Last update (UTC): 06:45 - 18/02/2026
https://www.security.nl/posting/925121/Antivirusbedrijf+vindt+backdoor+in+firmwa
https://www.security.nl/posting/925107/EDPS+waarschuwt+voor+willekeurig+scannen+
https://www.security.nl/posting/925095/Britse+overheid+adviseert+mkb+firewall%2C
https://www.security.nl/posting/925071/Kamer+wil+opheldering+van+minister+over+g
https://www.security.nl/posting/924958/AP-onderzoek+naar+logging+en+monitoring+b
https://www.security.nl/posting/925045/Ouderenbond+hekelt+opkomst+pin-only+winke
https://www.security.nl/posting/925034/FD%3A+Odido+bewaart+gegevens+overgestapte
https://www.security.nl/posting/925033/Autoriteit+Persoonsgegevens+waarschuwt+vo
https://www.security.nl/posting/925031/Interrail+meldt+dat+gestolen+klantgegeven
https://www.security.nl/posting/925028/118+mensen+deden+aangifte+wegens+gevoelig
Read more of this story at Slashdot.
https://yro.slashdot.org/story/26/02/17/2216258/bayer-agrees-to-725-billion-prop
Read more of this story at Slashdot.
https://developers.slashdot.org/story/26/02/17/2313201/claude-sonnet-46-model-br
Read more of this story at Slashdot.
https://hardware.slashdot.org/story/26/02/17/2249254/apple-is-reportedly-plannin
Read more of this story at Slashdot.
https://tech.slashdot.org/story/26/02/17/2233250/discord-rival-maxes-out-hosting
Read more of this story at Slashdot.
https://yro.slashdot.org/story/26/02/17/227207/nprs-radio-host-david-greene-says
Read more of this story at Slashdot.
https://linux.slashdot.org/story/26/02/17/2157254/idea-raised-for-nicer-drm-pani
Read more of this story at Slashdot.
https://tech.slashdot.org/story/26/02/17/2147242/kde-plasma-66-released?utm_sour
Read more of this story at Slashdot.
https://tech.slashdot.org/story/26/02/17/2143231/most-vmware-users-still-activel
Read more of this story at Slashdot.
https://yro.slashdot.org/story/26/02/17/1955224/us-lawyers-fire-up-privacy-class
Read more of this story at Slashdot.
https://news.slashdot.org/story/26/02/17/1937251/the-small-english-town-swept-up
If enterprises are implementing AI, they’re not showing it to Palo Alto Networks CEO Nikesh Arora, who on Tuesday said business adoption of the tech lags consumer take-up by at least a couple of years – except for coding assistants....
https://go.theregister.com/feed/www.theregister.com/2026/02/18/palo_alto_q2_26/
China-linked attackers exploited a maximum-severity hardcoded-credential bug in Dell RecoverPoint for Virtual Machines as a zero-day since at least mid-2024. It's all part of a long-running effort to backdoor infected machines for long-term access, according to Google's Mandiant incident response team....
https://go.theregister.com/feed/www.theregister.com/2026/02/18/dell_0day_brickst
Three new threat groups began targeting critical infrastructure last year, while a well-known Beijing-backed crew - Volt Typhoon - continued to compromise cellular gateways and routers, and then break into US electric, oil, and gas companies in 2025, according to Dragos' annual threat report published on Tuesday....
https://go.theregister.com/feed/www.theregister.com/2026/02/17/volt_typhoon_drag
A US law firm has accused Lenovo of violating Justice Department strictures about the bulk transfer of data to foreign adversaries, namely China....
https://go.theregister.com/feed/www.theregister.com/2026/02/17/lenovo_privacy_la
Polish police have arrested and charged a man over ties to the Phobos ransomware group following a property raid....
https://go.theregister.com/feed/www.theregister.com/2026/02/17/poland_phobos_ran
Britain is telling businesses to "lock the door" on cybercrims as new government data suggests most still haven't even found the latch....
https://go.theregister.com/feed/www.theregister.com/2026/02/17/govt_launches_cyb
The Irish Data Protection Commission (DPC) is the latest regulator to open an investigation into Elon Musk's X following repeated reports of harmful image generation by the platform's Grok AI chatbot....
https://go.theregister.com/feed/www.theregister.com/2026/02/17/ireland_dpc_x_gro
Keir Starmer could ramp up the UK's defense spending plans faster than planned as the MoD reeled off new purchases for Britain's armed forces....
https://go.theregister.com/feed/www.theregister.com/2026/02/17/mod_weapons_budge
Canada Goose says an advertised breach of 600,000 records is an old raid and there are no signs of a recent compromise....
https://go.theregister.com/feed/www.theregister.com/2026/02/16/canada_goose_shin
Dutch police have arrested a man for "computer hacking" after accidentally handing him their own sensitive files and then getting annoyed when he didn't hand them back....
https://go.theregister.com/feed/www.theregister.com/2026/02/16/dutch_cops_breach
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 14
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 12
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool […]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-d
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s […]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-sourc
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 9
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-sour
Source: www.darkreading.com – Author: Riaz Lakhani Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and our communities. Original Post URL: https://www.darkreading.com/cyberattacks-data-breaches/without-federal-help-cyber-defense-cisa Category & Tags: – Views: 19
La entrada Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/without-federal-help-cyber-defense-is-up-to-the-rest-of-us
Source: securityboulevard.com – Author: Gaurav Banga Here’s a scenario security teams increasingly face. A user—or an attacker pretending to be one—types something like: This is how many prompt injection attempts begin. The phrase looks harmless, but it’s a red flag: the user is telling the AI to forget its built‐in rules. What follows is often […]
La entrada Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/safer-conversational-ai-for-cybersecurity-the-bix-approach
Source: securityboulevard.com – Author: Sofia Naer Introduction On July 16, 2025, Europol revealed the details of Operation Eastwood, a coordinated international strike against one of the most active pro-Russian cybercrime groups, NoName057(016). The announcement promised a major disruption to the group’s activities. In this blog, we explore whether Operation Eastwood had any real impact on […]
La entrada Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/operation-eastwood-measuring-the-real-impact-on-noname0571
Source: securityboulevard.com – Author: Jeffrey Burt Five months after the future of the CVE program was thrown in doubt, CISA this week released a roadmap that calls for steps to take for its new “quality era,” which includes public sponsorship, expanded public-private partnership, and modernization. The post CISA Lays Out Roadmap for CVE Program’s ‘Quality […]
La entrada CISA Lays Out Roadmap for CVE Program’s ‘Quality Era’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/cisa-lays-out-roadmap-for-cve-programs-quality-era-source-
Source: securityboulevard.com – Author: Marc Handelman via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Dual Roomba’ appeared first on Security Boulevard. Original Post URL: https://securityboulevard.com/2025/09/randall-munroes-xkcd-dual-roomba/?utm_source=rss&utm_medium=rss&utm_campaign=randall-munroes-xkcd-dual-roomba Category & Tags: Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD – Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD Views: 8
La entrada Randall Munroe’s XKCD ‘Dual Roomba’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/randall-munroes-xkcd-dual-roomba-source-securityboulevard-
https://hackread.com/mate-security-introduces-the-security-context-graph-an-appr
https://hackread.com/credshields-contributes-to-owasps-2026-smart-contract-secur
https://hackread.com/cybersecurity-excellence-awards-reveal-nomination-shift-fro
https://hackread.com/securely-edit-redact-sensitive-pdfs-cybersecurity-guide/
https://hackread.com/realmo-launches-location-intelligence-engine-to-match-vacan
https://hackread.com/hackers-screenconnect-hijack-pcs-fake-social-security-email
https://hackread.com/google-ads-claude-ai-macsync-malware-clickfix/
https://hackread.com/chrome-extensions-harvest-browsing-data-37m-users/
https://hackread.com/interoperability-in-healthcare-security-privacy/
https://hackread.com/17-billion-wake-up-call-securing-crypto-ai-scams/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2320
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2441
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2323
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0102
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2318
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2317
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2313
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59213
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21517
https://ncsc.nl/ondernemersverhaal/mysterieuze-cookieroof-leidt-tot-torenhoge-cl
https://ncsc.nl/blog/het-oordeel-van-onze-jury-de-wall-of-fame-2025
https://ncsc.nl/waarschuwing/actief-misbruik-kwetsbaarheden-fortinet-producten
https://ncsc.nl/blog/dreigingsinformatie-snel-en-gestructureerd-delen-met-stix-e
https://ncsc.nl/nieuws/meld-je-aan-cbw-webinar-zorgplicht-en-bestuurlijke-verant
https://ncsc.nl/blog/business-email-compromise-een-snelgroeiende-vorm-van-digita
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0420
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0357
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0179
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0132
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0118
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0098
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2166
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0431
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0430
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0429
https://thehackernews.com/2026/02/cloud-forensics-webinar-learn-how-ai.html
https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html
https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html
https://thehackernews.com/2026/02/smartloader-attack-uses-trojanized-oura.html
https://thehackernews.com/2026/02/my-day-getting-my-hands-dirty-with-ndr.html
https://thehackernews.com/2026/02/microsoft-finds-summarize-with-ai.html
https://thehackernews.com/2026/02/apple-tests-end-to-end-encrypted-rcs.html
https://thehackernews.com/2026/02/infostealer-steals-openclaw-ai-agent.html
https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html
https://thehackernews.com/2026/02/weekly-recap-outlook-add-ins-hijack-0.html
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.
The post Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware appeared first on TechRepublic.
https://www.techrepublic.com/article/news-fake-captcha-scam-stealc-malware-windo
A fake Android antivirus app called TrustBastion is spreading malware and stealing banking credentials. Here’s how it works and how to stay protected.
The post Fake ‘Antivirus’ App Spreads Android Malware, Steals Banking Credentials appeared first on TechRepublic.
https://www.techrepublic.com/article/news-fake-android-antivirus-trustbastion-ma
A viral AI caricature trend may be exposing sensitive enterprise data, fueling shadow AI risks, social engineering attacks, and LLM account compromise.
The post Viral AI Caricatures Highlight Shadow AI Dangers appeared first on TechRepublic.
https://www.techrepublic.com/article/news-ai-caricature-trend-shadow-ai-security
Ransomware attacks surged 52% in 2025, with supply chain breaches nearly doubling as groups like Qilin drive record monthly incidents worldwide.
The post Ransomware Groups Claimed 2,000 Attacks in Just Three Months appeared first on TechRepublic.
https://www.techrepublic.com/article/news-ransomware-attacks-surge-2025/
Apple urges users to update after patching CVE-2026-20700, a zero-day flaw exploited in sophisticated targeted attacks across multiple devices.
The post Critical Apple Flaw Exploited in ‘Sophisticated’ Attacks, Company Urges Rapid Patching appeared first on TechRepublic.
https://www.techrepublic.com/article/news-apple-zero-day-cve-update-february-202
Microsoft patches 58 vulnerabilities, including six actively exploited zero-days across Windows, Office, and RDP, as CISA sets a March 3 deadline.
The post Microsoft’s February Patch Tuesday Fixes 6 Zero-Days Under Attack appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-patch-tuesday-six-zero-days-
Microsoft patches CVE-2026-21525, an actively exploited RasMan flaw that can crash Windows VPN services and disrupt remote access.
The post Microsoft Patches Windows Flaw Causing VPN Disruptions appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-rasman-cve-vpn/
The Conduent ransomware attack has grown to impact 25 million Americans, exposing Social Security numbers and medical data in one of 2025’s largest breaches.
The post From 10M to 25M: Conduent Breach Balloons Into One of 2025’s Largest appeared first on TechRepublic.
https://www.techrepublic.com/article/news-conduent-ransomware-breach-25m/
Google expands its “Results about you” tool to remove sensitive IDs and explicit images from Search, strengthening privacy protections amid rising identity theft.
The post Google Expands ‘Results About You’ to Shield IDs, Fight Deepfake Abuse appeared first on TechRepublic.
https://www.techrepublic.com/article/news-google-expands-search-privacy-tools-id
Hawaii plans to use "first responder" drones in Waikiki to reach crime scenes and emergencies faster, and privacy advocates are sounding the alarm.
The post Waikiki Drone Plan Sparks Privacy Pushback appeared first on TechRepublic.
https://www.techrepublic.com/article/news-waikiki-drone-plan-sparks-privacy-push
https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-bl
https://www.bleepingcomputer.com/news/security/flaws-in-popular-vscode-extension
https://www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-z
https://www.bleepingcomputer.com/news/security/notepad-plus-plus-boosts-update-s
https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-outage-affects-u
https://www.bleepingcomputer.com/news/security/what-5-million-apps-revealed-abou
https://www.bleepingcomputer.com/news/security/new-keenadu-backdoor-found-in-and
https://www.bleepingcomputer.com/news/security/poland-arrests-suspect-linked-to-
https://www.bleepingcomputer.com/news/security/ireland-now-also-investigating-x-
https://www.bleepingcomputer.com/news/security/washington-hotel-in-japan-disclos
An attacker’s initial access, whether through phishing, unmanaged devices, exploited vulnerabilities, or a compromised supply chain, marks the beginning of a dangerous chain of events.
The post Master XDR Investigations: A Deep Dive into the GravityZone XDR Demo Incident appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/master-xdr-investigations-a-deep-dive-into
California regulators have issued their largest penalty yet under the California Consumer Privacy Act, announcing a $2.75 million settlement with The Walt Disney Company after investigators found that consumer opt-out requests were not consistently honored across devices and streaming platforms. The case centers on a straightforward expectation that is becoming harder for companies to meet: [...]
The post California Fines Disney $2.75 Million in Record CCPA Case appeared first on Centraleyes.
The post California Fines Disney $2.75 Million in Record CCPA Case appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/california-fines-disney-2-75-million-in-re
Learn how to protect your AI infrastructure from quantum-enabled side-channel attacks using post-quantum cryptography and ai-driven threat detection for MCP.
The post AI-Driven Threat Detection for Quantum-Enabled Side-Channel Attacks appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/ai-driven-threat-detection-for-quantum-ena
What Are Non-Human Identities in Cybersecurity? Have you ever wondered what really goes on behind the scenes when machines communicate securely with one another? The answer resides in a concept known as Non-Human Identities (NHIs), which are critical for modern cybersecurity. These machine identities are not unlike human passports, paired with encrypted credentials or “secrets” [...]
The post Are the investments in Agentic AI security systems justified? appeared first on Entro.
The post Are the investments in Agentic AI security systems justified? appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/are-the-investments-in-agentic-ai-security
What Are Non-Human Identities, and Why Are They Critical for Secure Cloud Environments? Ensuring the security of non-human identities (NHIs) is paramount for organizations operating in cloud environments. NHIs often refer to machine identities crucial for protecting sensitive data and maintaining the integrity of IT systems. With an increasing reliance on cloud computing, managing these [...]
The post How secure are Agentic AI-driven compliance audits? appeared first on Entro.
The post How secure are Agentic AI-driven compliance audits? appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/how-secure-are-agentic-ai-driven-complianc
How Can Automated Secrets Rotation Empower DevOps Teams? What happens when the seamless flow of DevOps is disrupted by security incidents? With DevOps teams continue to embrace the rapid deployment of applications and services across the cloud, the need for comprehensive secrets management becomes crucial. One modern solution is automated secrets rotation, a powerful tool [...]
The post How are DevOps teams empowered by automated secrets rotation? appeared first on Entro.
The post How are DevOps teams empowered by automated secrets rotation? appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/how-are-devops-teams-empowered-by-automate
How Do Non-Human Identities Impact Security in a Cloud Environment? Have you ever pondered how non-human identities (NHIs) play a role? Where organizations migrate to cloud-based systems, security is dramatically shifting. NHIs, essentially machine identities, are rapidly becoming crucial to maintaining robust security protocols. Understanding the Role of Non-Human Identities At the heart of this [...]
The post Can Agentic AI operate independently of continuous human oversight? appeared first on Entro.
The post Can Agentic AI operate independently of continuous human oversight? appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/can-agentic-ai-operate-independently-of-co
Explore User Managed Access (UMA) 2.0. Learn how this protocol enables granular sharing, party-to-party delegation, and secure AI agent authorization.
The post Understanding User Managed Access appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/understanding-user-managed-access/
Announcing the launch of AI Agent Configuration Scanning.
The post Securing the New Control Plane: Introducing Static Scanning for AI Agent Configurations appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/securing-the-new-control-plane-introducing
Session 12D: ML Backdoors
Authors, Creators & Presenters: Dazhuang Liu (Delft University of Technology), Yanqi Qiao (Delft University of Technology), Rui Wang (Delft University of Technology), Kaitai Liang (Delft University of Technology), Georgios Smaragdakis (Delft University of Technology)
PAPER
LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm
Current black-box backdoor attacks in convolutional neural networks formulate attack objective(s) as single-objective optimization problems in single domain. Designing triggers in single domain harms semantics and trigger robustness as well as introduces visual and spectral anomaly. This work proposes a multi-objective black-box backdoor attack in dual domains via evolutionary algorithm (LADDER), the first instance of achieving multiple attack objectives simultaneously by optimizing triggers without requiring prior knowledge about victim model. In particular, we formulate LADDER as a multi-objective optimization problem (MOP) and solve it via multi-objective evolutionary algorithm (MOEA). MOEA maintains a population of triggers with trade-offs among attack objectives and uses non-dominated sort to drive triggers toward optimal solutions. We further apply preference-based selection to MOEA to exclude impractical triggers. LADDER investigates a new dual-domain perspective for trigger stealthiness by minimizing the anomaly between clean and poisoned samples in the spectral domain. Lastly, the robustness against preprocessing operations is achieved by pushing triggers to low-frequency regions. Extensive experiments comprehensively showcase that LADDER achieves attack effectiveness of at least 99%, attack robustness with 90.23% (50.09% higher than state-of-the-art attacks on average), superior natural stealthiness (1.12 times to 196.74 times improvement) and excellent spectral stealthiness (8.45 times enhancement) as compared to current stealthy attacks by the average l_2 - norm across 5 public datasets.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – LADDER: Multi-Objective Backdoor Attack Via Evolutionary Algorithm appeared first on Security Boulevard.
https://securityboulevard.com/2026/02/ndss-2025-ladder-multi-objective-backdoor-
https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/
https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition/
https://krebsonsecurity.com/2026/02/please-dont-feed-the-scattered-lapsus-shiny-
https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/
https://krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-net
https://krebsonsecurity.com/2026/01/patch-tuesday-january-2026-edition/
https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-bo
https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-ne
https://krebsonsecurity.com/2025/12/happy-16th-birthday-krebsonsecurity-com/
https://krebsonsecurity.com/2025/12/dismantling-defenses-trump-2-0-cyber-year-in
Well, the ESP32 Bluetooth bridge experiment was a complete failure. Not the radios themselves, they're actually pretty cool, but there's just no way I could get the Yale locks to be reliably operated by them. At a guess, BLE is a bit too passive to detect
A big "thank you" to everyone who helped me troubleshoot the problem with my "Print Screen" button on the new PC. Try as we all might, none of us could figure out why it refused to bind to SnagIt and instead insisted on dumping the entire
This week I'm in Hong Kong, and the day after recording, I gave the talk shown in the image above at INTERPOL's Cybercrime Expert Group. I posted a little about this on Facebook and LinkedIn, but thought I'd expand on what really stuck with
It's the discussion about the reaction of some people in the UK regarding their impending social media ban for under 16s that bugged me most. Most noteably was the hand-waving around "the gov is just trying to siphon up all our IDs" and "this means
I thought Scott would cop it first when he posted about what his solar system really cost him last year. "You're so gonna get that stupid AI-slop response from some people", I joked. But no, he got other stupid responses instead! And I got the AI-slop
I’m in Oslo! Flighty is telling me I’ve flown in or out of here 43 times since a visit in 2014 set me on a new path professionally and, many years later, personally. It’s special here, like a second home that just feels…
Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all time. There are many reasons for this accolade, but chief among them is that by virtue of the site being expressly designed to facilitate
https://www.troyhunt.com/who-decides-who-doesnt-deserve-privacy/
15 mins and 40 seconds. That's how long it took to troubleshoot the first tech problem of 2026, and that's how far you'll need to skip through this video to hear the audio at normal volume. The problem Scott and I had is analogous
I think the start of this week's video really nailed it for the techies amongst us: shit doesn't work, you change something random and now shit works and yu have no idea why 🤷♂️ Such was my audio this week and apoligise to
Building out an IoT environment is a little like the old Maslow's Hierarchy of Needs. All the stuff on the top is only any good if all the stuff on the bottom is good, starting with power. This week, I couldn't even get that right, but
Here are three papers describing different side-channel attacks against LLMs.
“Remote Timing Attacks on Efficient Language Model Inference“:
Abstract: Scaling up language models has significantly increased their capabilities. But larger models are slower models, and so there is now an extensive body of work (e.g., speculative sampling or parallel decoding) that improves the (average case) efficiency of language model generation. But these techniques introduce data-dependent timing characteristics. We show it is possible to exploit these timing differences to mount a timing attack. By monitoring the (encrypted) network traffic between a victim user and a remote language model, we can learn information about the content of messages by noting when responses are faster or slower. With complete black-box access, on open source systems we show how it is possible to learn the topic of a user’s conversation (e.g., medical advice vs. coding assistance) with 90%+ precision, and on production systems like OpenAI’s ChatGPT and Anthropic’s Claude we can distinguish between specific messages or infer the user’s language. We further show that an active adversary can leverage a boosting attack to recover PII placed in messages (e.g., phone numbers or credit card numbers) for open source systems. We conclude with potential defenses and directions for future work...
https://www.schneier.com/blog/archives/2026/02/side-channel-attacks-against-llms
Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real threat. Yet discussions around these attacks and their potential defenses are dangerously myopic. The dominant narrative focuses on “prompt injection,” a set of techniques to embed instructions into inputs to LLM intended to perform malicious activity. This term suggests a simple, singular vulnerability. This framing obscures a more complex and dangerous reality. Attacks on LLM-based systems have evolved into a distinct class of malware execution mechanisms, which we term “promptware.” In a ...
https://www.schneier.com/blog/archives/2026/02/the-promptware-kill-chain.html
This is a current list of where and when I am scheduled to speak:
https://www.schneier.com/blog/archives/2026/02/upcoming-speaking-engagements-53.
An exploration of the interesting question.
https://www.schneier.com/blog/archives/2026/02/friday-squid-blogging-do-squid-dr
New York is contemplating a bill that adds surveillance to 3D printers:
New York’s 20262027 executive budget bill (S.9005 / A.10005) includes language that should alarm every maker, educator, and small manufacturer in the state. Buried in Part C is a provision requiring all 3D printers sold or delivered in New York to include “blocking technology.” This is defined as software or firmware that scans every print file through a “firearms blueprint detection algorithm” and refuses to print anything it flags as a potential firearm or firearm component...
https://www.schneier.com/blog/archives/2026/02/3d-printer-surveillance.html
I just noticed that the ebook version of Rewiring Democracy is on sale for $5 on Amazon, Apple Books, Barnes & Noble, Books A Million, Google Play, Kobo, and presumably everywhere else in the US. I have no idea how long this will last.
Also, Amazon has a coupon that brings the hardcover price down to $20. You’ll see the discount at checkout.
https://www.schneier.com/blog/archives/2026/02/rewiring-democracy-ebook-is-on-sa
Interesting research: “CHAI: Command Hijacking Against Embodied AI.”
Abstract: Embodied Artificial Intelligence (AI) promises to handle edge cases in robotic vehicle systems where data is scarce by using common-sense reasoning grounded in perception and action to generalize beyond training distributions and adapt to novel real-world situations. These capabilities, however, also create new security risks. In this paper, we introduce CHAI (Command Hijacking against embodied AI), a new class of prompt-based attacks that exploit the multimodal language interpretation abilities of Large Visual-Language Models (LVLMs). CHAI embeds deceptive natural language instructions, such as misleading signs, in visual input, systematically searches the token space, builds a dictionary of prompts, and guides an attacker model to generate Visual Attack Prompts. We evaluate CHAI on four LVLM agents; drone emergency landing, autonomous driving, and aerial object tracking, and on a real robotic vehicle. Our experiments show that CHAI consistently outperforms state-of-the-art attacks. By exploiting the semantic and multimodal reasoning strengths of next-generation embodied AI systems, CHAI underscores the urgent need for defenses that extend beyond traditional adversarial robustness...
https://www.schneier.com/blog/archives/2026/02/prompt-injection-via-road-signs.h
In 2023, the science fiction literary magazine Clarkesworld stopped accepting new submissions because so many were generated by artificial intelligence. Near as the editors could tell, many submitters pasted the magazine’s detailed story guidelines into an AI and sent in the results. And they weren’t alone. Other fiction magazines have also reported a high number of AI-generated submissions.
This is only one example of a ubiquitous trend. A legacy system relied on the difficulty of writing and cognition to limit volume. Generative AI overwhelms the system because the humans on the receiving end can’t keep up...
https://www.schneier.com/blog/archives/2026/02/the-ai-generated-text-arms-race.h
This is amazing:
Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models and a sign of how quickly things are moving. Security teams have been automating vulnerability discovery for years, investing heavily in fuzzing infrastructure and custom harnesses to find bugs at scale. But what stood out in early testing is how quickly Opus 4.6 found vulnerabilities out of the box without task-specific tooling, custom scaffolding, or specialized prompting. Even more interesting is how it found them. Fuzzers work by throwing massive amounts of random inputs at code to see what breaks. Opus 4.6 reads and reasons about code the way a human researcher would—looking at past fixes to find similar bugs that weren’t addressed, spotting patterns that tend to cause problems, or understanding a piece of logic well enough to know exactly what input would break it. When we pointed Opus 4.6 at some of the most well-tested codebases (projects that have had fuzzers running against them for years, ...
https://www.schneier.com/blog/archives/2026/02/llms-are-getting-a-lot-better-and
This is a video of advice for squid fishing in Puget Sound.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2026/02/friday-squid-blogging-squid-fishi
https://securityaffairs.com/188135/ai/smartloader-hackers-clone-oura-mcp-project
https://securityaffairs.com/188128/cyber-crime/polish-cybercrime-police-arrest-m
https://securityaffairs.com/188116/security/poorly-crafted-phishing-campaign-lev
https://securityaffairs.com/188064/hacking/south-korea-slaps-25m-fine-on-dior-lo
https://securityaffairs.com/188105/security/encrypted-rcs-messaging-support-land
https://securityaffairs.com/188097/malware/hackers-steal-openclaw-configuration-
https://securityaffairs.com/188075/data-breach/hackers-sell-stolen-eurail-travel
https://securityaffairs.com/188056/security/a-security-flaw-at-davaindia-pharmac
https://securityaffairs.com/188046/data-breach/shinyhunters-leaked-600k-canada-g
https://securityaffairs.com/188039/hacking/microsoft-alerts-on-dns-based-clickfi