fookhwa.bsky.social
@fookhwa.bsky.social
Romania's oil pipeline operator Conpet confirms data stolen in attack
Romania's oil pipeline operator Conpet confirms data stolen in attack
Romania's national oil pipeline operator, Conpet S.A., confirmed that the Qilin ransomware gang stole company data in an attack last week.
ift.tt
February 18, 2026 at 2:44 PM
Google says hackers are abusing Gemini AI for all attacks stages
Google says hackers are abusing Gemini AI for all attacks stages
Google Threat Intelligence Group (GTIG) has published a new report warning about AI model extraction/distillation attacks, in which private-sector firms and researchers use legitimate API access to…
ift.tt
February 18, 2026 at 11:34 AM
Democratization of Danger: Preserving Liberty and Human Agency in the Age of Super-Empowered Individuals buff.ly/KX7Wct9
Democratization of Danger: Preserving Liberty and Human Agency in the Age of Super-Empowered Individuals
By Dr. David Bray and Jeff Jonas Executive Summary The democratization of technology has created the democratization of danger. Individuals and small
buff.ly
February 17, 2026 at 2:44 PM
Healthcare Remains the Sector Most Targeted by Ransomware Groups as Attacks Increase 49% YOY
Healthcare Remains the Sector Most Targeted by Ransomware Groups as Attacks Increase 49% YOY
A new record was set for ransomware attacks last year, with disclosed ransomware attacks increasing by 49% year-over-year to a record-high of 1,174 Globally, ransomware attacks increased by 49% year…
buff.ly
February 17, 2026 at 11:34 AM
Dutch telco Odido suffers data breach exposing data of 6.2 million customers
Dutch telco Odido suffers data breach exposing data of 6.2 million customers
Telecom provider Odido has disclosed a data breach affecting 6.2 million clients, after hackers gained access to its customer contact system.
buff.ly
February 16, 2026 at 2:44 PM
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
buff.ly
February 16, 2026 at 11:34 AM
United Airlines CISO on building resilience when disruption is inevitable - Help Net Security
United Airlines CISO on building resilience when disruption is inevitable - Help Net Security
United Airlines CISO shares how aviation cybersecurity strategy balances modernization, safety-critical systems, resilience, and risk.
buff.ly
February 15, 2026 at 2:44 PM
Microsoft 365 outage takes down admin center in North America
Microsoft 365 outage takes down admin center in North America
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center.
ift.tt
February 15, 2026 at 11:34 AM
Shai-hulud: The Hidden Costs of Supply Chain Attacks
Shai-hulud: The Hidden Costs of Supply Chain Attacks
Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.
ift.tt
February 14, 2026 at 2:44 PM
Google Calls on Governments And Industry to Prepare Now For Quantum-Era Cybersecurity
Google Calls on Governments And Industry to Prepare Now For Quantum-Era Cybersecurity
Google is urging governments and industry to accelerate adoption of post-quantum cryptography based on progress in quantum computing.
buff.ly
February 14, 2026 at 11:34 AM
Why Cybersecurity Is Becoming the Backbone of Modern Global Commerce buff.ly/JX2Y9A4
Why Cybersecurity Is Becoming the Backbone of Modern Global Commerce
Global trade transactions were conducted through stamped documents, physical inspections, and lengthy approval chains. Today’s transaction...
buff.ly
February 13, 2026 at 2:44 PM
RenEngine campaign infected 400,000 users via cracked games
RenEngine campaign infected 400,000 users via cracked games
Dual-stage RenEngine malware spreads via pirated AAA games, infecting 400,000+ systems worldwide with stealthy loaders and info-stealing payloads.
buff.ly
February 13, 2026 at 11:34 AM
EU tightens cybersecurity law to keep Chinese risks out of vital networks - Cybersec 365 buff.ly/SKUIscU
EU tightens cybersecurity law to keep Chinese risks out of vital networks - Cybersec 365
The ongoing cyber attacks and espionage from China are forcing the EU to tighten the Cybersecurity Regulation. The EU’s failing approach also requires a harder line.
buff.ly
February 12, 2026 at 2:44 PM
Romanian oil pipeline operator Conpet discloses cyberattack
Romanian oil pipeline operator Conpet discloses cyberattack
Conpet, Romania's national oil pipeline operator, has disclosed that a cyberattack disrupted its business systems and took down the company's website on Tuesday.
ift.tt
February 12, 2026 at 11:34 AM
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
China-linked DKnife framework uses router-level AitM implants for traffic hijacking, credential theft, and malware delivery targeting edge devices.
ift.tt
February 11, 2026 at 2:44 PM
German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
Germany’s BSI and BfV warn of state-linked Signal phishing using fake support chats, PIN theft, and device linking to access sensitive accounts.
ift.tt
February 11, 2026 at 11:34 AM
Global SystemBC Botnet Found Active Across 10,000 Infected Systems
Global SystemBC Botnet Found Active Across 10,000 Infected Systems
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure
buff.ly
February 10, 2026 at 2:44 PM
Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security
Cybersecurity planning keeps moving toward whole-of-society models - Help Net Security
National cybersecurity strategy guides governments on risk management, workforce planning, standards, and public private coordination.
buff.ly
February 10, 2026 at 11:34 AM
Navigating the AI Revolution in Cybersecurity: Risks, Rewards, and Evolving Roles buff.ly/NgAiHS9
Navigating the AI Revolution in Cybersecurity: Risks, Rewards, and Evolving Roles
The integration of AI in cybersecurity is reshaping the way we defend against threats. Insights from Darktrace’s 2026 State of AI Cybersecurity Report reveal that while 96% of cybersecurity…
buff.ly
February 9, 2026 at 2:44 PM
GRC Should Fear Agentic AI (But Not Why You Think)
GRC Should Fear Agentic AI (But Not Why You Think)
Agentic AI won't replace GRC teams, but it will eliminate excuses for not delivering strategic value. The real fear? Missing this defining moment.
buff.ly
February 9, 2026 at 11:34 AM
How AI assistance impacts the formation of coding skills
How AI assistance impacts the formation of coding skills
Anthropic is an AI safety and research company that's working to build reliable, interpretable, and steerable AI systems.
t.co
February 8, 2026 at 2:44 PM
10 must-have security technologies in 2026 | TechTarget
10 must-have security technologies in 2026 | TechTarget
From shadow AI detection to unified intelligence platforms, discover the security technologies that will help CISOs defend against 2026's cyberthreats.
buff.ly
February 8, 2026 at 11:34 AM
Data sovereignty creates an illusion of security: the real battle is software integrity buff.ly/9Pz9teL
Data sovereignty creates an illusion of security: the real battle is software integrity
Software integrity, not data sovereignty, is the real security battle
buff.ly
February 7, 2026 at 2:44 PM
Standardizing Cyber Analytics to Secure Critical Infrastructure buff.ly/D2WetLo
Standardizing Cyber Analytics to Secure Critical Infrastructure
A Johns Hopkins APL team has developed a framework for standardizing alerts transmitted by cybersecurity systems defending critical infrastructure, dramatically improving the efficiency with which…
buff.ly
February 7, 2026 at 11:34 AM
LLMs Hijacked, Monetized in 'Operation Bizarre Bazaar'
LLMs Hijacked, Monetized in ‘Operation Bizarre Bazaar’
An LLMjacking operation has been targeting exposed LLMs and MCPs at scale, for commercial monetization.
ift.tt
February 6, 2026 at 2:44 PM