecurity Social Media and Updates

AI Agents Can Breach Chatbots, Heralding AI‑vs‑AI Warfare
SocialMar 14, 2026

AI Agents Can Breach Chatbots, Heralding AI‑vs‑AI Warfare

An AI agent reportedly hacked a chatbot and gained full read-write access in just two hours. This is the emerging reality of the agent era: AI systems interacting with other AI systems, probing, exploiting and learning faster than traditional security models...

By Spiros Margaris
Reddit 2026: AI Threats Eclipse Classic Phishing Concerns
SocialMar 14, 2026

Reddit 2026: AI Threats Eclipse Classic Phishing Concerns

From Phishing to AI Chaos: What My Analysis of All Reddit CyberSecurity Discussions So Far in 2026 Revealed. By late January 2026, the threads already buzzing with upvotes and sharp commentary were not chasing sci-fi nightmares or unproven breakthroughs. https://t.co/LF7w9E3mMR

By Dez Blanchfield
Instagram Should Default to Encryption, Not Cancel It
SocialMar 14, 2026

Instagram Should Default to Encryption, Not Cancel It

Instagram should’ve made end-to-end encryption the default for everyone, not shut it down because “very few people were opting in.” https://t.co/dc2xX4WNbt https://t.co/HLmKFqGLOD

By Runa Sandvik
AI Purchasing Agents Spark New Regulatory and Fraud Risks
SocialMar 13, 2026

AI Purchasing Agents Spark New Regulatory and Fraud Risks

AI agents controlling purchasing decisions? This opens doors to new regulatory and fraud challenges. Just like with humans, granting too much authority without checks can lead to significant risks. #AIFraud #Cybersecurity https://t.co/MRMusydajg

By Eric Kimberling
Meta Drops Instagram DM End‑to‑end Encryption
SocialMar 13, 2026

Meta Drops Instagram DM End‑to‑end Encryption

Meta appears to be reversing its strong stance on encryption. The first obvious casualty is that they’re abandoning and disabling end-to-end encryption in Instagram DMs.

By Matthew Green
Linux Community Deems New CA Law Ridiculous, Unenforceable
SocialMar 13, 2026

Linux Community Deems New CA Law Ridiculous, Unenforceable

As I read and listen to responses to the new CA law, a theme emerged: the Linux community thinks this is ridiculous and is unlikely to comply (and compliance would be next to impossible to enforce...) https://t.co/hiQJkTfESN

By Paul Asadoorian
Android 17 Beta 2 Cracks Down on Accessibility Misuse
SocialMar 13, 2026

Android 17 Beta 2 Cracks Down on Accessibility Misuse

Advanced Protection Mode in Android 17 Beta 2 starts clamping down on apps that misuse accessibility services But these could include your favorite automation tools, launchers, or customization apps. ✅ Details - https://t.co/UQzdvkVExT https://t.co/MkNBVjjIfa

By AssembleDebug (Shiv)
Meta Strips End-to-End Encryption From Instagram DMs
SocialMar 13, 2026

Meta Strips End-to-End Encryption From Instagram DMs

A terrible step back for privacy and it's crazy that Meta announced this by updating a support page https://www.androidpolice.com/instagram-is-getting-rid-of-end-to-end-encryption-for-dms/

By Casey Newton
AI Agents Already Breaching Passwords—Security Must Evolve Fast
SocialMar 13, 2026

AI Agents Already Breaching Passwords—Security Must Evolve Fast

AI agents just published passwords and overrode security in lab tests. This isn't sci-fi—it's happening now. The question isn't IF autonomous AI will break rules, it's whether your security adapts faster than the threats. Are you concerned?

By Peter H. Diamandis
Beyond IAM: Governing AI-to-AI Authorization for CIOs
SocialMar 13, 2026

Beyond IAM: Governing AI-to-AI Authorization for CIOs

IAM isn't enough when AI agents are talking to AI agents (A2A). The new frontier is Authorization. How do you govern layers of access in a world of autonomous processes? The 9 realities every CIO must face: 🔗 https://t.co/l36K8t0jnp #Identity #CISO #RSAC2026 #CyberRisk

By Tim Crawford
New Cyber Strategy Emphasizes Deterrence for National Security
SocialMar 13, 2026

New Cyber Strategy Emphasizes Deterrence for National Security

Cyber Focus: Cybersecurity, National Security, and Critical Infrastructure S3E10 - Deterrence and the New Cyber Strategy with White House National Cyber Director Sean Cairncross | McCrary Institute https://t.co/PmPdYTO5Zq

By Chuck Brooks
EU Advances Message Scanning, Yet Dark Timeline Persists
SocialMar 13, 2026

EU Advances Message Scanning, Yet Dark Timeline Persists

The EU seems to be going in the right direction when it comes to mass message scanning. Unfortunately, the fact that this vote was necessary proves that we’re still in the dark timeline. https://t.co/Tci3GoLsPg

By Matthew Green
AI, 5G, IoT, Quantum Redefine Privacy and Security
SocialMar 13, 2026

AI, 5G, IoT, Quantum Redefine Privacy and Security

Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security https://t.co/P5qqtToeX8 #cybersecurity #ArtificialIntelligence #quantum #tech #book

By Chuck Brooks
Travel Miles Sold as Underground Currency, Costing Billions
SocialMar 13, 2026

Travel Miles Sold as Underground Currency, Costing Billions

Going the Extra Mile: Travel Rewards Turn into Underground Currency. 🏖️ ✈️ 💬 Airline miles were designed as rewards, however, in cybercrime markets, they are inventory. In many cases, the theft begins with credential compromise and ends with miles quietly converted...

By Efi Pylarinou
AI Vulnerable to Social Engineering‑Style Deception Tactics
SocialMar 13, 2026

AI Vulnerable to Social Engineering‑Style Deception Tactics

New on the not-a-newsletter... The Problem is Steve from Accounts ($$$) https://t.co/omSd1tEjla Traditional social engineering preys on trust, fear, and urgency. AI lacks psychology, at least as far as I know, but it can and will be exploited through analogous deceptions. https://t.co/y7CZrIEs8R

By Dave Birch
Stryker's Operations Disrupted by Iran-Linked Cyberattack
SocialMar 13, 2026

Stryker's Operations Disrupted by Iran-Linked Cyberattack

Stryker $SYK said a cyberattack related to the Iranian conflict is still disrupting its operations, including order processing, manufacturing and shipping - WSJ

By Evan – StockMKTNewz
Responsible AI Starts with Zero‑Trust Data Governance
SocialMar 12, 2026

Responsible AI Starts with Zero‑Trust Data Governance

RT You can't have responsible AI without responsible data. Classify AI data, extend zero trust, encrypt in use, and spell out non-negotiable governance policies from day one. #AISecurity #DataGovernance @Star_CIO https://t.co/aiB5P99ido

By Isaac Sacolick
Third‑Party Code Now Top Cloud Threat; AI Offers Remedy
SocialMar 12, 2026

Third‑Party Code Now Top Cloud Threat; AI Offers Remedy

Unfortunately for the vibrancy and velocity of modern developer ecosystems (something I’ve been bullish on for two decades), third-party software has now become the #1 initial access vector in cloud intrusions, jumping from under 3% to 44.5% of cases in...

By Dion Hinchcliffe
Edit AI Photos Safely: Faces Hidden, Realism Preserved
SocialMar 12, 2026

Edit AI Photos Safely: Faces Hidden, Realism Preserved

A new privacy-focused system enables users to edit and share photos with generative AI tools while keeping sensitive identity features, such as faces, hidden from external platforms, maintaining both photorealism and data security. privacybydesign

By Phys.org Threads
Threat Actors Now Favor Third‑party Software Flaws over Credentials
SocialMar 12, 2026

Threat Actors Now Favor Third‑party Software Flaws over Credentials

"For the first time since we began publishing the CTHR in 2021, we observed a tactical pivot by threat actors. They’re now targeting third-party software vulnerabilities more than weak or missing credentials as the primary initial access vector." https://t.co/wSC5lPPGAZ

By Richard Seroter
Cybercrime Costs Could Reach $10.5 T by 2025
SocialMar 12, 2026

Cybercrime Costs Could Reach $10.5 T by 2025

Cybercrime isn’t slowing. Costs could hit $10.5T by 2025, driven by nation-states, gangs, and a growing attack surface. With detection as low as 0.05% and 200 zettabytes of data ahead, cybersecurity is everyone’s business. https://t.co/XxxMna2fuJ

By Cristina Dolan
AI Agents Autonomously Hack Simulated Network, Bypass Security
SocialMar 12, 2026

AI Agents Autonomously Hack Simulated Network, Bypass Security

AI agents told to conduct routine tasks on a simulated corporate network went rogue. "No adversarial prompting was involved. The agents independently discovered vulnerabilities, escalated privileges, disabled security tools, and exfiltrated data." https://t.co/jDjDgPb5rk

By Kim Zetter
Secure Your Code: Guardrails for AI Assistants
SocialMar 12, 2026

Secure Your Code: Guardrails for AI Assistants

If your developers are using Copilot or Claude Cowork heavily, how are you handling the security side? Code context Internal repos Sensitive data exposure Feels like a lot of organizations adopted these tools before really thinking through the guardrails. What are you doing to protect...

By Sean D. Mack
AI Is Essential to Counter AI-Driven Cyberattacks
SocialMar 12, 2026

AI Is Essential to Counter AI-Driven Cyberattacks

You can’t defend against AI-driven cyberattacks without AI. Attackers move faster and automate everything. Humans alone can’t keep up. AI agents speed up detection, pattern analysis, and reporting—so CISOs focus on decisions, not dashboards. Learn More: https://bit.ly/4s2Is77 #ElasticPartner #Elastic #ArtificialIntelligence #CyberSecurity #Security #DigitalTransformation

By Ronald van Loon Threads
Age Verification Mandates Threaten Online Privacy
SocialMar 12, 2026

Age Verification Mandates Threaten Online Privacy

Will everyone have to share their age to exist on the internet in the future? It’s a trap: strong enforcement of age rules undermines data privacy. https://spectrum.ieee.org/age-verification

By IEEE Spectrum Threads
AI Amplifies Both Threats and Defenses in Cybersecurity
SocialMar 12, 2026

AI Amplifies Both Threats and Defenses in Cybersecurity

I got asked on the news today is Cybersecurity a field that is being impacted by AI or is it a safe field? I explained how I struggle with this personally as well - there's a lot of fear, uncertainty and...

By Dave Kennedy
2026 Unit 42 Report Reveals AI-Driven Cyber Threat Surge
SocialMar 12, 2026

2026 Unit 42 Report Reveals AI-Driven Cyber Threat Surge

Please read my article highlighting critical findings from the 2026 Unit 42 Global Incident Response Report (Link to full report incl) #AI #Cybersecurity #CISO @PaloAltoNtwks Unit 42 Link here👇 https://t.co/CT5ozHHKhM #AI #cybersecurity #CISO #PalAltoPartner #CybersphereGroup

By Shira Rubinoff
Banking Apps Leaked Other Customers' Transaction Details
SocialMar 12, 2026

Banking Apps Leaked Other Customers' Transaction Details

Lloyds, Bank of Scotland and Halifax apps showed customers other users' transactions https://t.co/eOyyiGggxP Can an informed person explain what actually went wrong here? I am so curious https://t.co/RE7RR6W41z

By Dave Birch
AI Redefines Cyberwar: From Iran to Code
SocialMar 12, 2026

AI Redefines Cyberwar: From Iran to Code

NEW ODD LOTS - CYBERWAR AND AI Legendary hacker @msuiche talks to me and @TheStalwart about cyber warfare in the age of AI. We talk: - Iran's capabilities - The intersection of kinetic & digital warfare - The impact of AI on coding, hacking, SaaS...

By Tracy Alloway
Secure Internal Collaboration: Best Practices for Companies
SocialMar 12, 2026

Secure Internal Collaboration: Best Practices for Companies

How To Ensure Secure Internal Collaboration in Your Company by @antgrasso #CyberSecurity #Infosec #IT #Technology https://t.co/gRUVC0kIFY

By Ron van Loon
Apple Urges iPhone Users to Restart Amid Security Threat
SocialMar 12, 2026

Apple Urges iPhone Users to Restart Amid Security Threat

Apple warns iPhone users of serious security risk, asks millions to restart devices. (MSN:Times Now) #Mobile #Security https://t.co/Cixh5A4GHc https://t.co/xLNE8J8ugk

By James Gingerich
AI Use Risks NDA Violations and Data Exposure
SocialMar 11, 2026

AI Use Risks NDA Violations and Data Exposure

Perplexity has changed my way of work. Love these guys. But not sure we use the word "secure" the same way. Strong protections on data, but both Perplexity and other models they exchange data with open up new threat...

By Bob Gourley
FBI Server Hacked; Hacker Threatens to Expose Owner
SocialMar 11, 2026

FBI Server Hacked; Hacker Threatens to Expose Owner

We live in the worst timeline ever. The FBI got hacked, and the hacker, disgusted at the PDF file images they saw and not realizing that it's a law enforcement server, threatened to turn the "owner of the server" over...

By Emin Gun Sirer
Assessing Threat Detection Quality: Key Metrics and Methods
SocialMar 11, 2026

Assessing Threat Detection Quality: Key Metrics and Methods

"How to Measure Threat Detection Quality for an Organization?" https://t.co/JKld8W1EsR <- this is OLD (2022), but I somehow keep thinking about it (this is from the pre-gen AI era BTW)

By Dr. Anton Chuvakin
AI Needs Human Oversight, Not Blame for Outages
SocialMar 11, 2026

AI Needs Human Oversight, Not Blame for Outages

If you are distressed because AI is causing outages at AWS well… don’t jump to conclusions like everyone did with the whole slew of S3 bucket debacles. Yes there will be problems as people learn how to use this new...

By Teri Radichel
OpenAI Builds AI Agents to Thwart Prompt Injection
SocialMar 11, 2026

OpenAI Builds AI Agents to Thwart Prompt Injection

Yep, the systems are evolving (like they have to...) OpenAI is addressing prompt injection inputs but also manipulation (social engineering) -> Designing AI agents to resist prompt injection Covers: *Social Engineering Model *Safe URL Mitigation *Source-Sink Analysis *Sandboxing *Safety training https://t.co/jduzjq6Ipk

By Glenn Gabe
Iran's IRGC Threatens US Tech Firms Linked to Israel
SocialMar 11, 2026

Iran's IRGC Threatens US Tech Firms Linked to Israel

Iran's IRGC warns that offices/infrastructure of US firms with links to Israel or whose technology has been used to assist the military will be targeted for physical attack. This includes infrastructure of Google, Palantir, Microsoft, IBM, Nvidia, Oracle https://t.co/M5nw4IhpCK

By Kim Zetter
DLP Reinvented: Jazz Uses NLP to Guard GenAI Data
SocialMar 11, 2026

DLP Reinvented: Jazz Uses NLP to Guard GenAI Data

Traditional DLP was built for email attachments and USB drives. That world is gone. Jazz raised $61M to rebuild DLP from scratch: natural language policies instead of regex. Every time someone pastes data into a GenAI tool, they create flows your DLP...

By Yves Mulkers
Secure Error Handling Prevents Sensitive Data Leaks
SocialMar 11, 2026

Secure Error Handling Prevents Sensitive Data Leaks

Do you think about security implications of your error handling in code? I do not, but that's because I'm a terrible developer who no longer ships production apps. But you probably are a good dev who avoids leaking info. Good @jetbrains...

By Richard Seroter
AI Powers Both Cyber Attacks and Defenses
SocialMar 11, 2026

AI Powers Both Cyber Attacks and Defenses

Hackers Are Automating Cyberattacks With AI. Defenders Are Using It to Fight Back. by @EddyTheGent https://t.co/SbgZ2RlWZg https://t.co/Dyw0vcKhD3

By Brian Ahier
Deepfakes Cost Companies Millions; Traditional Security Fails
SocialMar 11, 2026

Deepfakes Cost Companies Millions; Traditional Security Fails

Deepfakes aren’t sci-fi. They’re real threats. Cheap, convincing fakes fooled even experts: a 2024 UK finance team lost $25M to AI-generated leaders. Traditional security can’t verify if video or images are real. https://t.co/CpIymYGaON

By Cristina Dolan
AI Code Generation Risks Demand Full‑Lifecycle Security
SocialMar 11, 2026

AI Code Generation Risks Demand Full‑Lifecycle Security

AI code generation is fast, but is it secure? "Vibe Coding" is creating a massive surface area for malicious injections. We need to move beyond just "testing" to protecting the entire dev lifecycle. Read more on the AVOA briefing: 🔗 https://t.co/6PIC4o7OmO #AppSec #DevSecOps...

By Tim Crawford
Iranian Hacktivists Wipe Stryker Employee Devices in Cyberattack
SocialMar 11, 2026

Iranian Hacktivists Wipe Stryker Employee Devices in Cyberattack

US medical device maker Stryker hit with cyberattack from Iranian hacktivists who remotely wiped employee devices. "many employees have had their device data wiped and cannot access their accounts" Stryker makes surgical/imaging equipment, defibrillators https://t.co/PA2eBYjPfK

By Kim Zetter
Day 2 Highlights: Crowd Prioritizes Critical Infrastructure Security
SocialMar 11, 2026

Day 2 Highlights: Crowd Prioritizes Critical Infrastructure Security

Kicking off Day 2 at CS4CA in Houston. Great crowd focused on securing our most critical infrastructure.

By Sean D. Mack
Criminals Pose as Officials to Phish Zoning Permits
SocialMar 11, 2026

Criminals Pose as Officials to Phish Zoning Permits

Internet Crime Complaint Center (IC3) | Criminals Impersonating City and County Officials in Phishing Emails for Planning and Zoning Permits https://t.co/0OYWx6RyqL

By Chuck Brooks
Google Acquires Wiz to Boost Cloud Security
SocialMar 11, 2026

Google Acquires Wiz to Boost Cloud Security

$GOOGL completes the Wiz acquisition. Sundar Pichai, CEO, Google: “Keeping people safe online has always been part of Google’s mission. This job is increasingly important today, as more companies and governments move their work to the cloud and broadly use generative...

By StockOpine (individual investors)
Google Pays $32B for Wiz, Now $1B ARR
SocialMar 11, 2026

Google Pays $32B for Wiz, Now $1B ARR

Google completes $32B acquisition of cloud cybersecurity startup Wiz A source familiar says Wiz crossed $1B in ARR in 2025. https://t.co/1vJmMDOHh1 via @techcrunch

By Rebecca Bellan
Key Takeaways From 2026 Unit 42 Incident Report
SocialMar 11, 2026

Key Takeaways From 2026 Unit 42 Incident Report

Great conversation with @PaloAltoNtwks Unit 42, where we discussed critical insights from the 2026 Unit 42 Global Incident Response Report. 📍FULL episode here👇 https://t.co/FBcQYVqIr1 📍Read the Report👇 https://t.co/4qBLvLzTTF #cybersecurity #AI #CISO #AI #PaloAltoPartner https://t.co/v9lUBQfN3E

By Shira Rubinoff
AI Era Demands Robust Security and Power Resilience
SocialMar 11, 2026

AI Era Demands Robust Security and Power Resilience

The Critical Importance of Security and Power Resilience for Data Centers in the AI Era by @ChuckDBrooks https://t.co/GZHzYef4B8 #datacenter #cybersecurity

By Chuck Brooks