All Articles (2866)

Sort by

31083911684?profile=RESIZE_400xIt's happening: AI bots are starting to organize in their own digital societies.  The kicker?  The humans are setting up institutions for them.  Are we digging our own graves?  For now, there's some reason to believe what's going on is more hype than substance.  But while it's the first time we have seen some things, they're a continuation of the agentic AI theme that's been building for about a year.  It wouldn't be surprising if more is on the way.

Even OpenAI CEO Sam Altman is on edge this we

31084129900?profile=RESIZE_400xOllama is an open-source framework that enables users to run large language models locally on their own hardware. By design, the service binds to localhost (127.0.0.1) on port 11434, making instances accessible only from the host machine. However, exposing Ollama to the public internet requires only a single configuration change: setting the service to bind to 0.0.0.0 or a public interface.  At scale, these individual deployment decisions aggregate into a measurable public surface.[1]

Over the p

31083991870?profile=RESIZE_400xA new report from Cyfirma has identified a sophisticated Android application, "Hicas," which, while masquerading as a "Smart Travel Packing Companion" on the Google Play Store, covertly functions as a fraudulent loan platform.  The app, which has amassed over 500,000 downloads, specifically targets users in India, raising significant concerns about financial crime and data privacy.  Initially appearing as a legitimate utility designed to assist travelers with packing, Hicas presented itself inno

31083817296?profile=RESIZE_400xAn Anthropic staffer who led a team researching AI safety departed the company on 9 February, darkly warning both of a world “in peril” and the difficulty in being able to let “our values govern our actions” without any elaboration in a public resignation letter that also suggested the company had set its values aside.

Anthropic safety researcher Mrinank Sharma's resignation letter garnered 1 million views by the 9th

Mrinank Sharma, who had led Anthropic’s safeguards research team since its la

31082589682?profile=RESIZE_400xThe Center for Strategic and International Studies (CSIS) has provided a research paper on maritime cyber security.  Maritime ports underpin the global economy, handling over 80% of trade by volume.  In recent decades, ports have increasingly digitized, integrating automated terminals, networked operational technology (OT), and data-driven management systems.  While digitization increases port productivity, it also introduces acute cyber vulnerabilities.  Absent significant cybersecurity improve

31083916056?profile=RESIZE_400xSocial media has overtaken email as the primary channel for online scams in the UK, accounting for 34% of reported incidents according to recent research.  This shift highlights growing concerns over fraudulent content on platforms such as Facebook and Instagram, particularly in finance-related advertising.  A new analysis by BrokerChooser examined over 1,200 active finance-related ads in the Meta Ads Library to assess exposure to high-risk promotions across multiple countries.  The study classi

31083794285?profile=RESIZE_400xA surge in ShinyHunters SaaS data theft incidents has been linked to highly targeted voice phishing (vishing) campaigns that combine live phone calls with convincing, company-branded phishing sites.

In these attacks, threat actors impersonate corporate IT or helpdesk staff and contact employees directly, claiming MFA settings need urgent updates. Victims are then guided to fake SSO portals designed to capture credentials and MFA codes.

According to reports released this week from Okta and Mandia

31083739686?profile=RESIZE_400xA new security feature rolled out to select models of the latest iPhones and iPads will make it more difficult for law enforcement, spies, and malicious hackers to obtain a person’s precise location data from their phone provider.  According to Apple, the new feature, when enabled, limits the precision of location data that iPhones and cellular-enabled iPads share with the customer’s cell carrier.  Sharing a less precise location, such as the general neighborhood rather than a street address, wi

31081890280?profile=RESIZE_400xRed Sky Alliance recently heard a Podcast presented by the Torch, which highlighted US law enforcement sources explaining the hazards of the gaming platform RoBlox.  This is a popular game frequented by children of various ages.  Questions arise asking: Is your kid begging for a Roblox account or more screen time to play it?  Have you noticed your child chatting online while playing Roblox?  If these issues have cropped up in your household, you may wonder whether Roblox is safe for kids.[1]

Rob

31081711874?profile=RESIZE_400xTouch the back of a laptop, and the warmth you feel is energy that has already been paid for, processed by chips, and then dissipated as heat.  The work by Toshimasa Fujisawa and colleagues, reported in Communications Physics as “Efficient heat-energy conversion from a non-thermal Tomonaga-Luttinger liquid” and summarized in the TechXplore piece “A new approach to energy harvesting opened up by the quantum world,” asks a simple but radical question: what if that waste heat could be turned back i

31081878093?profile=RESIZE_400xNew research from Truesec reports that a newly formed Russian hacker alliance, calling itself the Russian Legion, has issued a warning of an imminent large-scale cyberattack against Denmark, code named ‘OpDenmark.’  The alliance, led by the hacker group Cardinal and comprising The White Pulse, Russian Partizan, and Inteid, was publicly announced last week.  Meanwhile, Inteid is linked to a recent DDoS attack targeting Denmark’s health portal, sundhed.dk.[1]  “The first threat was published on th

31081880271?profile=RESIZE_400xHacking Moltbook: The AI Social Network Any Human Can Control - Moltbook, the weirdly futuristic social network, has quickly gone viral as a forum where AI agents post and chat.  But what researchers discovered tells a different story and provides a fascinating look into what happens when applications are vibe-coded into existence without proper security controls.

Analysts at Wiz Research identified a misconfigured Supabase database belonging to Moltbook, allowing full read and write access to a

31081220701?profile=RESIZE_400xAs the Milano Cortina 2026 Winter Olympics approach, cybersecurity researchers and industry experts warn that the Games will once again serve as a high-value convergence point for cybercrime, espionage, and politically motivated disruption.  According to Palo Alto Networks' Unit 42, nation-state actors, cybercriminal groups, and hacktivists are expected to target Olympic-related infrastructure not only for short-term impact but also for long-term access, intelligence collection, and global visib

31081743678?profile=RESIZE_400xSocial media has overtaken email as the primary channel for online scams in the UK, accounting for 34% of reported incidents according to recent research.  This shift highlights growing concerns over fraudulent content on platforms such as Facebook and Instagram, particularly in finance-related advertising.  A new analysis by BrokerChooser examined over 1,200 active finance-related ads in the Meta Ads Library to assess exposure to high-risk promotions across multiple countries.  The study classi

31081240852?profile=RESIZE_400xAI coding assistants have long since moved beyond autocomplete.  Agentic IDEs now read your project, plan multi-step changes, call tools, install libraries, and quietly edit your codebase.  To support that workflow, tools like Claude Code include support for third-party plugin marketplaces. Connect a marketplace.  Enable a plugin.  Your agent gains new “skills” for tests, infra, migrations, and dependency management.   OpenAI has adopted a similar pattern for tools, so to be clear, this is not a

31081220470?profile=RESIZE_400xCybersecurity and data privacy have moved well beyond the IT function; they are now central legal, regulatory, and enterprise-risk concerns.  According to Norton Rose Fulbright's 2026 Annual Litigation Trends Survey, cybersecurity exposure continues to escalate for US organizations, even as overall litigation volumes decline modestly.  The findings reflect the reality that cybersecurity leaders already recognize breaches are no longer just technical failures.  They trigger regulatory scrutiny, c

31081199664?profile=RESIZE_180x180Russia's unconventional warfare against Europe has intensified significantly, with hostile cyber operations and sabotage activities almost quadrupling in 2025.  A new analysis from the International Institute for Strategic Studies (IISS) reveals a concerted campaign targeting critical infrastructure, aiming to destabilize governments and weaken support for Ukraine.  This "shadow war" operates below the threshold of declared conflict yet inflicts substantial cumulative damage across the continent

31079499076?profile=RESIZE_400xThe "coordinated" cyber-attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew known as ELECTRUM.

Operational technology (OT) cybersecurity company Dragos, in a new intelligence brief published Tuesday, described the late December 2025 activity as the first major cyber-attack targeting distributed energy resources (DERs).  "The attack affected communication and control systems at combined heat and power (C

31079504884?profile=RESIZE_400xCyberattacks are often described as technical failures, yet anyone who has lived through a major outage or breach knows that the real shockwaves travel through people, not machines.  A recent study published in Engineering, Construction and Architectural Management on the Florida water plant hack makes this point vividly clear.  Paired with reporting from TechXplore’s article, “Cyberattacks can trigger societal crises, scientists warn”, the research shows that when hackers target critical infras

31079505459?profile=RESIZE_400xA new analysis by researchers at CyberArk has detailed a significant research effort revealing operational details of a StealC malware operator by exploiting a vulnerability in the malware's leaked web panel.  The recent findings demonstrate how poor security practices within criminal infrastructure can be turned against threat actors.  StealC is information-stealing malware operating under a Malware-as-a-Service (MaaS) model since early 2023.  It enables customers to steal passwords, session co