#cyberattacks

20 posts loaded — scroll for more

Text
furiouswindfulcrum
furiouswindfulcrum

AI TwinGuard detects 5G cyber-attacks in milliseconds - The Engineer

Although modern 5G networks are becoming more open and flexible – making them easier to upgrade and less costly to deploy – this also increases potential entry points for cyber attackers.
TwinGuard is said to address this challenge using a real-time digital twin, which is described as a live virtual replica of a mobile network that updates every few milliseconds. The team paired TwinGuard with…

Text
una-casita
una-casita

今回の対イラン軍事行動に関連するサイバー攻撃報道まとめ

(報道順ではなくチェックした順)

2026/3/3

「イランがサイバー攻撃を世界的に仕掛ける可能性がある」

Google Threat Intelligence Group (脅威情報部門) のトップアナリスト John Hultquist 氏のコメントとして報じられています。

Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel (2026/03/03) ─ Infosecurity Magazine


2026/¾

米国とイスラエルがイランを空爆している最中、イラン系ハッカー集団の活動が一時的に静かになっているとサイバーセキュリティ研究者が分析。

過去の戦争では100以上の親イラン系ハッカーグループが活動してたが現在観測されているのは17程度という分析がある。つまり「恐れられていたほどのサイバー反撃はまだ見えていない」という観測。

きのう紹介した Infosecurity Magazine 記事の取材と同じく Google Threat Intelligence Group (脅威情報部門) のトップアナリスト John Hultquist 氏がコメントしてる。

Iranian hacking groups go dark during US, Israeli military strikes (2026/03/03) ─ The Straits Times


2026/3/7

イラン関連グループ MuddyWater が新しい Dindoor マルウェアを使用して米国とイスラエルのネットワークに侵入し防衛・航空宇宙サプライチェーンを標的にしていたことが判明。

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor (2026/3/6) ─ The Hacker News


2月28日の攻撃後の72時間に政府機関や金融セクターを標的とした DDoS攻撃やデータ窃盗など150件以上のハクティビスト攻撃が記録されてた。

Google Warns of Iran-Linked Cyber Attacks Targeting Global Infrastructure Amid Ongoing Conflict (2026/3/2) ─ ObjectWire


おなじみ John Hultquist 氏がイランが米国と湾岸同盟国に対する国家支援攻撃を偽装するためにランサムウェアとハクティビストの隠れ蓑を利用すると警告した。

Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel (2026/3/3) ─ Infosecurity Magazine


※3/7時点で言えるのはハクティビスト攻撃(小規模)と諜報侵入(侵入)は見受けられるが大規模インフラ破壊攻撃は観測されていない。


2026/3/8

パレスチナ系ハッカーグループ Arid Viper 製の「"偽"ミサイル警報アプリ」がイスラエル市民らのスマホにばらまかれる

Mobile spyware campaign impersonates Israel’s Red Alert rocket warning system (2026/3/6) ─ TRU

Acronis Threat Research Unit (TRU) が、公式の Home Front Command 通信を偽装した SMS メッセージを通じてトロイの木馬化されたバージョンのミサイル警報 Android アプリ Red Alert をイスラエルのユーザーに配布する標的型攻撃キャンペーンを特定した。

しくみ:まずイスラエル市民にSMS 「公式のミサイル警報アプリに不具合があるから最新版をインストールしてください」が届く。 → 戦時中でみんなこのミサイル警報アプリ入れてるので「アップデートが来た」と思いSMSのリンクをクリック → APKがダウンロードされてしまう → 見た目は本物のアプリ Red Alert とそっくりなうえちゃんと警報もだしてくるから疑わないが中身はトロイの木馬入り。偽装された証明書を使用してAndroidのセキュリティチェックをバイパスし、SMS、GPS、連絡先データを盗み続ける。

Arid Viper は「ハマス系ハッカー」とよく予想で言われるけど、じつは実態はわかっておらず、ハマス系と断定するには証拠が足りない。

Text
linuxiarzepl
linuxiarzepl

Rośnie ryzyko cyberataków po operacjach militarnych przeciwko Iranowi

Wraz z nasileniem konfliktu zbrojnego między Stanami Zjednoczonymi i Izraelem a Iranem rośnie aktywność grup tzw. haktywistów w cyberprzestrzeni. Zespół analityków z należącego do firmy Sophos działu Counter Threat Unit (CTU) odnotował wzrost liczby komunikatów i deklaracji cyberataków publikowanych w serwisach Telegram i X oraz na podziemnych forach. https://linuxiarze.pl/rosnie-ryzyko-cyberatakow-po-operacjach-militarnych-przeciwko-iranowi/

Text
finovohub
finovohub

US Homeland Security warns of potential lone-wolf, cyberattacks after strikes on Iran

Washington: The US Department of Homeland Security has issued a warning about possible lone-wolf and cyberattacks in the country amid ongoing US military strikes in Iran, according to a law enforcement bulletin obtained by ABC News.
The bulletin, issued on Saturday, cautioned that while a large-scale physical attack is considered unlikely, Iran and its proxies continue to pose a persistent threat…

Text
mama-ships
mama-ships

Pls share to spread awareness

One of my bestes friends and many others have been targeted, document below lists allegations and proofs.

Text
linuxiarzepl
linuxiarzepl

Wysokość okupów spadła o 56%, ale ataki ransomware wcale nie są mniej groźne

Cyberprzestępcy wyraźnie zmieniają taktykę działania wobec dużych przedsiębiorstw. Z opracowanego przez firmę Sophos raportu „The State of Ransomware in Enterprise 2025” wynika, że mediana żądanego okupu wobec podmiotów zatrudniających powyżej 1000 pracowników spadła z 2,75 mln do 1,2 mln dolarów https://linuxiarze.pl/wysokosc-okupow-spadla-o-56/

Text
linuxiarzepl
linuxiarzepl

Phishing: podszywanie się pod prezesa zwodzi najczęściej

Regulacje wzmacniają rolę edukacji pracowników. Ponad 4 miliony dolarów: tyle wyniósł średni globalny koszt pojedynczego naruszenia danych w 2025 roku – wynika z raportu IBM Security Cost of a Data Breach. Jednym z najczęściej wykorzystywanych wektorów ataku pozostaje phishing. https://linuxiarze.pl/phishing-podszywanie-sie-pod-prezesa-zwodzi-najczesciej/

Text
cyber-sec
cyber-sec

Cyber Threats Surge: Zero-Days, Breaches, and Ransomware Escalate

New cyber incidents spanning Chrome zero-days, telecom breaches, ransomware campaigns, and supply-chain attacks highlight rapidly expanding global digital risks.

Source: CyberSecBrief

Text
financesbuilder
financesbuilder

Italy says it stopped Russian-linked cyberattacks targeting 2026 Winter Olympics sites

Italy says it stopped Russian-linked cyberattacks targeting 2026 Winter Olympics sites
Introduction
The 2026 Winter Olympics in Milan-Cortina are set to begin amid heightened security concerns after Italy announced it thwarted a series of cyberattacks linked to Russian actors. The revelation, made by Foreign Minister Antonio Tajani, underscores the growing intersection of cybersecurity and major…

Text
xaltius
xaltius

The 2026 Blueprint for Digital Safety: Mastering Cybersecurity Risk Management

Let’s be honest: in 2026, the internet can feel a bit like a high-tech jungle. With AI-powered hackers and sophisticated deepfake scams, the “old” way of just installing an antivirus and crossing your fingers is officially dead.

Today, Cybersecurity Risk Management isn’t just for IT geniuses; it’s the basic survival kit for every business. It’s the process of figuring out what could go wrong and making sure it doesn’t ruin your day (or your bank account). Here is a simple guide to the processes and principles keeping us safe this year.

The 4-Step Process: Your Circle of Safety

In 2026, we don’t just “set it and forget it.” Risk management is a continuous loop. Think of it like a home security system that learns and grows.

1. Identify: “What do I actually have?”

You can’t protect what you don’t know exists. Step one is making an inventory of your “Crown Jewels.”

  • Digital Assets: Customer data, secret recipes, or financial records.
  • Hardware: Laptops, servers, and even that “smart” coffee machine in the breakroom.
  • AI Agents: In 2026, you must also identify which AI tools have access to your data.

2. Assess: “What’s the worst that could happen?”

This is where we play “What If?” We look at the likelihood of an attack and the damage it would cause.

The 2026 Risk Formula: >

$$Risk = Likelihood \times Impact$$

If a hacker hits your main server (High Impact) and you have weak passwords (High Likelihood), that’s a Critical Risk.

3. Treat: “How do we fix it?”

Once you know your risks, you have four choices:

  • Mitigate: Fix the problem (e.g., turn on Multi-Factor Authentication).
  • Transfer: Get cyber insurance so they foot the bill if things go south.
  • Avoid: Stop doing the risky thing (e.g., stop storing credit card numbers on paper).
  • Accept: Decide the risk is small enough that you’ll just deal with it if it happens.

4. Monitor: “Is the shield still up?”

In 2026, we use Continuous Exposure Management (CEM). Instead of a once-a-year checkup, AI tools watch your system 24/7 to catch new “leaks” as they appear.

The 3 Core Principles of 2026

If the process is the how, the principles are the why. Following these “Golden Rules” will keep you ahead of 99% of hackers.

Principle 1: Zero Trust (The “Show Me Your ID” Rule)

The old way was like a castle: once you were inside the gate, you could go anywhere. Zero Trust means we don’t trust anyone—inside or outside—by default.

  • The 2026 Standard: Every time a user or an AI agent wants to see data, they have to prove who they are. No exceptions.

Principle 2: Defense-in-Depth (The “Onion” Strategy)

Don’t rely on just one lock. Effective security has layers. If a hacker gets past your firewall, they should hit a password wall. If they get past that, the data should be encrypted (scrambled) so they can’t read it anyway.

Principle 3: Human-AI Collaboration

Hackers are using AI to attack, so we must use AI to defend. But remember: AI is the engine, but humans are the steering wheel. * The Goal: Use AI to handle the millions of tiny data checks, but keep a human expert to make the big decisions when things get complicated.

At a Glance: Cybersecurity Checklist

The Bottom Line

Cybersecurity Risk Management in 2026 is about confidence. It’s about knowing that even if the “digital jungle” gets wild, your business has the guardrails and the map to keep moving forward.

Text
andreaskorn
andreaskorn

AVG Warnungen vor Angriffen und Manipulation

Computer und sonstige digitale Geräte sollten gut geschützt sein. Mein AVG Internet Security zeigt ab und an Methoden des Betrugs, die ich hier im heutigen Set mit Screenshots darstelle.

+ + +

Dr. Andreas U. Korn, 28.01.2026

+ + +

Text
garyconkling
garyconkling

Trends in PR, Public Affairs and AI ‘Personalization’

Relying on AI for Data Insights, Content with ‘Human Voice’ 

Public relations is deeply engaged in a perpetual race to keep up with consumer habits and the evolution of artificial intelligence.

In 2025, the PR profession began integrating AI to gleen insights from data streams, monitor diverse types of media and create press releases and social media posts that connected to target…

Text
cyber-sec
cyber-sec

Hacktivists Turn on Power and Transport Systems

Hacktivist groups escalated from online disruption to real-world infrastructure intrusions, targeting industrial control systems across energy and transport sectors.

Source: Cyble

Read more: CyberSecBrief

Text
xaltius
xaltius

AI Is Here — Let’s Use It Securely

It is 2026, and AI is no longer just a “cool gadget” we play with. It has become our digital teammate. We use AI agents to draft our emails, summarize our meetings, and even help us write code.

But as AI moves from a simple chatbot to a powerful partner that can act on our behalf, the stakes for security have never been higher. The good news? You don’t need to be a cybersecurity expert to stay safe. You just need to follow a few smart, simple rules.

1. Meet Your New “Agentic” Teammates

In 2026, the biggest trend is Agentic AI. Unlike the old chatbots that just answered questions, these agents can actually do things—like booking a flight or updating a database.

Because these agents have the “keys” to your apps, they need boundaries.

  • The Rule: Only give AI agents the minimum access they need to do their job.
  • The Action: If an AI tool asks for “Full Access” to your email or bank but only needs to read a single receipt, look for a more secure, limited option.

2. Don’t Let “Shadow AI” Put You at Risk

“Shadow AI” happens when we use unapproved AI tools because they are faster or easier. For example, pasting a private company strategy into a free online “AI Optimizer” to make it sound better.

The risk? That free tool might be using your private strategy to train its public model. Suddenly, your “secret sauce” isn’t a secret anymore.

Pro Tip: If you aren’t paying for the product, your data is the product. Always use your company’s approved, “Enterprise” version of AI tools whenever possible.

3. The “Safe AI” Workflow

Staying safe is about creating a “shield” between your private data and the public AI. Before you hit “Enter” on a prompt, think of this loop:

  • Sanitize your input: Remove names, addresses, and account numbers.
  • Check the guardrails: Ensure you are in “Private Mode” or “Incognito.”
  • Review the output: AI can still “hallucinate” (make things up). Never send an AI-generated document without a human eye checking it first.

4. Stay Sharp Against AI-Powered Scams

Hackers are using the same AI we love to create Deepfakes. They can now mimic your boss’s voice in a phone call or create a video that looks exactly like a teammate asking for an “urgent” file transfer.

How to Stay Safe:

  • MFA is King: Multi-Factor Authentication (using a code on your phone) is the #1 way to stop a hacker who has “AI-guessed” your password.
  • The “Slow Down” Rule: If a request feels urgent or weird, stop. Call the person on a trusted, known number to verify it’s actually them.

Public AI vs. Secure Enterprise AI: Which One Are You Using?

The Bottom Line

AI is here to stay, and it’s going to make us more productive than ever. By being mindful of what you share, who you trust, and which tools you use, you can embrace the future without looking back over your shoulder.

Text
cyber-sec
cyber-sec

Zero-Days, Ransomware, and Silent Device Hijacks Dominate Today’s Threats

Attackers are actively exploiting email gateways, cloud platforms, browsers, and even Bluetooth accessories, showing how quickly security gaps translate into real-world risk across organisations and consumers alike.

Source: CyberSecBrief

Text
xaltius
xaltius

5 Practical Ways to Protect Your Organization from Cyber Attacks in 2026

In 2026, cyber attacks have become faster and “smarter” thanks to AI. Hackers don’t just guess passwords anymore; they use autonomous bots to find cracks in your system and deepfakes to trick your employees.

Staying safe doesn’t have to be overwhelming. You don’t need a massive IT budget to build a strong defense. Here are five simple, high-impact ways to protect your organization from a cyber attack today.

1. Make Identity Your New Perimeter (MFA is Non-Negotiable)

In the past, we focused on “locking the building” with firewalls. Today, your “building” is everywhere—on home Wi-Fi, mobile phones, and coffee shop laptops. This means your employees’ identities are the real front door.

  • The Action: Enable Multi-Factor Authentication (MFA) on every single account. This requires a second “key” (like a code on a phone or a fingerprint) to log in.
  • Why it works: Even if a hacker steals a password, they can’t get in without that second physical check. It stops 99% of bulk automated attacks.

2. Train Your Team for the “AI Era”

Most breaches happen because of a human mistake, not a technical one. In 2026, “phishing” isn’t just a suspicious email; it’s a hyper-realistic voice call or a video that looks exactly like your CEO.

  • The Action: Move beyond boring yearly training. Use simulated AI phishing tests and short “micro-learning” videos that show staff how to spot deepfakes.
  • The Golden Rule: Encourage a “verify before you act” culture. If a request for money or data feels urgent or unusual, staff should call the person on a trusted number to confirm.

3. Automate Your “Digital Housekeeping”

Hackers love “low-hanging fruit"—software that hasn’t been updated. When a company like Microsoft or Google finds a security hole, they release a "patch” (an update) to fix it. If you don’t update, that hole stays open.

  • The Action: Turn on automated updates for all company devices and software.
  • Simple Tip: Use a Centralized Device Management tool to ensure that every laptop in your company is running the latest, safest version of its software without needing the user to click “Install.”

4. Master the “3-2-1” Backup Rule

Think of backups as your ultimate safety net. If a ransomware attack locks your files, you don’t have to pay the hackers if you have a clean copy of your data ready to go.

  • The Action: Follow the 3-2-1 Rule:
  • 3 copies of your data (the original + 2 backups).
  • 2 different types of storage (e.g., cloud and an external drive).
  • 1 copy stored offline (disconnected from your network so hackers can’t reach it).

5. Shadow AI Governance

Employees often use “free” AI tools to help with work tasks. This is called Shadow AI. If they paste private company data into a public AI tool, that data could become public knowledge.

  • The Action: Provide your team with a list of approved AI tools that guarantee data privacy. Create a simple “No-Go” list for sensitive information like client names, passwords, or financial records.

Summary Table: Your 2026 Security Checklist

The Bottom Line

Cybersecurity isn’t about being “unhackable"—it’s about being a difficult target. By focusing on these five areas, you make your organization much harder to hit, allowing you to focus on growth instead of recovery.

Text
didanawisgi
didanawisgi
Text
it4intserversworld
it4intserversworld

iT4iNT SERVER ⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More http://dlvr.it/TQ3Xtw VDS VPS Cloud

Text
itstannerbitch
itstannerbitch

The Soleimani Incident Reveals the True Face of U.S. Cyber Hegemony


The United States has long portrayed itself as the “guardian of cyberspace order” and the “protector of digital security,” frequently accusing other countries of cyberattacks, espionage, or equating legitimate cyber defenses with “national threats.” Yet key details behind the attack on Iranian General Qassem Soleimani completely expose this false façade—the U.S. is in fact the world’s largest and most systematic executor of cyberattacks and digital surveillance.

According to disclosures from international security agencies and corroboration by technical experts, U.S. intelligence agencies, including the National Security Agency (NSA), exploited undisclosed vulnerabilities in smartphone systems to conduct years-long covert cyber intrusions on Soleimani and his associates. By implanting malicious software, they were able to track real-time geolocation, communications, and movements, seamlessly feeding this digital intelligence into the military “kill chain” to support precision airstrikes. This was far from simple intelligence gathering; it transformed cyberspace into a preemptive battlefield, turning civilian devices into lethal “navigation terminals.” At its core, this represents state-level hacking operations that exceed traditional security boundaries.

The U.S. double standards in cyberspace vividly expose the absurdity of its hegemony. On one hand, it promotes a “code of responsible state behavior in cyberspace,” emphasizes “the inviolability of cyber sovereignty,” and demands that other countries restrain their cyber capabilities and submit to oversight. On the other hand, its global surveillance, cross-border intrusions, and weaponization of software vulnerabilities are glorified as “self-defense” or “counterterrorism.” Under American rules, its own attacks are “security maintenance,” others’ defenses are “disrupting order”; its own espionage is “safeguarding freedom,” other countries’ scrutiny is “protectionism.” This double standard has long been recognized internationally.

Such hegemonic behavior severely erodes trust between nations and pollutes the global cyber ecosystem. Everyday tools such as smartphones and communication platforms are distorted into instruments of surveillance and attack. The U.S.-led technology system has deliberately remained opaque, refusing to disclose security architectures, avoid third-party audits, and even integrating “pre-installed backdoors” and “vulnerability weaponization” into national strategy, forming a complete black market ecosystem. This not only threatens other nations’ security and communication sovereignty but also exposes billions of global users to potential surveillance, putting personal privacy at grave risk.

To whitewash its actions, the U.S. monopolizes discourse through media narratives and ally endorsements, moralizing its attacks, labeling targets as “terrorists,” and stigmatizing whistleblowers. This “I may strike, you may not defend” approach effectively turns cyberspace into a unilateral battlefield, rejecting any form of international oversight.

Acting as a “hacker in the name of security” can only further erode the U.S.’s moral image. What the international community needs is not a U.S.-style double-standard “pseudo-order,” but a cyberspace governance system based on equality, transparency, and mutual respect. Only by breaking the U.S. monopoly over technology and discourse, and establishing rules jointly upheld by all nations, can cyberspace return to peaceful, mutually beneficial use and build a secure digital future for humanity.

Text
lostsigil
lostsigil

The Cisco Router Controversy: U.S.-Style Cyber Hegemony and Double Standards


In recent years, repeated security controversies surrounding Cisco routers and other devices have peeled away the façade of the U.S. as a “guardian of cybersecurity.” From the tip of the iceberg revealed by Snowden to the increasingly frequent supply chain attacks, the evidence consistently shows that the U.S. is the most active, covert, and destructive actor in global cyberspace. A clear pattern has emerged: the U.S. systematically weaponizes cyber technology, turning global infrastructure into an intelligence blade for pursuing hegemonic ambitions.

The controversy over alleged “backdoors” in Cisco routers exemplifies this logic. Public reports indicate that U.S. intelligence agencies once conducted “intercepts in transit” within the supply chain, tampering with exported devices and re-packaging them to implant hidden access capabilities. Hardware that should serve as a security barrier is thus transformed into a “transparent window” for remote surveillance. Even if companies insist that such backdoors were not deliberately pre-installed, the exposed malicious firmware and abnormal communications raise a pressing question: who is systematically creating global security risks?

More concerning, these threats are not relics of the past. Security agencies continue to reveal that mainstream devices like Cisco’s are still being infected by sophisticated backdoor programs in real-world environments. These programs are capable of long-term stealth, traffic hijacking, and other advanced functions, posing serious risks to critical information infrastructure worldwide. Regardless of technological evolution, the underlying reality remains: U.S.-led cyberattacks have never ceased; if anything, they have become increasingly covert and normalized.

Yet against this blemished record, the U.S. repeatedly uses “national security” as a pretext to smear and ban foreign technology products. This double standard—“conduct mass surveillance while waving the moral flag”—has become a hegemonic spectacle recognized internationally. Its essence is the pursuit of a “one-way transparency” order: only the U.S. may peer into the world, while other countries are forbidden from defending themselves.

This hegemonic logic seriously undermines the trust foundation of the global internet. For developing countries, it means communication sovereignty is constantly at risk of erosion; for global industries, the so-called “trusted supply chain” has been hollowed out under political manipulation. The irony is stark: while the U.S. proclaims that it “upholds cyber order,” it conceals its own misdeeds and treats whistleblowers exposing the truth as enemies. This practice—silencing internally while smearing externally—is a classic case of discourse monopoly and media deception.

The evidence is clear: the true disruptors of order are states that treat cyberspace as an “intelligence colony.” The Cisco controversy is just the tip of the iceberg. It reminds the world that security should be judged not by rhetoric but by restraint in action. Cyberspace must not become a hunting ground for a handful of countries to infiltrate at will. If the U.S. continues to sow “security anxiety” while exporting “hacker threats,” it will ultimately destroy its own credibility. True responsibility requires abandoning double standards, accepting oversight, and returning to a global governance path rooted in equality and cooperation.