InsightsWire LogoInsightsWire Logo

AI-powered world news analysis and insights. We decode what's happening globally to give you the news that matters.

Platform

  • Home
  • Latest News
  • Your Feed
  • Newsletter

Categories

  • Technology
  • Startups & Venture
  • Geopolitics & Policy
  • Energy, Climate & Infrastructure

Support

  • Contact Us
  • Privacy
  • Terms

© 2026 InsightsWire. All rights reserved.

PrivacyTerms
  • Home
  • Bookmarks
  • Profile
InsightsWire LogoInsightsWire Logo
Sign inGet Started Free
  • Technology
  • Startups & Venture
  • Geopolitics & Policy
  • Energy, Climate & Infrastructure
  • Cybersecurity & Privacy
  • Consumer Tech & Hardware
  • Business
  • Aerospace, Defense & Space
  • Life Sciences & Health
  • Economy
HomeBookmarksMy WatchlistsWeekly digestHelp

News / Cybersecurity & Privacy

Amazon tightens controls after AI coding assistant triggers limited AWS disruptions
Cybersecurity & Privacy

Amazon tightens controls after AI coding assistant triggers limited AWS disruptions

Two internal incidents tied to Amazon’s developer-facing AI tools prompted access-control fixes and mandatory reviews, with Amazon calling the root cause human permissions rather than autonomous AI behavior. AWS says customer impact was minimal and has rolled out peer review and training to reduce recurrence.

View Insights
Advantest Hit by Ransomware; probe ongoing

Advantest Hit by Ransomware; probe ongoing

Japan’s chip-test equipment maker reported an IT intrusion on Feb. 15 and says investigators found signs of ransomware on parts of its network. The company has not confirmed data theft and is evaluating impacts for customers and employees while response teams continue containment work.

View Insights
FBI signals renewed wave of ATM jackpotting; 700+ incidents and $20M losses in 2025
Cybersecurity & Privacy

FBI signals renewed wave of ATM jackpotting; 700+ incidents and $20M losses in 2025

View Insights
Amazon: Hackers Used AI to Breach 600+ Firewalls in Weeks
Cybersecurity & Privacy

Amazon: Hackers Used AI to Breach 600+ Firewalls in Weeks

View Insights
Cybersecurity & Privacy

NIST single-photon chip expands practical quantum key distribution

NIST has demonstrated an on-demand single-photon source integrated on a chip and paired advances in detectors, potentially extending secure quantum key links far beyond today's practical limits. This could lower barriers for quantum key distribution adoption and enable new quantum networking use cases within a few years.

View Insights
Meta, Apple in Court Over Child‑Safety and Encryption Choices
Cybersecurity & Privacy

Meta, Apple in Court Over Child‑Safety and Encryption Choices

Separate state suits and a bellwether Los Angeles trial are using internal documents and executive testimony to challenge how product design and encryption choices affect child safety; lawmakers and international regulators are watching as outcomes could force technical remedies, new disclosure duties, or national policy responses.

View Insights
Cecuro’s specialized AI flags 92% of exploited DeFi contracts

Cecuro’s specialized AI flags 92% of exploited DeFi contracts

A domain-focused security agent from Cecuro identified vulnerabilities tied to most exploited DeFi contracts in an open benchmark, covering far more loss value than a GPT-5.1-based baseline. The public dataset and evaluation show tailored review processes and heuristics materially lift detection compared with general coding agents.

View Insights
Automakers selling driver telemetry to insurers fuels privacy and pricing fights

Automakers selling driver telemetry to insurers fuels privacy and pricing fights

A driver discovered his braking event reached an insurer via his vehicle maker’s telemetry, sparking a lawsuit and renewed scrutiny of data sales. Regulators and consumer groups warn that widespread collection—affecting roughly nine in ten new cars—has real price and consent implications.

View Insights
Cybersecurity & Privacy

Surge in Threats Against U.S. Officials Drives Record Federal Prosecutions

Federal authorities prosecuted an unusually high number of threat-related cases last year as violent and harassing communications against judges, lawmakers and law-enforcement officials increased sharply. The rise has driven new security spending, intensified prosecutions, and raised concerns that public service will become harder to staff and protect.

View Insights
Cybersecurity & Privacy

AI-powered SAST sharply cuts false positives and finds logic flaws

Legacy static analysis often generates roughly 68–78% false positives, forcing heavy manual triage. Layering fast rules, program-level dataflow, and LLM reasoning reduces noise and uncovers business-logic flaws—but organizations should run staged pilots, codify human-in-the-loop boundaries, and integrate remediation workflows to manage data risk and avoid false assurance.

View Insights
Cybersecurity & Privacy

CX platforms enable AI-driven lateral breaches in enterprise stacks

Customer-experience platforms are becoming unmonitored conduits attackers exploit to move laterally into core systems; a recent token theft exposed access across 700+ Salesforce instances and showed that traditional DLP and perimeter controls miss sensitive, free-text disclosures. Defenders must pair CX-layer input hygiene and API gating with identity-first controls — machine-identity inventories, automated rotation and cryptographic attestations — because stale service tokens and non-human credentials are the fastest-growing enablers of lateral movement.

View Insights
Cybersecurity & Privacy

Salt Typhoon hackers believed to be retaining stolen telecom data for later exploitation

An FBI cyber official warned the China-linked group Salt Typhoon likely preserved exfiltrated telecom records as a long-term intelligence cache rather than for immediate monetization. Investigators say the intrusion touched dozens of providers and may involve data tied to more than one million U.S. residents, heightening risks from future targeted surveillance and fraud.

View Insights
U.S. Signals Tighter Cyber Retaliation Tied to Adversary Moves, Seeks Industry Coordination
Cybersecurity & Privacy

U.S. Signals Tighter Cyber Retaliation Tied to Adversary Moves, Seeks Industry Coordination

View Insights
Cybersecurity & Privacy

AI chatbots vulnerable to simple web manipulation, researchers warn

Security researchers and SEO experts demonstrated that a short, fabricated web article can prompt major chatbots and search AI to repeat false claims within hours. The gap between rapid model deployment and weak provenance checks makes automated answers easy to hijack for misinformation or marketing abuse.

View Insights
West Virginia attorney general sues Apple over iCloud handling of child exploitation images
Cybersecurity & Privacy

West Virginia attorney general sues Apple over iCloud handling of child exploitation images

West Virginia's attorney general has filed a consumer-protection lawsuit accusing Apple of failing to curb child exploitation images across iCloud and iOS. The state seeks damages and court-ordered technical fixes that could force Apple to adopt automated detection measures previously rejected over privacy concerns.

View Insights
Cybersecurity & Privacy

Microsoft discloses Office defect that let Copilot access private emails

A flaw in Office allowed Microsoft’s Copilot assistant to read and summarize emails that had confidentiality labels applied, creating a multi-week exposure window beginning in January; Microsoft began a phased remediation in early February and administrators can follow progress via message center entry CW1226324. The disclosure arrived alongside other active Office vulnerabilities — notably CVE-2026-21509 and related CISA guidance — heightening the urgency for organizations to patch, audit AI-enabled endpoints and review access to built-in assistants.

View Insights
Dell RecoverPoint Zero-Day Exploited by China-Linked Cyberespionage Group
Cybersecurity & Privacy

Dell RecoverPoint Zero-Day Exploited by China-Linked Cyberespionage Group

View Insights
Cybersecurity & Privacy

Moonwell pricing glitch lets liquidators seize millions in cbETH collateral

A misconfigured Chainlink oracle on Moonwell briefly priced cbETH at roughly $1, triggering rapid liquidations that generated about $1.8M in protocol bad debt and the seizure of 1,096.317 cbETH. Governance timelocks and the need for an on-chain vote delayed a fix, spotlighting oracle risk and protocol governance trade-offs.

View Insights
TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list
Cybersecurity & Privacy

TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list

View Insights
U.S. Treasury to publish AI cyber-risk guidance for financial firms
Cybersecurity & Privacy

U.S. Treasury to publish AI cyber-risk guidance for financial firms

The U.S. Treasury will roll out a set of six practical resources this February, created by a public-private oversight group to help financial firms manage cyber and AI risk. The materials aim to set baseline practices across governance, data stewardship, transparency and fraud controls to support safer AI adoption in banking and related services.

View Insights
Cybersecurity & Privacy

VS Code extensions left 128 million installs vulnerable to exploitation

A security review uncovered critical and high-severity flaws in four popular Visual Studio Code extensions, collectively reaching about 128 million installs and enabling file theft, remote code runs, and network reconnaissance. Three formal CVEs were published and researchers say multiple maintainers ignored notifications for months, forcing public disclosure and urgent mitigation guidance.

View Insights
UpGuard flags massive U.S. dataset containing billions of emails and Social Security numbers

UpGuard flags massive U.S. dataset containing billions of emails and Social Security numbers

Security researchers found a publicly exposed collection that listed roughly 3 billion email/password pairs and about 2.7 billion records containing Social Security numbers. The host took the dataset offline after notification, but a sampled review suggests hundreds of millions of SSNs could be valid and at risk of future exploitation.

View Insights
Cybersecurity & Privacy

OpenAI unveils EVMbench to benchmark AI for smart-contract security

OpenAI released EVMbench, a new evaluation framework that measures AI systems’ ability to detect, exploit in test conditions, and remediate vulnerabilities in EVM-compatible smart contracts. Built with Paradigm and drawing on real-world flaws, the benchmark aims to create a repeatable standard for assessing AI-driven defenses around code that secures large sums of on‑chain value.

View Insights
Industrial Control Systems: Rising pre‑positioning and ransomware force OT resilience shift

Industrial Control Systems: Rising pre‑positioning and ransomware force OT resilience shift

By 2026, adversaries will increasingly combine quiet, long‑dwell reconnaissance with financially motivated ransomware and faster weaponization to exploit ICS. Defenders must adopt CTEM, identity‑centric controls (including comprehensive machine‑identity inventories and rapid revocation), OT‑aware zero trust, SBOM-driven supply‑chain visibility, and conservative AI-based anomaly detection to preserve uptime and compress remediation windows.

View Insights
API Attacks Surge as AI Expands the Blast Radius; Wallarm Flags MCP Risk
Cybersecurity & Privacy

API Attacks Surge as AI Expands the Blast Radius; Wallarm Flags MCP Risk

View Insights
Cybersecurity & Privacy

Dragos: Three New Threat Clusters Escalate ICS/OT Risk in 2025

Dragos identified three previously unreported threat clusters in 2025 that expanded industrial-targeting techniques and raised the active tracked groups to 11 of 26. Complementary industry signals show automation and synthetic-media-driven social engineering are compressing time-to-weaponization and amplifying the operational risk these new clusters pose, forcing defenders toward identity-first controls and faster, automated containment.

View Insights
Server-side attacks undermine password managers’ ‘zero-knowledge’ assurances
Cybersecurity & Privacy

Server-side attacks undermine password managers’ ‘zero-knowledge’ assurances

View Insights
Sentrycs Scout portable C-UAS deployed with German state police
Cybersecurity & Privacy

Sentrycs Scout portable C-UAS deployed with German state police

View Insights
Crypto Fear-and-Greed Index Drops to Record Low as Post-10/10 Liquidations Continue to Weigh
Cybersecurity & Privacy

Crypto Fear-and-Greed Index Drops to Record Low as Post-10/10 Liquidations Continue to Weigh

The Crypto Fear-and-Greed Index plunged to an unprecedented 5 after an Oct. 10 forced-liquidation cascade that exposed concentrated leverage and thin liquidity. Short-term panic persists even as institutional allocations and tactical liquidity interventions provide partial, likely temporary, stabilization.

View Insights
Cybersecurity & Privacy

Machine identities missing from ransomware playbooks

Enterprise ransomware playbooks commonly treat credential resets as a human-only control, leaving service accounts, API keys, tokens and certificates intact — a blind spot that accelerates lateral movement and drives recovery costs. Market shifts toward targeted, disruption-focused extortion and faster weaponization via agentic AI make that omission more dangerous: defenders must pair machine-identity governance with identity-first detection and quicker containment to blunt modern ransomware economics.

View Insights
AI agent 'Kai Gritun' farms reputation with mass GitHub PRs, raising supply‑chain concerns
Cybersecurity & Privacy

AI agent 'Kai Gritun' farms reputation with mass GitHub PRs, raising supply‑chain concerns

View Insights
Hackers Rapidly Exploit Critical BeyondTrust Remote-Access Flaw After PoC Emerges
Cybersecurity & Privacy

Hackers Rapidly Exploit Critical BeyondTrust Remote-Access Flaw After PoC Emerges

View Insights
Check Point deepens AI and exposure-management stack with three acquisitions after robust 2025 results
Cybersecurity & Privacy

Check Point deepens AI and exposure-management stack with three acquisitions after robust 2025 results

View Insights
Previous
12345
Next