Cybersecurity Social Media and Updates

EU Parliament Bans AI Chatbots over US Data Security Concerns
SocialFeb 18, 2026

EU Parliament Bans AI Chatbots over US Data Security Concerns

The European Parliament banned AI chatbots like Claude and Copilot from lawmakers' devices, citing cybersecurity risks from cloud data uploads to US firms https://t.co/KCPJ57Qqs1 #ArtificialIntelligence #Innovation #Technology #Tech #TechNews https://t.co/uigKl4zdY7

By Tim Hughes
Researcher Traces Death Threats to Snowflake Hack Suspect
SocialFeb 18, 2026

Researcher Traces Death Threats to Snowflake Hack Suspect

When hacker named "Waifu" and "Judische" made death threats against security researcher Allison Nixon, she had no idea why he targeted her. So she set out to unmask him. The quest led her to Connor Moucka, a 25-yr-old behind infamous...

By Kim Zetter
AI and Quantum Forces Redefine Cybersecurity Strategies
SocialFeb 18, 2026

AI and Quantum Forces Redefine Cybersecurity Strategies

Why Cybersecurity Strategies and Frameworks Must Be Recalibrated in the Age of AI and Quantum Threats by @ChuckDBrooks https://t.co/KGZ9x9TO0T #CyberSecurity #ai #Quantum

By Chuck Brooks
AI-Integrated Security Boosts PANW Demand and Value
SocialFeb 18, 2026

AI-Integrated Security Boosts PANW Demand and Value

PANW strong q/good initial guide with CyberArk. The need for AI-native, integrated security platforms rather than fragmented point solutions is further increasing demand for PANW platform. AI increasing PANW’s value proposition-not displacing it. $225 PT..very well positioned🏆

By Dan Ives
Risk Assessments Are Performative; Focus on Impact, Not Count
SocialFeb 18, 2026

Risk Assessments Are Performative; Focus on Impact, Not Count

🔥🔥🔥 This hits on something that has bothered me for most of my career... Much of what orgs do to "assess risk" is largely performative, and has very little do with actual risk. Impact is what matters. Your AI Pentester Found...

By Casey Ellis
Siemens' OT Security Needs Centralized Certificate Management
SocialFeb 18, 2026

Siemens' OT Security Needs Centralized Certificate Management

With the TIA Portal and platforms like WinCC Unified, Siemens Industry is clearly strengthening its security capabilities. ✔️ Encrypted communication ✔️ Certificate-based authentication ✔️ Hardened PLCs, HMIs and drives Technically strong. No doubt. But let’s be honest: Where is the...

By Michael Grollmus
All Breaches Affect Limited Files; “Limited” Is Meaningless
SocialFeb 17, 2026

All Breaches Affect Limited Files; “Limited” Is Meaningless

Apparently, the hackers stole “a limited number of files”. Humour me here, but when does a breach ever *not* affect a limited number of files? I mean, when was the last breach you can remember that impacted an *unlimited* number...

By Troy Hunt
Continuous Security Audit Across 62,000+ Open Skills
SocialFeb 17, 2026

Continuous Security Audit Across 62,000+ Open Skills

We partnered with @socketsecurity, @snyksec, and @gendigitalinc to continuously audit https://t.co/NfXI7skfWe for security vulnerabilities. There are now 62,000+ skills in the open ecosystem https://t.co/rtwkKCBeBz

By Guillermo Rauch
Boards Pivot to Recovery as Breach Assumption Grows
SocialFeb 17, 2026

Boards Pivot to Recovery as Breach Assumption Grows

As more companies “assume breach,” I am seeing a shift from prevention to recovery. Boards are starting to ask different questions.

By Sean D. Mack
Deep Dive Into Weaponized Malicious SVG Files
SocialFeb 17, 2026

Deep Dive Into Weaponized Malicious SVG Files

Good read and research on malicious SVG file analysis and how it's weaponized by Adam Paulina @Binary_Defense https://t.co/65gf6f2XNn #BinaryDefense

By Dave Kennedy
Zero‑day Chrome Exploit, Chinese Telco Breach, AI‑crafted Malware
SocialFeb 17, 2026

Zero‑day Chrome Exploit, Chinese Telco Breach, AI‑crafted Malware

DHOM SitRep #002 just dropped. Chrome's first zero-day of 2026 is being exploited NOW. Chinese hackers owned ALL 4 Singapore telcos. And AI just built its first malware framework. Your weekly cybersecurity briefing — subscribe to Don't Hack On Me. https://t.co/eOI2j9M68A

By Marcus J. Carey
SMEs Must Expect Cyber Attacks, NCSC Warns
SocialFeb 17, 2026

SMEs Must Expect Cyber Attacks, NCSC Warns

SMEs Wrong to Assume They Won’t Be Hit by Cyber-Attacks: NCSC Boss War - Infosecurity Magazine https://t.co/DjHx7581nV

By Chuck Brooks
U.S. Unready for Potential GPS Attack, Warns Former NSA Chief
SocialFeb 17, 2026

U.S. Unready for Potential GPS Attack, Warns Former NSA Chief

"America is dangerously unprepared for a GPS attack," Adm. Michael Rogers, U.S. Navy (ret.), former commander of the U.S. Cyber Command and director of the National Security Agency. https://t.co/hYWXOZoxEZ

By John Spencer
Start Crypto Agility Now Before Quantum Day Arrives
SocialFeb 16, 2026

Start Crypto Agility Now Before Quantum Day Arrives

⏳ Data stolen today will be cracked tomorrow. Post-Quantum Cryptography (PQC) isn't a "next year" problem—it’s a multi-year migration that starts now. I’m looking for "Crypto Agility" on the floor at #RSAC2026. Are you ready for the Q-Day countdown? https://t.co/6PIC4o7OmO #QuantumSecurity...

By Tim Crawford
AI Agents Drive Traffic Surge, Prompt New Security Controls
SocialFeb 16, 2026

AI Agents Drive Traffic Surge, Prompt New Security Controls

As AI Agents Take on Tasks in the Real World, New Risks Emerge By 2026, human website visits drop 20% while machine-initiated traffic surges 40%. Zero-click economy emerging where personal AI negotiates on your behalf. Banks must authenticate agents, not just...

By Efi Pylarinou
AI Finds FFmpeg Overflow; Patience Beats Complexity
SocialFeb 16, 2026

AI Finds FFmpeg Overflow; Patience Beats Complexity

My son showed me one of the overflow vulnerabilities found in FFmpeg by Google/Deepmind’s security AI agents. I was thinking about how hard these things are to find, and at least this one didn’t seem deep — just required enormous...

By Matthew Green
Tailor Your Privacy with ZK—We’re the Experts
SocialFeb 16, 2026

Tailor Your Privacy with ZK—We’re the Experts

Reminder about Privacy: Privacy can mean a lot of things. Think about how you achieve privacy for different things in your daily life: An envelope gives you privacy for your mail. A window curtain provides privacy to your home. A lock screen maintains the...

By Eli Ben-Sasson
DIY BLE Test Achieves 800‑Foot Range with Omni Antenna
SocialFeb 15, 2026

DIY BLE Test Achieves 800‑Foot Range with Omni Antenna

My hack job of testing distance and range of BLE devices. Light enough to get lift with the drone still with an amplifier, high gain antenna, gps - and a mini computer. It’s all I had sitting around the shelves...

By Dave Kennedy
Modern Bluetooth Pacemakers Continuously Broadcast When Disconnected
SocialFeb 15, 2026

Modern Bluetooth Pacemakers Continuously Broadcast When Disconnected

Regarding this, there was a couple questions on does the pacemaker continue to advertise - most BLE implantable devices go into a sleep type mode. In this case, we are lucky - it does not. We know based on law enforcement...

By Dave Kennedy
Government Claim to Crack RSA 2048 Raises Skepticism
SocialFeb 15, 2026

Government Claim to Crack RSA 2048 Raises Skepticism

If someone tells me on The Post-Quantum World that the government cracked RSA 2048, I will certainly have a followup question.

By Konstantinos Karagiannis
Math's Impartial Power Powers ZK‑STARK Integrity
SocialFeb 15, 2026

Math's Impartial Power Powers ZK‑STARK Integrity

Math is the ultimate equalizer. It doesn’t bend based on who uses it. It doesn’t care who you are or how loud you shout. ZK-STARKs use math to verify integrity. They work the same whether operated by Darth Vader or Luke Skywalker.

By Eli Ben-Sasson
Iran Deploys Phone Tracking, Threatens Starlink Users
SocialFeb 14, 2026

Iran Deploys Phone Tracking, Threatens Starlink Users

Iran Turns to Digital Surveillance Tools to Track Down Protesters @nytimes https://t.co/7JUt5gcTW3 Iran's government most likely tracked the protesters through location data emitting from their phones, researchers later concluded. The move was part of a new phase by the authorities to...

By John Spencer
Government KYC Push Threatens App Privacy, Users May Flee
SocialFeb 14, 2026

Government KYC Push Threatens App Privacy, Users May Flee

Government push for AML/KYC on apps is alarming. Requiring biometrics and IDs for every request erodes privacy. While ZK solutions could help, mass data harvesting is a real concern. If KYC hits platforms like Discord, we will simply migrate. #Privacy...

By Ivan on Tech
Privacy Is a Year‑round Leadership Responsibility, Not a Weekly Event
SocialFeb 14, 2026

Privacy Is a Year‑round Leadership Responsibility, Not a Weekly Event

RT Data Privacy Week is over. Lawsuits, breaches, and AI experiments don't pause the other 51 weeks of the year. Privacy is now a leadership accountability issue, not a back office task. #CIO #CMO #CISO #DataPrivacy @Star_CIO https://t.co/Naq82FuMWZ

By Isaac Sacolick
QLDPC Cuts RSA‑2048 Attack to 100k Qubits
SocialFeb 14, 2026

QLDPC Cuts RSA‑2048 Attack to 100k Qubits

QLDPC for the win (and also a little bit scary) work by @IcebergQuantum reducing physical qubits to break RSA-2048 to only 100,000 which we probably aren’t that far away from. we aren’t ready for this. https://t.co/DUJQCeG72E

By Nick Farina
15 Minutes, Terminal Power Reveal OS X Implant
SocialFeb 14, 2026

15 Minutes, Terminal Power Reveal OS X Implant

Decided to try Claude by revisiting a malware analysis project that I originally presented at @objective_see in 2021: the CIA's OS X implant called Green Lambert. It's amazing what you can do with a terminal and ~15 min of free...

By Runa Sandvik
Quantum Computing Threatens Private Encrypted Data, Experts Warn
SocialFeb 13, 2026

Quantum Computing Threatens Private Encrypted Data, Experts Warn

I asked what else quantum could break @ChrisPeikert pointed out that we are overlooking the potential impact on our private encrypted data 👇 https://t.co/bFsCVAR5YD

By Laura Shin
AI Threatens Cryptography, Potentially Faster Than Quantum
SocialFeb 13, 2026

AI Threatens Cryptography, Potentially Faster Than Quantum

So apparently quantum isn't even the only thing we should be worried about?? 😅 AI could break cryptography too?? and possibly even faster than quantum @drakefjustin 👇 https://t.co/eeeNgYWKwx

By Laura Shin
China's Expedition Cloud Trains Hackers on Replica Critical Networks
SocialFeb 13, 2026

China's Expedition Cloud Trains Hackers on Replica Critical Networks

Leaked files detail a training platform called "Expedition Cloud" that is designed to allow China's hackers to practice hacking critical infrastructure of China’s opponents in South China Sea and Indochina region using replicas of those networks https://t.co/jbJhbj9JRi

By Kim Zetter
Boards Must Prioritize Cyber‑Risk Oversight, Says Expert
SocialFeb 13, 2026

Boards Must Prioritize Cyber‑Risk Oversight, Says Expert

My comments on the role of corporate boards in overseeing the management of cyber-risk. In today's New York Post. Link on my website... Type JS.TC into any web browser.

By Joseph Steinberg
Top 50+ AI Governance Predictions Leaders Must Prioritize
SocialFeb 13, 2026

Top 50+ AI Governance Predictions Leaders Must Prioritize

Digital transformation is hitting a new phase. These 50+ expert predictions on agentic AI, governance, and security outline what leaders must prioritize now. #DigitalTransformation #AI #CISO https://t.co/zhlbEwiusI

By Isaac Sacolick
Cross‑platform Tool Scans Bluetooth, Resolves Private Addresses
SocialFeb 13, 2026

Cross‑platform Tool Scans Bluetooth, Resolves Private Addresses

Just released a new tool that scans for Bluetooth devices including Bluetooth Low Energy (BLE) devices. It will scan for all, filtered by MAC, or if you have the Identity Resolving Keys (IRK), can be used to determine the Resolvable...

By Dave Kennedy
Key Cybersecurity Essentials for Customer-Facing Platforms
SocialFeb 13, 2026

Key Cybersecurity Essentials for Customer-Facing Platforms

Securing The Front Line: #Cybersecurity Essentials For Customer-Facing Platforms - B2B Marketing Blog | Webbiquity - https://t.co/zi7jypeOqC

By Tom Pick
9 Unvarnished Cybersecurity Truths CIOs Must Confront
SocialFeb 13, 2026

9 Unvarnished Cybersecurity Truths CIOs Must Confront

Beyond the Hype: 9 Cybersecurity Realities CIOs Must Face at RSAC 2026 #CIO #Cybersecurity #RSAC #RSAC2026 #AI https://t.co/l36K8t0RcX

By Tim Crawford
Email: From Simple File Sharing to Chaos
SocialFeb 13, 2026

Email: From Simple File Sharing to Chaos

Email probably started off as a guy just trying to send himself a file, and then it got completely out of control

By SwiftOnSecurity
Fake AI Chrome Extensions Steal Credentials From 300K Users
SocialFeb 13, 2026

Fake AI Chrome Extensions Steal Credentials From 300K Users

🚨 Fake AI Chrome extensions with 300K users steal credentials, emails | Cybersecurity Here are the Extensions: 1️⃣ AI Sidebar (gghdfkafnhfpaooiolhncejnlgglhkhe) – 70,000 users 2️⃣ AI Assistant (nlhpidbjmmffhoogcennoiopekbiglbp) – 60,000 users 3️⃣ ChatGPT Translate (acaeafediijmccnjlokgcdiojiljfpbe) – 30,000 users 4️⃣ AI GPT (kblengdlefjpjkekanpoidgoghdngdgl) – 20,000...

By Efi Pylarinou
Bluetooth Pacemakers Could Be Tracked via War‑Driving
SocialFeb 13, 2026

Bluetooth Pacemakers Could Be Tracked via War‑Driving

For the Nancy Guthrie case, an idea and maybe a crazy one but she had a pacemaker which often implantable devices use bluetooth such as Medtronic's. Couldn't you war-drive (drones even better) with a high gain antenna with amplifiers -...

By Dave Kennedy
Identity Protection Is Key to Combating Fraud
SocialFeb 13, 2026

Identity Protection Is Key to Combating Fraud

Why Identity Protection and Cybersecurity Are Central to Fighting Fraud by @ChuckDBrooks https://t.co/hftYQY0W6B #cybersecurity #fraud

By Chuck Brooks
Hash‑based Crypto: Blockchain’s Timeless Security Foundation
SocialFeb 12, 2026

Hash‑based Crypto: Blockchain’s Timeless Security Foundation

“One of the goals of blockchains is that they’re going to be securing hundreds of trillions of dollars over centuries. hash based cryptography is believed to stand the test of time and is the most minimal assumption that you could...

By Laura Shin
Ethereum Targets Post‑quantum Cryptography Upgrade by 2029
SocialFeb 12, 2026

Ethereum Targets Post‑quantum Cryptography Upgrade by 2029

“The plan right now is to upgrade every single piece of Ethereum cryptography to be post quantum secure by 2029.” — Justin Drake (@drakefjustin), Researcher at the Ethereum Foundation https://t.co/bbNeyUmOCj

By Laura Shin
Unified Standards Prevent Cryptographic Disasters and Incompatibility
SocialFeb 12, 2026

Unified Standards Prevent Cryptographic Disasters and Incompatibility

“It’s very good if the industry can all agree on one standard so that things are interoperable, you get many fewer cryptographic disasters or unexpected incompatibilities or security issues.” — @ChrisPeikert, Professor, CSE, University of Michigan https://t.co/bbNeyUmOCj

By Laura Shin
Ethereum’s Three Core Cryptos Found Vulnerable
SocialFeb 12, 2026

Ethereum’s Three Core Cryptos Found Vulnerable

“For Ethereum specifically, there’s three pieces of cryptography that are vulnerable: ECDSA, BLS signatures, and KCG.” — Justin Drake (@drakefjustin), Researcher at the Ethereum Foundation https://t.co/bbNeyUmOCj

By Laura Shin
Native Account Abstraction Enables Safe Blockchain Agents
SocialFeb 12, 2026

Native Account Abstraction Enables Safe Blockchain Agents

A question about AI and blockchain: What makes a blockchain Agent friendly? One possible answer I heard from @AbdelStark: Safety through Native Account Abstraction Suppose you give your agent some money to transact on your behalf. The agent could go rogue,...

By Eli Ben-Sasson
AI Is Already Simplifying Online Scams, Experts Warn
SocialFeb 12, 2026

AI Is Already Simplifying Online Scams, Experts Warn

AI is already making online swindles easier. It could get much worse. Some cybersecurity researchers say it’s too early to worry about AI-orchestrated cyberattacks. Others say it could already be happening. #fintech #tech #finserv #AI @BetaMoroney @efipm @BrettKing @spirosmargaris @jasuja @enricomolinari @mikeflache https://t.co/xbcVW86X8z

By Richard Turrin
Ex‑Trenchant Exec Sold Internal Hacks to Russian Broker
SocialFeb 12, 2026

Ex‑Trenchant Exec Sold Internal Hacks to Russian Broker

Former exec at exploit development firm Trenchant, owned by L3Harris, admitted to selling internal hacking tools to a Russian broker. Did the company notify the vendors whose products were exploited so that they could be patched? https://t.co/4wKJgZoIkl

By Runa Sandvik
1994 Lillehammer Winter Olympics Suffer First Major Cyber Attack
SocialFeb 12, 2026

1994 Lillehammer Winter Olympics Suffer First Major Cyber Attack

On this day in 1994, the winter Olympics in Lillehammer were hit with a cyber attack. https://t.co/AZfPpQUjAr https://t.co/xox3MFDt75

By Mikko Hypponen
Recruiters Overlook Security While Demanding Identity Verification
SocialFeb 11, 2026

Recruiters Overlook Security While Demanding Identity Verification

I just saw a Recruiter say "people share their data with every app out there, I don't understand why adding extra security layers to the ATS asking people to verify their identity is a problem."

By Dani (DEI by Dani)
Vercel Sandbox Adds Simple Network Isolation Support
SocialFeb 11, 2026

Vercel Sandbox Adds Simple Network Isolation Support

Vercel Sandbox isolation levels: ✅ Compute & memory resource isolation ✅ Filesystem and durability isolation 🆕 Network isolation Wild how easy this is: --𝚊𝚕𝚕𝚘𝚠𝚎𝚍-𝚍𝚘𝚖𝚊𝚒𝚗 (CLI) or 𝚗𝚎𝚝𝚠𝚘𝚛𝚔𝙿𝚘𝚕𝚒𝚌𝚢 in 𝚂𝚊𝚗𝚍𝚋𝚘𝚡.𝚌𝚛𝚎𝚊𝚝𝚎. Try it out: https://t.co/UoWXCW9Ien

By Guillermo Rauch
Aave V4 Security Audit Published, Thanks Trail of Bits
SocialFeb 10, 2026

Aave V4 Security Audit Published, Thanks Trail of Bits

The first Aave V4 security audit is now public. Big thanks to the @trailofbits team for the effort.

By Stani Kulechov