Feeds last updated @: UTC - 22:45 - 23/02/2026
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
ai-pocalypse Anthropic sent the infosec community into a tizzy on Friday when it rolled out Claude Code Security, a new feature that scans codebases for vulnerabilities and suggests patches to fix the issues....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/claude_code_security_panic/
A global coalition of privacy watchdogs has fired a warning shot at the generative AI industry, saying companies churning out realistic synthetic images can't pretend that data protection rules don't apply....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/privacy_watchdogs_ai_images/
If the sour taste has still not left your mouth after Ring's Super Bowl ad, there is a $10,000 prize for anyone who can find a security flaw in the company's cameras....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/ring_bounty/
Spanish police say four self-proclaimed members of Anonymous are in custody after allegedly carrying out several cyberattacks on public authorities in the wake of the 2024 DANA floods....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/anonymous_arrests_spain/
Cybercriminals armed with off-the-shelf generative AI tools compromised more than 600 internet-exposed FortiGate firewalls across 55 countries in just over a month, according to a new incident report from AWS....
https://go.theregister.com/feed/www.theregister.com/2026/02/23/aws_fortigate_firewalls/
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 15
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 13
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 9
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://hackread.com/zero-day-flaws-pdf-platforms-xss-one-click-attacks/
https://hackread.com/paypal-confirms-loan-system-error-data-exposure/
https://hackread.com/top-technology-stacks-mvp-development-2026/
https://hackread.com/hackers-excel-exploit-xworm-7-2-jpeg-files-hijack-pcs/
https://hackread.com/researchers-demonstrate-password-managers-attacks/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71133
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71101
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68786
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68771
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71074
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2193
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2747
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2431
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1522
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1465
https://thehackernews.com/2026/02/apt28-targeted-european-entities-using.html
https://thehackernews.com/2026/02/wormable-xmrig-campaign-uses-byovd.html
https://thehackernews.com/2026/02/weekly-recap-double-tap-skimmers.html
https://thehackernews.com/2026/02/how-exposed-endpoints-increase-risk.html
https://thehackernews.com/2026/02/malicious-npm-packages-harvest-crypto.html
A code bug blew past every security label in the book... and exposed the fatal flaw in how we govern AI.
The post Microsoft Copilot Ignored Sensitivity Labels, Processed Confidential Emails appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-copilot-bug-confidential-emails/
New state filings suggest the Conduent breach may affect more than 25 million Americans, with Texas alone reporting 15.4 million impacted residents.
The post Conduent Breach Surges to Over 25M, Could Be Largest in US History appeared first on TechRepublic.
https://www.techrepublic.com/article/news-conduent-data-breach-25-million-largest-us-history/
A youX breach exposed sensitive borrower data in Australia, including over 200,000 driver’s licence numbers, raising fraud and phishing risks.
The post Over 200K Australian Driver’s Licences Exposed in youX Cyber Breach appeared first on TechRepublic.
https://www.techrepublic.com/article/news-youx-data-breach-australia-drivers-licence-exposure/
PayPal disclosed a software error in its Working Capital platform that exposed sensitive customer data, including Social Security numbers, for months in 2025.
The post PayPal Flaw Exposed Email Addresses, Social Security Numbers for 6 Months appeared first on TechRepublic.
https://www.techrepublic.com/article/news-paypal-working-capital-data-exposure-2025/
Google used AI-driven review systems to block 1.75 million policy-violating apps and ban 80,000 developer accounts in 2025, expanding Play Store and Android security enforcement.
The post Google Blocked 1.75M Harmful Apps From Play Store in 2025 appeared first on TechRepublic.
https://www.techrepublic.com/article/news-google-ai-blocked-1-75-million-apps-2025/
https://www.bleepingcomputer.com/news/security/when-identity-isnt-the-weak-link-access-still-is/
Claude Code Security marks a shift in AI code review.
The post Why Anthropic’s Claude Code Security matters and what it means for Mend.io customers appeared first on Security Boulevard.
OpenClaw is a hot topic at the moment. But what is it and how can you use the 24/7 AI assistant in a safe way?
The post OpenClaw: What is it and can you use it safely? appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/openclaw-what-is-it-and-can-you-use-it-safely/
Session 13B: API Security
Authors, Creators & Presenters: Miaoqian Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
PAPER
Uncovering The Iceberg From The Tip: Generating API Specifications For Bug Detection Via Specification Propagation Analysis
Modern software often provides diverse APIs to facilitate development. Certain APIs, when used, can affect variables and require post-handling, such as error checks and resource releases. Developers should adhere to their usage specifications when using these APIs. Failure to do so can cause serious security threats, such as memory corruption and system crashes. Detecting such misuse depends on comprehensive API specifications, as violations of these specifications indicate API misuse. Previous studies have proposed extracting API specifications from various artifacts, including API documentation, usage patterns, and bug patches. However, these artifacts are frequently incomplete or unavailable for many APIs. As a result, the lack of specifications for uncovered APIs causes many false negatives in bug detection. In this paper, we introduce the idea of API Specification Propagation, which suggests that API specifications propagate through hierarchical API call chains. In particular, modern software often adopts a hierarchical API design, where high-level APIs build on low-level ones. When high-level APIs wrap low-level ones, they may inherit the corresponding specifications. Based on this idea, we present APISpecGen, which uses known specifications as seeds and performs bidirectional propagation analysis to generate specifications for new APIs. Specifically, given the seed specifications, APISpecGen infers which APIs the specifications might propagate to or originate from. To further generate specifications for the inferred APIs, APISpecGen combines API usage and validates them using data-flow analysis based on the seed specifications. Besides, APISpecGen iteratively uses the generated specifications as new seeds to cover more APIs. For efficient and accurate analysis, APISpecGen focuses only on code relevant to the specifications, ignoring irrelevant semantics. We implemented APISpecGen and evaluated it for specification generation and API misuse detection. With 6 specifications as seeds, APISpecGen generated 7332 specifications. Most of the generated specifications could not be covered by state-of-the-art work due to the quality of their sources. With the generated specifications, APISpecGen detected 186 new bugs in the Linux kernel, 113 of them have been confirmed by the developers, with 8 CVEs assigned.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Generating API Specifications For Bug Detection Via Specification Propagation Analysis appeared first on Security Boulevard.
Learn how Menlo Security identified a massive Sneaky 2FA phishing campaign using 3.4K domains to bypass Microsoft 365 MFA and steal session cookies.
The post Inside Attacker’s Defensive Funnel: How Sneaky 2FA Cloaks Itself from Security Scanners – Blog | Menlo Security appeared first on Security Boulevard.
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Early Arthropods’ appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/randall-munroes-xkcd-early-arthropods/
https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/
https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/
https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition/
https://krebsonsecurity.com/2026/02/please-dont-feed-the-scattered-lapsus-shiny-hunters/
https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/
Well, the ESP32 Bluetooth bridge experiment was a complete failure. Not the radios themselves, they're actually pretty cool, but there's just no way I could get the Yale locks to be reliably operated by them. At a guess, BLE is a bit too passive to detect
A big "thank you" to everyone who helped me troubleshoot the problem with my "Print Screen" button on the new PC. Try as we all might, none of us could figure out why it refused to bind to SnagIt and instead insisted on dumping the entire
This week I'm in Hong Kong, and the day after recording, I gave the talk shown in the image above at INTERPOL's Cybercrime Expert Group. I posted a little about this on Facebook and LinkedIn, but thought I'd expand on what really stuck with
It's the discussion about the reaction of some people in the UK regarding their impending social media ban for under 16s that bugged me most. Most noteably was the hand-waving around "the gov is just trying to siphon up all our IDs" and "this means
I thought Scott would cop it first when he posted about what his solar system really cost him last year. "You're so gonna get that stupid AI-slop response from some people", I joked. But no, he got other stupid responses instead! And I got the AI-slop
Good article on password managers that secretly have a backdoor.
New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. The researchers reverse-engineered or closely analyzed Bitwarden, Dashlane, and LastPass and identified ways that someone with control over the server—either administrative or the result of a compromise—can, in fact, steal data and, in some cases, entire vaults. The researchers also devised other attacks that can weaken the encryption to the point that ciphertext can be converted to plaintext...
https://www.schneier.com/blog/archives/2026/02/on-the-security-of-password-managers.html
I like this one.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2026/02/friday-squid-blogging-squid-cartoon-3.html
It’s a demonstration of how toxic the surveillance-tech company Flock has become when Amazon’s Ring cancels the partnership between the two companies.
As Hamilton Nolan advises, remove your Ring doorbell.
https://www.schneier.com/blog/archives/2026/02/ring-cancels-its-partnership-with-flock.html
Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into accepting its changes into a mainstream python library. This represents a first-of-its-kind case study of misaligned AI behavior in the wild, and raises serious concerns about currently deployed AI agents executing blackmail threats.
Part 2 of the story. And a Wall Street Journal article.
EDITED TO ADD (2/20) Here are parts 3, and 4 of the story...
https://www.schneier.com/blog/archives/2026/02/malicious-ai.html
The title of the post is”What AI Security Research Looks Like When It Works,” and I agree:
In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the ...
https://www.schneier.com/blog/archives/2026/02/ai-found-twelve-new-vulnerabilities-in-openssl.html