Curated Articles

392 articles, 0 reports (2 weeks)

P1 🌍 Global Vulnerability

Brute‑Forcing Joomla: Bypassing Login to Extract User Passwords from the Joomla CMS

The hugely popular multifunctional CMS Joomla is back on our radar. A few months ago we already looked at a vulnerability in it, but that one was an SQL injection. This time we’ve got something more exotic on the agenda — an LDAP injection. Vulnerabilities of this kind are relatively rare.

TECHNOLOGY & INNOVATION SECURITY & THREATS
2026-02-19 00:00 hackmag.com 📖
P3 🌍 Global

AWS brings sovereign cloud infrastructure online to meet European data-residency and compliance needs

Across the globe, many government institutions are beginning to understand the importance of privacy within the overall institutional framework. In Europe, data privacy is driving policies and rules with strict demands to cloud service providers like AWS. In response, AWS has developed a lasting sol...

SECURITY & THREATS POLICY & REGULATION european euro
2026-02-18 23:57 gcn.com 📖
P1 🌍 Global

OWASP Agentic Top 10: Agent Goal Hijack – FireTail Blog

Feb 18, 2026 - Lina Romero - What is Agent Goal Hijack?Agent Goal Hijack occurs when an attacker manipulates an agent's objectives or decision pathways. Unlike traditional LLM attacks that focus on altering a single response, ASI01 targets the planning logic of the agent.Agents rely on natural-langu...

SECURITY & THREATS
2026-02-18 21:32 securityboulevard.com 📖
P2 🌍 Global

Poland bans Chinese-made cars from entering military sites

The instruction to commanders to keep affected cars outside of secured perimeters comes amid growing concerns over motor vehicle network equipment and supply chains that routinely record location and other data.

SECURITY & THREATS chinese
2026-02-18 14:32 therecord.media 📖
P3 🌍 Global Vulnerability

Chinese hackers exploiting Dell zero-day flaw since mid-2024

A suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks that started in mid-2024.

SECURITY & THREATS STRATEGY & CAPABILITY ese chinese
2026-02-17 20:15 andreadraghetti.it 📖
P3 🌍 Global

ENISA EU ICT Supply Chain Security Toolbox

Il NIS Cooperation Group di ENISA ha pubblicato il "EU ICT Supply Chain Security Toolbox": https://digital-strategy.ec.europa.eu/en/library/toolbox-improve-ict-supply-chain-security . Ringrazio Franco Vincenzo Ferrari per avermelo segnalato. Si tratta di un documento di presentazione generale e 2 do...

TECHNOLOGY & INNOVATION STRATEGY & CAPABILITY Europa Europa
2026-02-17 15:58 blog.cesaregallotti.it 📖
P3 🇸🇪 Sweden

Så kan ditt företag vara med och öka Sveriges motståndskraft

Förbered ditt företag Myndigheten för civilt försvar har samlat tips och råd om hur företag kan stärka sin motståndskraft vid krig eller större samhällsstörningar. Företag förväntas vara väl förberedda och kunna upprätthålla sin verksamhet även …

POLICY & REGULATION STRATEGY & CAPABILITY Myndigheten för civilt försvar Sverige
2026-02-17 15:11 almega.se 📖
P3 🌍 Global Threat

OT teams are losing the time advantage against industrial threat actors

In many industrial environments, internet-facing gateways, remote access appliances, and boundary systems sit close enough to production networks that attackers can move from IT intrusion to operational disruption with limited resistance. Dragos’ 2026 OT/ICS Year in Review describes a threat landsca...

RESEARCH & ANALYSIS STRATEGY & CAPABILITY Teams Teams
2026-02-17 13:40 helpnetsecurity.com 📖
P3 🌍 Global Threat

SIPRI co-hosts discussions on maritime hybrid threats in the Baltic Sea

On 10 February, SIPRI, the French Navy Centre for Strategic Studies (CESM) and the French Embassy in Stockholm jointly hosted a ‘Franco-Swedish Day on Maritime Hybrid Threats in the Baltic Sea’.

RESEARCH & ANALYSIS SECURITY & THREATS rench ran
2026-02-17 12:29 sipri.org 📖
P3 🌍 Global Vulnerability

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2008-0015 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability CVE-2020-7796 Synacor Zimbra Collaboration Suite (ZCS) Server-Side Reques...

SECURITY & THREATS TECHNOLOGY & INNOVATION CHROMIUM
2026-02-17 12:00 us-cert.cisa.gov 📖
P3 🇸🇪 Sweden

Sverige och Ukraina inleder samarbete om cybersäkerhet

Sverige och Ukraina har tecknat ett avtal om samarbete inom cybersäkerhet. Syftet är att stärka Ukrainas förmåga att hantera cyberangrepp samt att ge Sverige tillgång till erfarenheter från Ukrainas arbete mot avancerade hot. Inlägget Sverige och Ukraina inleder samarbete om cybersäkerhet dök först ...

SECURITY & THREATS STRATEGY & CAPABILITY Sverige Ukraina
2026-02-17 10:12 aktuellsakerhet.se 📖
P1 🌍 Global

Hackers sell stolen Eurail traveler information on dark web

Eurail B.V. revealed that traveler data were stolen in a recent security breach, and are now being sold on the dark web. Eurail B.V. confirmed that the traveler data stolen in a breach earlier this year is now being offered for sale on the dark web. The company disclosed the development as part of i...

SECURITY & THREATS STRATEGY & CAPABILITY
2026-02-17 08:54 securityaffairs.co 📖
P3 🇪🇺 EU

The European Supervisory Authorities and UK financial regulators sign Memorandum of Understanding on oversight of critical ICT third-party service providers under DORA

The European Supervisory Authorities and UK financial regulators sign Memorandum of Understanding on oversight of critical ICT third-party service providers under DORA 14 January 2026 Digital Finance and Innovation International cooperation ...

TECHNOLOGY & INNOVATION INTERNATIONAL & COOPERATION bank pean
2026-02-17 05:49 european-union.europa.eu 📖
P1 🌍 Global Vulnerability

Exploit available for new Chrome zero-day vulnerability, says Google

Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT administrators. The warning comes after Google released a patch for Chrome to plug a use after free memory vulnerability ( CVE-2026-2441 ) in cascading style sheets (CSS), which me...

SECURITY & THREATS RESEARCH & ANALYSIS
2026-02-17 00:48 csoonline.com 📖
P3 🇸🇪 Sweden

Europa uppmanas skaffa egna ”cybervapen”

Europa behöver en egen ”cyberoffensiv” för att stå upp mot det växande hotet från Ryssland och Kina, enligt Estlands underrättelsechef Kaupo Rosi. Även EU:s techkommissionär vill att unionen ska kunna genomföra egna cyberangrepp.

STRATEGY & CAPABILITY RESEARCH & ANALYSIS Europa Estland
2026-02-16 19:16 dn.se 📖
P1 🌍 Global Threat

The Promptware Kill Chain

Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real threat. Yet discussions around these attacks and their potential defenses are dangerously myopic. The dominant narrative focuses on “ prompt injection ,” a set of techniques to embed instructions ...

TECHNOLOGY & INNOVATION SECURITY & THREATS
2026-02-16 12:04 schneier.com 📖
P3 🌍 Global

Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud

Presentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’ at the Innovation Agency event ‘Innovation Breakfast: How Mission-Oriented Science and Innovation Programmes Will Address Societal Challenges’. Technologies are evolving fast, reshaping economies, governance, and dail...

TECHNOLOGY & INNOVATION STRATEGY & CAPABILITY
2026-02-16 11:55 thehackernews.com 📖
P1 🌍 Global Vulnerability

Infosec exec sold eight zero-day exploit kits to Russia, says DoJ

PLUS: Fake ransomware group exposed; EC blesses Google's big Wiz deal; Alleged sewage hacker cuffed; And more Infosec in Brief The former General Manager of defense contractor L3Harris’s cyber subsidiary Trenchant sold eight zero-day exploit kits to Russia, according to a court filing last week.…

SECURITY & THREATS INTERNATIONAL & COOPERATION harri
2026-02-15 23:22 theregister.com 📖
P1 🌍 Global

Interpol backroom warriors fight cyber criminals 'weaponising' AI

From perfectly spelled phishing emails to fake videos of government officials, artificial intelligence is changing the game for Interpol's cat-and-mouse fight against cybercrime at its high-tech war rooms in Singapore.

INTERNATIONAL & COOPERATION TECHNOLOGY & INNOVATION Interpol
2026-02-15 12:20 techxplore.com 📄
P3 🌍 Global Threat

As AI and agents are adopted to accelerate development, cognitive load and cognitive debt are likely to become bigger threats to developers than technical debt (Margaret-Anne Storey)

Margaret-Anne Storey : As AI and agents are adopted to accelerate development, cognitive load and cognitive debt are likely to become bigger threats to developers than technical debt —  The term technical debt is often used to refer to the accumulation of design or implementation choices that later ...

RESEARCH & ANALYSIS
2026-02-15 09:55 techmeme.com 📖
P3 🌍 Global Vulnerability

Apple Patches Decade-Old IOS Zero-Day, Possibly Exploited By Commercial Spyware

This week Apple patched iOS and macOS against what it called "an extremely sophisticated attack against specific targeted individuals." Security Week reports that the bugs "could be exploited for information exposure, denial-of-service (DoS), arbitrary file write, privilege escalation, network tr...

SECURITY & THREATS STRATEGY & CAPABILITY
2026-02-15 08:34 slashdot.org 📄
P1 🌍 Global

AI Entrapment: When Your Paid AI Locks You Out for RISKY chat, the Conversation IT Created

Author: Berend Watchus. Independent non profit AI & Cyber Security Researcher. [Publication for: OSINT Team, online magazine] The Critical Facts Upfront The AI (Claude) participated in 100+ exchanges with me. Then it flagged and blocked the conversation for being “too long and detailed and analytica...

POLICY & REGULATION STRATEGY & CAPABILITY Exchange OpenAI
2026-02-15 03:11 osintteam.blog 📄
P1 🌍 Global

New NCSC-Led OT Security Guidance for Nuclear Reactors

Last month, the U.K. National Cyber Security Centre in partnership with the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation and other international partners released a new guidance, titled "Secure Connectivity Principles for Operational Technology." Highlightin...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION Cybersecurity and Infrastructure Security Agency National Cyber Security Centre
2026-02-15 03:00 ncsc.fi 📄
P1 🇸🇪 Sweden

Nu ska Sverige öva massevakuering av civila i krig

Det kommer åter att hållas evakueringsövningar av civila som en förberedelse för krig, och först ut är Gotland med en övning i höst med upp till 300 frivilliga statister. På 1950- och 60-talen gjordes flera såna här övningar, den största i Stockholm 1961 med 30 000 deltagare, men sen dess har ingen ...

POLICY & REGULATION Myndigheten för civilt försvar Sverige
2026-02-15 01:58 sverigesradio.se 📖
P1 🇸🇪 Sweden

How global cybercrime syndicates are stealing hearts — and billions - Politico

How global cybercrime syndicates are stealing hearts — and billions Politico Men are more likely to fall for this scam. Here's how to spot the red flags WLWT WATCH: Former FBI agent shares Valentine’s Day romance scam warning signs WJLA FBI: Love fraud cost Alabamians $7.4 Million in 2025 WHNT.com I...

INTERNATIONAL & COOPERATION
2026-02-14 21:00 google.se 📖
P3 🌍 Global Threat

Nevada unveils new statewide data classification policy months after cyberattack

Eric Neugeboren reports: Nevada’s IT agency has rolled out a new policy aimed at standardizing the privacy of state data, months after a massive cyberattack crippled certain systems for weeks. The policy announced Wednesday from the Governor’s Technology Office marks the first time the state will ha...

SECURITY & THREATS INTERNATIONAL & COOPERATION
2026-02-14 20:42 databreaches.net 📄
P1 🌍 Global

Cobalt Strike Beacon Commands: Red Team Field Guide

Cobalt Strike Beacon Commands: Red Team Field Guide Cobalt Strike Beacon Commands: Red Team Field Guide Updated on February 15, 2026 Table of Contents The Philosophy of "Low and Slow" Situational Awareness (Without Breaking Things) Execution Strategy: The "Fork and Run" Dilemma Advanced Injection & ...

SECURITY & THREATS OPERATIONS & TECHNICAL
2026-02-14 20:23 hackingdream.net 📖
P1 🌍 Global

Windows Userland Persistence: 12 Red Team Techniques

Windows Userland Persistence: 12 Red Team Techniques (2025 Guide) Windows Userland Persistence: The Senior Red Teamer's Playbook Updated on February 15, 2026 Table of Contents Introduction Prerequisites 1. Initial Information Gathering 2. Registry Run Keys (HKCU) 3. The Startup Folder 4. Userland Sc...

OPERATIONS & TECHNICAL STRATEGY & CAPABILITY
2026-02-14 19:36 hackingdream.net 📖
P2 🌍 Global Threat

The CANFAIL campaign demonstrates structured, LLM-assisted phishing operations a...

The CANFAIL campaign demonstrates structured, LLM-assisted phishing operations attributed to a suspected Russian-linked actor. Per Google Threat Intelligence Group: • Sectoral targeting: defense, military, energy, aerospace • Regionally tailored email list generation • Google Drive-hosted RAR payloa...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS SentinelOne ChatGPT
2026-02-14 16:16 infosec.exchange 📄
P3 🌍 Global Protection

Dealroom and NATO Innovation Fund: European defense, security, and resilience startup funding rose 55% YoY to a record $8.7B in 2025, with AI accounting for 44% (Ingrid Lunden/Resilience Media)

Ingrid Lunden / Resilience Media : Dealroom and NATO Innovation Fund: European defense, security, and resilience startup funding rose 55% YoY to a record $8.7B in 2025, with AI accounting for 44% —  Ahead of the big Munich Security Conference later this week, the analysts at Dealroom teamed up with ...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION
2026-02-14 13:30 techmeme.com 📖
P1 🌍 Global Risk

Advisory Group Meetings in Tallinn Advance Work on Key EU Large-Scale IT Systems

From 9 to 13 February, eu-LISA held a series of ordinary Advisory Group meetings in Tallinn and online with Member States, Schengen Associated Countries, EU agencies and the European Commission. The meetings provided an opportunity to review progress, discuss operational and legal developments, and ...

STRATEGY & CAPABILITY POLICY & REGULATION
2026-02-14 05:58 european-union.europa.eu 📖
P1 🌍 Global

Proofpoint Purchases Startup Acuvity to Bolster AI Security

Deal Targets GenAI Risks, Prompt Injection Attacks and Autonomous Agents Proofpoint has acquired AI security startup Acuvity to address fast-evolving risks tied to generative AI, prompt injection and autonomous agents. The company says intent-based guardrails and deep AI forensics will help enterpri...

STRATEGY & CAPABILITY SECURITY & THREATS ChatGPT ChatGPT
2026-02-14 05:44 healthcareinfosecurity.com 📄
P3 🌍 Global Protection

'Crazy' Hackers Strike Through Remote Monitoring Software

VoidCrypt Ransomware Variant Taps RMM Tools, Says Huntress Management isn't the only advocate for employee monitoring software, according to new research from cybersecurity firm Huntress. RMM tools - simultaneously open to remote connections and with privileged local access - are good for wiggling i...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION
2026-02-14 05:35 bankinfosecurity.asia 📄
P1 🌍 Global Threat

Urgent Warnings From UK and US Cyber Agencies After Polish Energy Grid Attack

A coordinated cyberattack that targeted Poland's energy infrastructure in late December 2025 has prompted cybersecurity agencies to issue urgent warnings to critical national infrastructure operators on both sides of the Atlantic. The attack, which Poland's Computer Emergency Response Team compared...

STRATEGY & CAPABILITY POLICY & REGULATION
2026-02-14 03:00 ncsc.fi 📄
P1 🌍 Global

AI will likely shut down critical infrastructure on its own, no attackers required

With a new Gartner report suggesting that AI problems will “shut down national critical infrastructure” in a major country by 2028, CIOs need to rethink industrial controls that are very quickly being turned over to autonomous agents. Gartner embraces the term Cyber Physical Systems (CPS) for these ...

POLICY & REGULATION INTERNATIONAL & COOPERATION
2026-02-14 01:05 itnews.com 📄
P1 🇪🇺 EU

FTC digs deeper into Microsoft’s bundling and licensing practices

The US Federal Trade Commission (FTC) seems to be doubling down on its investigation of Microsoft and the tech giant’s potentially shady bundling and licensing practices. According to a Bloomberg report , the federal agency has been issuing civil investigative demands (CIDs) to companies that compet...

TECHNOLOGY & INNOVATION POLICY & REGULATION
2026-02-14 00:34 itnews.com 📄
P1 🌍 Global Incident

Attor­ney Gen­er­al Ken Pax­ton Demands Infor­ma­tion from Blue Cross Blue Shield of Texas and Con­duent as Part of Inves­ti­ga­tion into Largest Data Breach in U.S. History

Their headline was, “Attor­ney Gen­er­al Ken Pax­ton Demands Infor­ma­tion from Blue Cross Blue Shield of Texas and Con­duent as Part of Inves­ti­ga­tion into Largest Data Breach in U.S. History,” but that seemed terribly wrong. Is Texas Attorney General Ken Paxton using AI as for his research?  “La...

SECURITY & THREATS
2026-02-13 20:33 databreaches.net 📄
P1 🌍 Global

From flattery to debate: Training AI to mirror human reasoning

Generative artificial intelligence systems often work in agreement, complimenting the user in its response. But human interactions aren't typically built on flattery. To help strengthen these conversations, researchers in the USF Bellini College of Artificial Intelligence, Cybersecurity and Computin...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION
2026-02-13 18:20 techxplore.com 📄
P3 🇸🇪 Sweden

Sverige och Ukraina i nytt cybersäkerhetssamarbete

Sverige och Ukraina har tecknat ett femårigt avtal om samarbete kring cybersäkerhet. Syftet är att stärka Ukrainas motståndskraft mot ryska cyberangrepp – och samtidigt höja Sveriges egen förmåga att hantera avancerade cyberhot.

INTERNATIONAL & COOPERATION POLICY & REGULATION Sverige Ukraina
2026-02-13 18:03 di.se 📄
P2 🌍 Global

“Shadow Campaigns” Show Evidence of Global Espionage Using ShadowGuard Rootkit

Verticals Targeted: Government, Telecommunications, Finance, Aerospace Regions Targeted: North America, South America, Africa, Europe, Asia Related Families: Diaoyu Loader, ShadowGuard, Cobalt Strike, VShell Executive Summary A sophisticated state-aligned cyberespionage operation attributed to TGR-S...

POLICY & REGULATION INTERNATIONAL & COOPERATION region rica
2026-02-13 18:01 blog.polyswarm.io 📄
P3 🌍 Global

The US DoD published and then deleted a document adding Alibaba, Baidu, and BYD to a list of companies with alleged connections to the Chinese military (Demetri Sevastopulo/Financial Times)

Demetri Sevastopulo / Financial Times : The US DoD published and then deleted a document adding Alibaba, Baidu, and BYD to a list of companies with alleged connections to the Chinese military —  The companies are among a number the Pentagon believes could pose a threat to American national security

POLICY & REGULATION STRATEGY & CAPABILITY chinese erican
2026-02-13 17:40 techmeme.com 📖
P1 🌍 Global Threat

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targ...

SECURITY & THREATS STRATEGY & CAPABILITY region ussian
2026-02-13 17:27 thehackernews.com 📄
P1 🌍 Global Threat

Four new reasons why Windows LNK files cannot be trusted

The number of ways that Windows shortcut (.LNK) files can be abused just keeps growing: A cybersecurity researcher has documented four new techniques to trick Windows users into running malicious actions through innocent-looking shortcuts. Wietze Beukema demonstrated how to spoof the visible LNK des...

STRATEGY & CAPABILITY SECURITY & THREATS iet ze be
2026-02-13 16:15 itnews.com 📄
P3 🇸🇪 Sweden

“Jag känner avsmak inför Techarenas agerande”

I torsdags var Storbritanniens före detta premiärminister Boris Johnson inbjuden att tala inför tusentals entreprenörer och investerare på techkonferensen Techarena. Det får den brittiska techprofilen Matthew Blakemore att reagera starkt. “Bokstavligen som att bjuda in djävulen till en konferens i...

POLICY & REGULATION Storbritannien djävulen
2026-02-13 13:59 breakit.se 📖
P1 🌍 Global Vulnerability

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-1731 BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability These types of vulnerabilities are frequent attack...

SECURITY & THREATS INTERNATIONAL & COOPERATION
2026-02-13 12:00 us-cert.cisa.gov 📖
P1 🌍 Global

Google fears massive attempt to clone Gemini AI through model extraction

Google detected and blocked a campaign involving more than 100,000 prompts that it claimed were designed to copy the proprietary reasoning capabilities of its Gemini AI model, according to a quarterly threat report released by Google Threat Intelligence Group. The prompts looked like a coordinated a...

RESEARCH & ANALYSIS STRATEGY & CAPABILITY ogle ogle
2026-02-13 11:32 csoonline.com 📄
P1 🌍 Global Threat

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Busin...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS
2026-02-13 11:25 thehackernews.com 📄
P1 🇪🇺 EU

Our efforts are helping to strengthen Europe’s competitive edge: 📝 10 simplifica...

Our efforts are helping to strengthen Europe’s competitive edge: 📝 10 simplification packages proposed to save European companies €15 billion every year 🌍 44 trade agreements with 79 countries giving European companies privileged access to global markets 🏢 EU Inc: We plan to create a single set of r...

TECHNOLOGY & INNOVATION
2026-02-13 09:38 ec.social-network.europa.eu 📄
P1 🇪🇺 EU

✍️ EU law, explained simply One million signatures can spark change at EU level....

✍️ EU law, explained simply One million signatures can spark change at EU level. Discover how the European Citizens’ Initiative works and how the Court protects this unique democratic tool. 🎥 Watch Bright here 👉 https:// curia.europa.eu/site/jcms/1165 117_EmbedVideo/en/one-million-signatures-to-make...

INTERNATIONAL & COOPERATION Europa europe
2026-02-13 09:19 curia.social-network.europa.eu 📄
P1 🌍 Global Threat

Germany prepares to attack cyber enemies

The German government is preparing an overhaul of its intelligence and cybersecurity powers to fight back against foreign hackers and spies with offensive cyber operations of its own. Officials are drafting two pieces of legislation, one revising the powers of Germany’s foreign intelligence service...

STRATEGY & CAPABILITY SECURITY & THREATS erman erman
2026-02-13 03:00 ncsc.fi 📄
P1 🌍 Global

Granskning av Lantmäteriets informationssäkerhet

Regeringen beslutade den 10 april 2025 att en utredare ska granska Lantmäteriets arbete med informationssäkerhet i myndighetens manuella hantering och digitala system (LI2025/00816).

POLICY & REGULATION RESEARCH & ANALYSIS regeringen manuell
2026-02-13 00:00 g0v.se 📖
P1 🌍 Global

Ny lagstiftning för stärkt konkurrens i privat och offentlig verksamhet

Regeringen har beslutat om en lagrådsremiss som föreslår nya regler i syfte att förbättra konkurrensen i privat och offentlig verksamhet. Genom ändringarna ges Konkurrensverket befogenhet att besluta om konkurrensfrämjande åtgärder. Det föreslås även en ny lag om offentlig säljverksamhet som ska sky...

POLICY & REGULATION regeringen regeringen
2026-02-13 00:00 g0v.se 📖
P3 🌍 Global

Regeringen tog emot utredning som granskat Lantmäteriets arbete med informationssäkerhet

Regeringen tog den 13 februari emot rapporten från utredningen som granskat Lantmäteriets arbete med informationssäkerhet. Regeringen gav utredningen i uppdrag att kartlägga Lantmäteriets arbete med informationssäkerhet och behandling av personuppgifter. I uppdraget ingick även att redovisa vilka åt...

POLICY & REGULATION RESEARCH & ANALYSIS regeringen regeringen
2026-02-13 00:00 g0v.se 📖
P1 🌍 Global

Polisräd mot EU-kommissionen i Bryssel

Belgisk polis har genomfört en räd mot EU-kommissionen i jakt på bevis i en utredning rörande en stor fastighetsförsäljning.

POLICY & REGULATION EU-kommissionen EU-kommissionen
2026-02-12 19:55 hbl.fi 📖
P1 🌍 Global

Nato grundar ledningsenhet i Finland

Nato har godkänt Försvarsministeriets förslag att placera försvarsalliansens nya enhet för ledningssystem i Finland. Kring 60 finländare kommer att anställas för enheten.

POLICY & REGULATION Finland ministeriet
2026-02-12 15:33 hbl.fi 📖
P2 🌍 Global Threat

Singapore Mounts Largest-Ever Coordinated Cyber Defense

Singapore Signals Heightened Vigilance Against State-Linked Threat Actors Singapore conducted a yearlong, multi-agency cyber defense operation to expel UNC3886 from all four major telecom providers after the advanced threat actor accessed segments of critical communications infrastructure and extrac...

POLICY & REGULATION RESEARCH & ANALYSIS
2026-02-12 05:46 inforisktoday.com 📄
P3 🌍 Global Risk

CISA: DHS Funding Lapse Would Sideline Federal Cyber Staff

Acting Chief Tells Lawmakers Most Staff Would Be Furloughed Amid Partial Shutdown More than half of the U.S. cyber defense agency's workforce would be furloughed under a DHS funding lapse, the agency's acting chief warned Wednesday, pausing incident reporting rulemaking, security assessments and pro...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION
2026-02-12 05:46 bankinfosecurity.asia 📄
P3 🌍 Global Threat

Should CISOs Plan for Government as an Adversary?

Why Modern Threat Modeling Must Account for State Control of Infrastructure CISOs for decades viewed governments as partners. That assumption is weakening. Today, state control over infrastructure needs be part of threat modeling and business continuity planning for global security leaders - and it'...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS
2026-02-12 05:11 databreachtoday.eu 📄
P1 🌍 Global Vulnerability

Siemens advisories

Classification: Severe, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 8.8, CVEs: CVE-2023-38545, CVE-2012-4691, CVE-2026-23715, CVE-2026-23716, CVE-2026-23717, CVE-2026-23718, CVE-2026-23719, CVE-2026-23720, CVE-2026-22923, CVE-2026-25656, CVE-2026-25655, CVE-2025-40587, CVE-2025-...

SECURITY & THREATS INTERNATIONAL & COOPERATION des
2026-02-12 03:00 ncsc.fi 📖
P1 🌍 Global Incident

Legacy systems blamed as ministers promise no repeat of Afghan breach

Legacy IT issues are hampering key technical measures designed to prevent highly sensitive data leaks, UK government officials say. On Tuesday, Parliament's Science, Innovation and Technology Committee grilled senior ministers on the progress made to prevent a repeat of the incident involving the M...

SECURITY & THREATS POLICY & REGULATION
2026-02-12 03:00 ncsc.fi 📖
P1 🌍 Global

Have you tried turning it off and on again? On bricking OT devices (part 1)

On December 29th of 2025, a series of coordinated cyber attacks took place against a number of targets connected to Polands electric grid. These targets consisted of at least 30 wind and solar farms and a combined heat and power (CHP) plant supplying heat to nearly half a million customers. While t...

SECURITY & THREATS INTERNATIONAL & COOPERATION
2026-02-12 03:00 ncsc.fi 📖
P2 🌍 Global

🔒 Security News Digest - 2026-02-12 📊 16 updates from 5 sources: 🔹 Security Boul...

🔒 Security News Digest - 2026-02-12 📊 16 updates from 5 sources: 🔹 Security Boulevard: Cloud Security and Compliance: What It Is and Why It Matters for Your Business https:// securityboulevard.com/2026/02/ cloud-security-and-compliance-what-it-is-and-why-it-matters-for-your-business/ 🔹 BleepingCompu...

POLICY & REGULATION STRATEGY & CAPABILITY Outlook
2026-02-12 02:45 infosec.exchange 📄
P3 🌍 Global

Myndigheten för utrikes underrättelser

Regeringen har gett en särskild utredare i uppdrag att förbereda och genomföra bildandet av en ny myndighet med uppgift att bedriva civil utrikesunderrättelsetjänst. Myndigheten för utrikes underrättelser ska enligt uppdraget kunna inleda sin verksamhet den 1 januari 2027. I promemorian föreslås tv...

POLICY & REGULATION regeringen regeringen
2026-02-12 00:00 g0v.se 📖
P1 🌍 Global

Nytt system för registerkontroll vid upphandling

Regeringen har beslutat om en lagrådsremiss med förslag till ett nytt system för registerkontroll vid offentlig upphandling och användning av valfrihetssystem. Syftet är att snabbt och enkelt kunna kontrollera om det finns skäl för uteslutning av en leverantör till följd av exempelvis brott eller o...

POLICY & REGULATION regeringen
2026-02-12 00:00 g0v.se 📖
P1 🌍 Global

Remo Uncover gathers Windows evidence into structured, readable summaries

Remo Software has launched Remo Uncover, a new Windows utility designed to simplify digital investigations by collecting and organizing system activity into structured reports that are easier to review. The forensics tool helps users understand how a laptop or desktop PC was used over a specific per...

RESEARCH & ANALYSIS
2026-02-11 22:06 betanews.com 📄
P3 🌍 Global Protection

How a $20 Lockpick Can Destroy Your Cybersecurity?

When we imagine cybersecurity, Hollywood movies come to mind: hooded hackers typing furiously in dark rooms, battling firewalls on glowing screens. But here’s the twist, the weakest link in your security chain might not be a software vulnerability. It could be a rusty fence, a cloned access badge, o...

STRATEGY & CAPABILITY SECURITY & THREATS
2026-02-11 20:18 osintteam.blog 📄
P1 🌍 Global

Automate your Google Dorking to Find Bugs

بِسْمِ ٱللَّٰهِ ٱلرَّحْمَٰنِ ٱلرَّحِيمِ Hello Hackers i am Mr.Abdullah Founder of Bitcops and Today i will help you to automate google dorking for finding bugs instantly. first of all if you don’t know what is google dorking then you can read my article on google dorking here . guys automation in bu...

TECHNOLOGY & INNOVATION
2026-02-11 20:18 osintteam.blog 📄
P1 🌍 Global

No, MIT Did Not Break the No-Cloning Theorem — And Their Paper Actually Validates My Quantum…

No, MIT Did Not Break the No-Cloning Theorem — And Their Paper Actually Validates My Quantum Watchman Invention Author: Berend Watchus. Independent non profit AI & Cyber Security Researcher. February 11, 2026 https://arxiv.org/abs/2602.09282 (my invention has nothing to do with cats, but as you know...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS lai
2026-02-11 20:18 osintteam.blog 📄
P3 🇸🇪 Sweden

Expert: Val under krig inte säkert för medborgarna

Enligt Financial Times planerar Ukraina – under press från USA – för ett presidentval och en folkomröstning om ett eventuellt fredsavtal med Ryssland i vår. Om valet hålls senast den 15 maj ska Ukraina få säkerhetsgarantier från USA. Men Jakob Hedenskog som är analytiker vid centrum för Östereuropas...

INTERNATIONAL & COOPERATION Europa Ryssland
2026-02-11 18:37 sverigesradio.se 📖
P1 🌍 Global Threat

Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious link inside a Markdown file opened in Notepad," as re...

SECURITY & THREATS STRATEGY & CAPABILITY
2026-02-11 18:06 theverge.com 📄
P1 🌍 Global Protection

Proactive strategies for cyber resilience with Wazuh

Cyber resilience means anticipating threats, detecting them early, and recovering fast when incidents occur. Wazuh shows how its open source SIEM and XDR unify visibility, detection, and automated response to strengthen proactive defense.

OPERATIONS & TECHNICAL STRATEGY & CAPABILITY
2026-02-11 18:00 andreadraghetti.it 📖
P3 🇸🇪 Sweden

Mångmiljardsatsning på AI-infrastruktur i Dalarna

EcoDataCenter och Mistral AI går samman för att bygga ett storskaligt AI-datacenter i Borlänge. Satsningen, värd cirka 12,8 miljarder kronor, är ett led i att stärka Europas oberoende inom artificiell intelligens.

POLICY & REGULATION INTERNATIONAL & COOPERATION datacenter region
2026-02-11 17:58 dalademokraten.se 📖
P1 🌍 Global Protection

Defense: EU moves to counter drone threats with a new action plan Designed to su...

Defense: EU moves to counter drone threats with a new action plan Designed to support Member States through coordinated action, the Plan has four priorities: improving preparedness, enhancing detection capabilities, coordinating responses, and strengthening the EU's defence readiness. https://www. e...

RESEARCH & ANALYSIS STRATEGY & CAPABILITY
2026-02-11 16:44 mastodon.social 📄
P1 🌍 Global Incident

January 2026: Instagram, BreachForums, SoundCloud Leaks, Trust Wallet Backdoor

January 2026: Instagram, BreachForums, SoundCloud Leaks, Trust Wallet Backdoor January 2026 incident disclosures spanned consumer platforms, enterprise identity workflows, and the cybercrime ecosystem itself. Multiple stories centered on identity data exposure, whether through alleged scraping leaks...

SECURITY & THREATS INTERNATIONAL & COOPERATION
2026-02-11 13:34 socradar.io 📄
P3 🇸🇪 Sweden

Civilplikt blir alternativ till värnplikt: ”Alla är inte lämpliga”

För första gången på tjugo år kan unga som mönstrat genomföra civilplikt utan vapen i stället för värnplikt. Cirka 180 personer ska skrivas in till civilplikten efter mönstringen. ”Alla behöver göra sin plikt”, säger Kristian Ristic, kompanifanjunkare och utbildningsansvarig vid Ledningsregementet i...

POLICY & REGULATION
2026-02-11 12:27 sverigesradio.se 📖
P1 🌍 Global Protection

Update expiring Windows Secure Boot certificates now

Microsoft's original Secure Boot certificates, issued in 2011, begin expiring in late June 2026, potentially affecting millions of Windows devices worldwide. While your device will continue to boot normally after expiration, it will enter a degraded security state where new boot-level protections ca...

RESEARCH & ANALYSIS STRATEGY & CAPABILITY
2026-02-11 12:12 4sysops.com 📄
P3 🇸🇪 Sweden Threat

Kraftig ökning av cyberattacker i Sverige

Enligt en ny rapport från säkerhetsföretaget Check Point fortsätter antalet cyberattacker att öka i Sverige. Under januari rörde det sig om 2 135 cyberattacker i veckan, vilket är en ökning med 39 procent jämfört med samma period ett år tidigare. Den främsta måltavlan är den offentliga sektorn, däre...

SECURITY & THREATS INTERNATIONAL & COOPERATION hälso- och sjukvård telekom
2026-02-11 12:08 computersweden.se 📄
P2 🌍 Global Threat

North Korean actors blend ClickFix with new macOS backdoors in Crypto campaign

A financially motivated threat actor tracked as UNC1609 is using a ClickFix-style social engineering campaign to deploy multiple macOS malware families against crypto-focused organizations. According to new research from Google Cloud’s Mandiant, the activity recently targeted an employee at a compan...

SECURITY & THREATS RESEARCH & ANALYSIS Google Cloud
2026-02-11 12:06 csoonline.com 📄
P1 🌍 Global Vulnerability

Microsoft Patch Tuesday: 6 exploited zero-days fixed in February 2026

Microsoft has plugged 50+ security holes on February 2026 Patch Tuesday, including six zero-day vulnerabilities exploited by attackers in the wild. The “security feature bypass” zero-days Among the zero-days fixed are three vulnerabilities that allow attackers to bypass a security feature. CVE-2026-...

SECURITY & THREATS STRATEGY & CAPABILITY
2026-02-11 12:06 helpnetsecurity.com 📖
P1 🌍 Global

Prompt Injection Via Road Signs

Interesting research: “ CHAI: Command Hijacking Against Embodied AI .” Abstract: Embodied Artificial Intelligence (AI) promises to handle edge cases in robotic vehicle systems where data is scarce by using common-sense reasoning grounded in perception and action to generalize beyond training distrib...

STRATEGY & CAPABILITY TECHNOLOGY & INNOVATION
2026-02-11 12:03 schneier.com 📄
P2 🌍 Global

Regjeringen vil ikke blokkere Grok

Verken digitaliseringsministeren eller justisministeren går inn for at Norge skal blokkere KI-verktøyet Grok, der du kan manipulerer bilder og filmer.

TECHNOLOGY & INNOVATION Norge
2026-02-11 12:03 kode24.no 📖
P1 🇪🇺 EU

Digital Omnibus: EDPB and EDPS support simplification and competitiveness while raising key concerns

Brussels, 11 February - The European Data Protection Board (EDPB) and the European Data Protection Supervisor (EDPS) have adopted a Joint Opinion on the Digital Omnibus Regulation proposal .* This proposal aims to simplify the EU's digital regulatory framework, reduce administrative burden and enhan...

POLICY & REGULATION INTERNATIONAL & COOPERATION pean europe
2026-02-11 12:00 edpb.europa.eu 📖
P1 🌍 Global

EU clears Google’s $32B Wiz acquisition, intensifying cloud security competition

Google has secured unconditional EU antitrust approval for its $32 billion acquisition of cloud security firm Wiz, clearing a major regulatory hurdle and paving the way for one of the largest cybersecurity acquisitions to date. The decision removes a key uncertainty for enterprise customers and posi...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION Google Cloud
2026-02-11 10:50 csoonline.com 📄
P1 🇸🇪 Sweden

Säsongspremiär: Cyber Chats & Chill utforskar darknet med Nationellt it-brottscentrum, Polismyndigheten

Vad är egentligen darknet, och vad används det till? Det är frågan som står i centrum i säsongspremiären av säsong 5 av Cyber Chats & Chill, som släpps onsdagen den 18 februari. Avsnittet gästas av Björn Eriksson, tf bitr sektionschef vid Nationellt it-brottscentrum (NOA), Polismyndigheten. Inlägget...

POLICY & REGULATION INTERNATIONAL & COOPERATION Polismyndigheten erik
2026-02-11 10:21 aktuellsakerhet.se 📄
P1 🌍 Global

Yubico previews passkey-enabled digital signatures in upcoming YubiKey 5.8 firmware

Yubico’s upcoming YubiKey 5.8 firmware introduces standardized APIs that integrate hardware-backed signatures with passkey authentication. To enable privacy-capable digital signatures using passkeys, expanded enterprise IdP support, and next-generation digital wallet use cases, the firmware adds sup...

OPERATIONS & TECHNICAL YubiKey
2026-02-11 08:54 helpnetsecurity.com 📖
P1 🌍 Global Vulnerability

U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploit...

U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog https:// securityaffairs.com/187855/sec urity/u-s-cisa-adds-microsoft-office-and-microsoft-windows-flaws-to-its-known-exploited-vulnerabilities-catalog.html # securityaffairs # hacking

STRATEGY & CAPABILITY TECHNOLOGY & INNOVATION
2026-02-11 07:38 infosec.exchange 📄
P3 🌍 Global

Tel Aviv-based Backslash Security, which safeguards enterprise software development from vibe coding risks, raised a $19M Series A, taking total funding to $27M (Duncan Riley/SiliconANGLE)

Duncan Riley / SiliconANGLE : Tel Aviv-based Backslash Security, which safeguards enterprise software development from vibe coding risks, raised a $19M Series A, taking total funding to $27M —  Vibe coding security company Backslash Security Inc. revealed today that it has raised $19 million in new ...

STRATEGY & CAPABILITY SECURITY & THREATS
2026-02-11 03:25 techmeme.com 📄
P3 🌍 Global Vulnerability

FortiOS: LDAP authentication bypass in Agentless VPN and FSSO

Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 7.5, CVEs: CVE-2026-22153, CVE-2025-62439, CVE-2025-64157, CVE-2025-55018, CVE-2025-68686, Summary: An Authentication Bypass by Primary Weakness vulnerability [CWE-305] in FortiOS fnbamd may allow an unauthent...

SECURITY & THREATS POLICY & REGULATION
2026-02-11 03:00 ncsc.fi 📄
P1 🌍 Global Vulnerability

FreeRDP release 3.22.0

Classification: Severe, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: None, CVEs: CVE-2026-23948, CVE-2026-24682, CVE-2026-24683, CVE-2026-24676, CVE-2026-24677, CVE-2026-24678, CVE-2026-24684, CVE-2026-24679, CVE-2026-24681, CVE-2026-24675, CVE-2026-24491, CVE-2026-24680, Summary...

SECURITY & THREATS
2026-02-11 03:00 ncsc.fi 📄
P1 🌍 Global Vulnerability

libpng: Heap buffer overflow in `png_set_quantize`

Classification: Severe, Solution: Official Fix, Exploit Maturity: Unproven, CVSSv3.1: 8.3, CVEs: CVE-2026-25646, Summary: An out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more t...

SECURITY & THREATS Play CER
2026-02-11 03:00 ncsc.fi 📄
P1 🌍 Global

Malcolm: A powerful, easily deplorable network traffic analysis tool suite for...

Malcolm: A powerful, easily deplorable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts Check ✅️ it out: https:// github.com/idaholab/Malcolm # cybersecurity # infosec # threathunting # suricata # zeek # pcapanalysis # networktraffica...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS GitHub
2026-02-11 02:36 infosec.exchange 📄
P3 🌍 Global

ICE Taps into School Security Cameras to Aid Trump’s Immigration Crackdown

Police assisted federal immigration agents by repeatedly searching school cameras that record license plate numbers, data show. By Mark Keierleber This story first appeared at The 74, a nonprofit news site covering education. Sign up for free newsletters from The 74 to get more like this in your inb...

STRATEGY & CAPABILITY FIRST CRA
2026-02-11 01:47 pogowasright.org 📄
P3 🌍 Global

Cisco looses Splunk to probe and tame its growing agentic menagerie

Just change the name to C AI sco already, Chuck Cisco is on track to deliver its unified management tool Cloud Control later in 2026, but while its users wait for that moment it’s pumping out plenty more agentic tools to manage their networks – and make sure agents behave.…

OPERATIONS & TECHNICAL TECHNOLOGY & INNOVATION Cisco Splunk
2026-02-11 00:58 theregister.co.uk 📄
P2 🌍 Global

Regeringen deltar vid Techarena 2026

Onsdag den 11 februari deltar statsminister Ulf Kristersson, energi- och näringsminister samt vice statsminister Ebba Busch och EU-minister Jessica Rosencrantz på affärs- och teknikkonferensen Techarena 2026.

POLICY & REGULATION regeringen kristersson
2026-02-11 00:00 g0v.se 📖
P1 🌍 Global

Regeringen deltar vid Munich Security Conference

Den 12–15 februari äger den årliga säkerhetskonferensen Munich Security Conference (MSC) rum i tyska München. Från den svenska regeringen deltar statsminister Ulf Kristersson, utrikesminister Maria Malmer Stenergard, försvarsminister Pål Jonson och minister för civilt försvar Carl-Oskar Bohlin.

POLICY & REGULATION STRATEGY & CAPABILITY regeringen regeringen
2026-02-11 00:00 g0v.se 📖
P1 🌍 Global

Introducing ExecEvasion: Understanding Execution Evasion Beyond Simple Filters

Turning “Access Denied” into “Challenge Accepted” — responsibly. Hi Everyone! If you’ve ever played a CTF, performed a penetration test, or assessed a Web Application Firewall (WAF), you’ve likely hit this wall: You discover a command injection. You craft a clean payload. And then BLOCKED . The filt...

RESEARCH & ANALYSIS SECURITY & THREATS Play CRA
2026-02-10 23:14 osintteam.blog 📄
P1 🌍 Global Threat

Scattered Spider: Why This Cybercriminal Group Still Matters

Identity-Attack Series This article is part of a series focused on real-world identity-based attacks, including phishing, MFA bypass… Continue reading on OSINT Team »

SECURITY & THREATS INTERNATIONAL & COOPERATION Scattered Spider RED
2026-02-10 23:14 osintteam.blog 📄
P1 🌍 Global

How Hackers Target Your Phone and Wi-Fi

Protect Your Digital Life From These Common (and Sneaky) Attacks Continue reading on OSINT Team »

SECURITY & THREATS STRATEGY & CAPABILITY
2026-02-10 23:08 osintteam.blog 📄
P1 🌍 Global

Information Security vs Information Systems Security

In today’s digital world, the terms Information Security and Information Systems Security are often used interchangeably. However, they represent different yet interconnected aspects of protecting data and technology infrastructures. As someone who recently passed the CompTIA Security+ exam, I wante...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION PTS CER
2026-02-10 23:08 osintteam.blog 📄
P1 🌍 Global Threat

Cyber Threat Intelligence: Mastering Proactive Threat Monitoring

As we strive to build a more secure digital world, cybersecurity professionals are constantly developing new methods and technologies to protect our organizations. However, threat actors are just as relentless, continuously refining their techniques and crafting new, evolving threats to bypass our d...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS CRA
2026-02-10 23:08 osintteam.blog 📄
P1 🌍 Global Protection

Unlocking Cybersecurity: 4 Key Security Control Categories

In today’s digital landscape, cyberattacks are becoming more frequent and sophisticated. To effectively protect systems and data, it’s crucial to understand and implement appropriate security controls. These controls can be categorized into four broad areas, each playing a vital role in reducing ris...

STRATEGY & CAPABILITY SECURITY & THREATS Play Scattered Spider
2026-02-10 23:08 osintteam.blog 📄
P1 🌍 Global

Why IAM is Critical in Today’s Digital World?

In today’s digital world, companies hire hundreds, sometimes thousands, of employees, contractors, and third-party vendors. Managing the rights, permissions, and access to resources for all these individuals can quickly become a complex and overwhelming task. If not properly managed, it can lead to ...

POLICY & REGULATION STRATEGY & CAPABILITY RED USA
2026-02-10 23:08 osintteam.blog 📄
P3 🌍 Global Protection

Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-days

Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft Patch Tuesday security updates for February 2026 fix 58 new security flaws across Windows, Office, Azure, Edge, Exchange, Hyper-V, WSL, and other components, rising to 62 CVEs wh...

SECURITY & THREATS POLICY & REGULATION AWS Exchange
2026-02-10 22:31 securityaffairs.com 📄
P1 🌍 Global

Is it normal to pay €10k setup fees for GRC software (NIS 2) in the Netherlands?

Hi everyone, I’m currently working on a research project analyzing the Dutch market for compliance software (GRC), specifically focusing on NIS 2 and NEN 7510. I’m trying to get a clear picture of the costs involved, but I’m getting a bit stuck and was hoping there are some experts here who know the...

POLICY & REGULATION land
2026-02-10 22:26 reddit.com 📄
P1 🌍 Global Vulnerability

Surveillance relies on sensors being present. PH4NTXM removes that assumption at...

Surveillance relies on sensors being present. PH4NTXM removes that assumption at the kernel level. Microphone, camera, and audio output never reach userspace. Applications, browsers, and malware have nothing to enumerate, request, or exploit. When sensors don’t exist to the operating system, surveil...

SECURITY & THREATS
2026-02-10 22:24 infosec.exchange 📄
P1 🌍 Global Protection

Defense doesn’t need to be permanent to be effective. PH4NTXM is designed to blo...

Defense doesn’t need to be permanent to be effective. PH4NTXM is designed to block common intrusion attempts while a session is active — without carrying defensive history forward. Attacks are mitigated in real time. But once the session ends, there’s no accumulated state, no retained memory, no his...

SECURITY & THREATS OPERATIONS & TECHNICAL PTS Linux
2026-02-10 22:21 infosec.exchange 📄
P3 🌍 Global

Reasoning: A smarter way for AI to understand text and images

Engineers at the University of California San Diego have developed a new way to train artificial intelligence systems to solve complex problems more reliably, particularly those that require interpreting both text and images. In widely used tests to evaluate mathematical reasoning, AI models trained...

RESEARCH & ANALYSIS TECHNOLOGY & INNOVATION
2026-02-10 21:05 techxplore.com 📄
P1 🌍 Global

Welcome to PH4NTXM. PH4NTXM is a stateless, session-oriented operating system de...

Welcome to PH4NTXM. PH4NTXM is a stateless, session-oriented operating system designed for Op-Sec-aware workflows and security research. The project emphasizes minimal retained state, deliberate execution, and short-lived environments by design. This account will share selected design notes and obse...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS Linux GitHub
2026-02-10 20:35 infosec.exchange 📄
P3 🌍 Global

Google's Personal Data Removal Tool Now Covers Government IDs

Google on Tuesday expanded its "Results about you" tool to let users request the removal of Search results containing government-issued ID numbers -- including driver's licenses, passports and Social Security numbers -- adding to the tool's existing ability to flag results that surface phone numbers...

STRATEGY & CAPABILITY google
2026-02-10 20:00 slashdot.org 📄
P1 🌍 Global Vulnerability

CISA Adds Six Known Exploited Vulnerabilities to Catalog

CISA Adds Six Known Exploited Vulnerabilities to Catalog bjackson Feb 10, 2026 Release Date February 10, 2026 Description CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-21510 Microsoft Windows Shell Pro...

SECURITY & THREATS STRATEGY & CAPABILITY CISA
2026-02-10 19:25 cisa.gov 📄
P1 🌍 Global Vulnerability

83% of observed Ivanti EPMM exploitation (CVE-2026-1281) traces to one bulletpro...

83% of observed Ivanti EPMM exploitation (CVE-2026-1281) traces to one bulletproof IP that isn't on any published IOC list. The IPs that are? VPN exits with zero Ivanti activity. We broke down who's actually doing this ⬇️ https://www. greynoise.io/blog/active-ivant i-exploitation # Ivanti # ThreatIn...

SECURITY & THREATS RESEARCH & ANALYSIS Ivanti Ivanti
2026-02-10 19:17 infosec.exchange 📄
P3 🌍 Global

Norway defence chief says Russia could invade to protect nuclear assets

Exclusive: Eirik Kristoffersen, who served in Afghanistan, rejects Trump’s claim that Nato troops stayed off frontlines Norway’s army chief has said Oslo cannot exclude the possibility of a future Russian invasion of the country, suggesting Moscow could move on Norway to protect its nuclear assets s...

RESEARCH & ANALYSIS NATO ghanistan
2026-02-10 19:07 theguardian.com 📄
P1 🌍 Global

EU clears Google's $32 bn bid for Wiz cybersecurity company

The EU on Tuesday unconditionally approved Google's $32 billion bid for cloud security platform Wiz after finding it raised no competition concerns in Europe.

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION CER RED
2026-02-10 18:30 techxplore.com 📄
P3 🌍 Global Threat

Top 10 ransomware targets by industry

<p>Manufacturing remained ransomware operators' most-targeted sector heading into 2026, according to analysis by threat researchers at cybersecurity services provider NordStellar. Other top targets by industry include IT firms, professional services providers and construction companies.</p&...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS
2026-02-10 18:15 rss.techtarget.com 📄
P3 🌍 Global Protection

Microsoft Begins the First-Ever Secure Boot Certificate Swap Across Windows Ecosystem

Microsoft has begun automatically replacing the original Secure Boot security certificates on Windows devices through regular monthly updates, a necessary move given that the 15-year-old certificates first issued in 2011 are set to expire between late June and October 2026. Secure Boot, which veri...

STRATEGY & CAPABILITY TECHNOLOGY & INNOVATION FIRST CER
2026-02-10 18:00 slashdot.org 📄
P1 🌍 Global

# Infosec Finance sector alert: UNC1069 is deploying new loaders and backdoors t...

# Infosec Finance sector alert: UNC1069 is deploying new loaders and backdoors to evade detection and maintain persistence. If you’re in financial services, tighten MFA, segmentation, and endpoint visibility now. https:// cybersecuritynews.com/unc1069- hackers-attacking-finance-sector-with-new-tools...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS
2026-02-10 17:14 infosec.exchange 📄
P1 🇸🇪 Sweden

Norska Säpo inleder egen Epstein-utredning

Den norska säkerhetspolisen PST kommer att inleda en egen utredning om eventuella brott i samband med Jeffrey Epsteins kontakter med kronprinsessan Mette-Marit och norska politiker.

POLICY & REGULATION Säkerhetspolisen RED
2026-02-10 17:06 sydsvenskan.se 📄
P1 🌍 Global Protection

Masterclass Privacy: The Role of a Data Protection Officer

Khaitan Legal's Shruti Dvivedi Sodhi on Why DPO and CISO Roles Should Be Separate As data protection moves from theory to boardroom accountability, organizations face a critical question: Who should own privacy oversight? Shruti Dvivedi Sodhi, partner at Khaitan Legal Associates, explains why DPO an...

POLICY & REGULATION CER
2026-02-10 16:56 bankinfosecurity.asia 📄
P1 🌍 Global

The Lack of Information Technology classes in US K-12 Education?

What's up everyone; this is a discussion post/rant. Of what I noticed at least in my personal life with the K-12 education system in the US. Please I'd love to hear everyone thoughts on this. Professionally, I am a Security Engineer. What I do on my day to day; digging into devices to see vulnerabil...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS DIGG
2026-02-10 16:41 reddit.com 📄
P3 🇪🇺 EU

ESAs publish joint Guidelines on ESG stress testing

ESAs publish joint Guidelines on ESG stress testing 08 January 2026 Guidelines and Technical standards Joint Committee The European Supervisory Authorities (EBA, EIOPA and ESMA - the ESAs) published today their Joint Guidelines o...

POLICY & REGULATION bank EU
2026-02-10 16:15 european-union.europa.eu 📄
P3 🌍 Global Incident

Singapore telcos breached in China-linked cyber espionage campaign

Singapore’s four major telecommunications companies were hit by a coordinated cyber espionage campaign last year, the country’s Cyber Security Agency (CSA) has revealed. An advanced persistent threat group known as UNC3886 has probed deep into the networks of M1, SIMBA Telecom, Singtel, and StarHub,...

STRATEGY & CAPABILITY SECURITY & THREATS chin chinese
2026-02-10 15:38 helpnetsecurity.com 📄
P3 🇸🇪 Sweden

Beskedet: Försvaret säger nej till Vattenfalls jätteprojekt

I höstas sökte Vattenfall tillstånd för att bygga en enorm vindkraftspark i Gällivare kommun.  Men Försvarsmakten säger nej. Därför lämnas ärendet nu över till regeringen.

POLICY & REGULATION Försvarsmakten regeringen
2026-02-10 15:13 di.se 📄
P3 🌍 Global

Microsoft dials up the nagging in Windows, calls it security

More prompts when apps and agents roam around a user's system Microsoft is introducing a raft of Windows security features that users and administrators alike might assume are already part of the operating system.…

STRATEGY & CAPABILITY TECHNOLOGY & INNOVATION PTS
2026-02-10 15:05 theregister.co.uk 📄
P1 🌍 Global

Enterprises turn to Java for AI but move away from Oracle

A new survey of more than 2,000 Java professionals worldwide, reveals a dual trend shaping the enterprise landscape, a strategic pivot toward using Java as a foundational language for AI development, and a growing migration away from Oracle Java due to pricing and licensing concerns. The study from ...

TECHNOLOGY & INNOVATION CER Oracle
2026-02-10 15:03 betanews.com 📄
P1 🇸🇪 Sweden

Google kan nu varna dig om fler av dina personuppgifter dyker upp i sökresultaten

För att fira Safer Internet Day har sökmotorn Google idag rullat ut en uppdatering till funktionen Resultat om dig , samt lanserat ett nytt enklare verktyg för att plocka bort ofrivilliga nakenbilder från sökresultaten. Läs även: Google vill att du lägger till Chrome i autostarten Med Resultat om di...

POLICY & REGULATION
2026-02-10 14:59 pcforalla.se 📄
P1 🇸🇪 Sweden

AI-chattbotar sämre än sökmotorer för medicinska råd

En ny studie från Oxford Internet Institute och Nuffield Department of Primary Care Health Sciences vid University of Oxford, genomförd tillsammans med MLCommons och andra institutioner, visar att det finns en tydlig klyfta mellan stora språkmodellers teoretiska medicinska kunskaper och deras prakti...

RESEARCH & ANALYSIS ITU ITU
2026-02-10 14:42 computersweden.se 📄
P3 🌍 Global Protection

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that ab...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS
2026-02-10 14:36 thehackernews.com 📄
P3 🌍 Global Threat

Germany warns of state-linked phishing campaign targeting journalists, government officials

In a joint advisory issued late last week, Germany’s domestic intelligence agency (BfV) and federal cybersecurity office (BSI) said attackers are attempting to gain access to private messaging accounts in order to monitor confidential communications and potentially compromise broader networks.

STRATEGY & CAPABILITY SECURITY & THREATS BSI erman
2026-02-10 14:18 therecord.media 📄
P1 🌍 Global

Flere kommuner bruker Hudd i stedet for Facebook

Den norske plattformen Hudd har passert 180.000. Brukes av kommuner som vil løsrive seg fra Meta – kommuner har sett et behov for å tenke nytt om hva de bygger fellesskapet på.

POLICY & REGULATION kommun
2026-02-10 14:03 kode24.no 📄
P2 🌍 Global Threat

From Ransomware to Residency: Inside the Rise of the Digital Parasite

Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which analyzed over 1.1 million malicious files and map...

SECURITY & THREATS INTERNATIONAL & COOPERATION RED RED
2026-02-10 13:59 thehackernews.com 📄
P3 🇸🇪 Sweden

När kärlek blir en fälla – så fungerar dagens romansbedrägerier

Under de senaste åren har romansbedrägerier blivit både vanligare och mer sofistikerade. I Europa uppger mellan 1–3 procent av befolkningen att de har blivit utsatta, och i Sverige förloras varje år över 600 miljoner kronor i omkring 1 300 dokumenterade fall – siffror som bara fortsätter att öka. En...

INTERNATIONAL & COOPERATION LEK RED
2026-02-10 13:51 m3.se 📄
P1 🌍 Global

Reminder: Update Your Apple Home App Immediately to Avoid Issues

In 2022, Apple introduced a new Apple Home architecture that is "more reliable and efficient," and the deadline to upgrade and avoid issues is today. In an email last week, Apple gave customers a final reminder to upgrade their Home app by February 10, 2026. Apple says users who do not upgrade may e...

TECHNOLOGY & INNOVATION
2026-02-10 13:25 macrumors.com 📄
P3 🌍 Global

Cisco Bets Big On A Unified Platform For The Agentic AI Era

Cisco's Cisco Live EMEA announcements bet big on the network as the foundation for agentic AI, with new silicon, expanded security, and a unified platform strategy.

STRATEGY & CAPABILITY OPERATIONS & TECHNICAL Cisco Cisco
2026-02-10 13:13 forbes.com 📄
P3 🌍 Global Risk

Bretton AI, formerly Greenlite, which uses GenAI to investigate suspicious transactions and verify internal risk policy compliance, raised a $75M Series B (Leo Schwartz/Fortune)

Leo Schwartz / Fortune : Bretton AI, formerly Greenlite, which uses GenAI to investigate suspicious transactions and verify internal risk policy compliance, raised a $75M Series B —  Early in his career, Will Lawrence worked on the product team at Facebook focused on anti-money laundering.

POLICY & REGULATION NSA
2026-02-10 13:00 techmeme.com 📄
P1 🌍 Global

DuckDuckGo Adds AI Voice Chat to Duck.ai With Privacy Protections

DuckDuckGo has announced new voice chat capabilities for Duck.ai , the private AI chatbot platform it launched last March. The new feature lets users have real-time voice conversations with large language models (LLMs) through an encrypted relay connection. OpenAI provides the LLMs that power voice ...

TECHNOLOGY & INNOVATION OpenAI
2026-02-10 12:45 macrumors.com 📄
P2 🌍 Global Incident

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps

The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders. In December 2025, a malicious cyber actor(s) targeted and compromised operational ...

INTERNATIONAL & COOPERATION TECHNOLOGY & INNOVATION CER
2026-02-10 12:00 us-cert.cisa.gov 📄
P2 🌍 Global Threat

Unpatched SolarWinds WHD instances under active attack

Internet‑exposed and vulnerable SolarWinds Web Help Desk (WHD) instances are under attack by threat actors looking to gain an initial foothold into target organizations’ networks, Microsoft and Huntress researchers have warned. Once inside, the attackers are deploying legitimate remote access and di...

RESEARCH & ANALYSIS STRATEGY & CAPABILITY
2026-02-10 11:56 helpnetsecurity.com 📄
P3 🌍 Global Threat

Senegal shuts National ID office after ransomware attack

Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and biometric services. Senegal confirmed a cyberattack on the Directorate of File Automation, the government office that manages national ID cards, passports, and biometric data. After ransomware claim...

SECURITY & THREATS INTERNATIONAL & COOPERATION
2026-02-10 11:48 securityaffairs.com 📄
P1 🌍 Global

Single prompt breaks AI safety in 15 major language models

A single benign-sounding prompt can systematically strip safety guardrails from major language and image models, raising fresh questions about the durability of AI alignment when models are customized for enterprise use, according to Microsoft research. The technique, dubbed GRP-Obliteration, weapon...

TECHNOLOGY & INNOVATION
2026-02-10 11:39 csoonline.com 📄
P1 🇸🇪 Sweden Threat

Gängman gripen efter sabotage – hade ryska riksvapnet på sig

30-åringen häktades förra helgen av Västmanlands tingsrätt. Under förhandlingen erkände mannen brottet sabotage och gick med på att häktas. – Han erkänner att han varit på plats, det är vad jag kan säga, säger kammaråklagare Magnus Möller som har ärendet på sitt bord. Greps på flykt Händelsen skedde...

POLICY & REGULATION vattenverk västmanlands tingsrätt
2026-02-10 11:27 tv4.se 📄
P1 🌍 Global

Forskare: Har inte varit så mansdominerat sedan 90-talet

Andelen kvinnor på de ledande posterna i riksdagens utskott och EU-nämnden är den lägsta sedan början av 1990-talet, enligt Cecilia Josefsson, statsvetare vid Uppsala universitet. Ekots genomgång visar att endast 6 av 32 presidieposter innehas av kvinnor. ”Jag skulle sätta ett ganska lågt betyg. Jag...

POLICY & REGULATION RESEARCH & ANALYSIS EU EU
2026-02-10 11:17 sverigesradio.se 📄
P3 🌍 Global Incident

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, when a mail server that was not updated to the latest version was compromised, the company's Chief Com...

SECURITY & THREATS CER der
2026-02-10 10:24 thehackernews.com 📄
P3 🌍 Global

Over half of government organizations still rely on manual data transfer

New research reveals that 84 percent of government IT security leaders agree that sharing sensitive data across networks heightens their cyber risk, and 53 percent still rely on manual data transfer processes. The study from Everfox surveyed 500 security leaders and IT decision makers working in gov...

POLICY & REGULATION SECURITY & THREATS
2026-02-10 10:16 betanews.com 📄
P3 🌍 Global Vulnerability

Dutch agencies hit by Ivanti EPMM exploit exposing employee contact data

Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the data protection authority and courts. Dutch authorities said cyberattacks hit the Dutch Data Protection Authority and the Council for the Judiciary after hackers exploited newly disclosed flaws in...

SECURITY & THREATS INTERNATIONAL & COOPERATION AWS Ivanti
2026-02-10 10:11 securityaffairs.com 📄
P3 🌍 Global

SIPRI to co-host military AI course

SIPRI is co-hosting ‘Military AI: International Law and Governance’, a two-day capacity-building course organized in collaboration with the Asser Institute.

POLICY & REGULATION INTERNATIONAL & COOPERATION ITU
2026-02-10 10:05 sipri.org 📄
P3 🌍 Global

📢 # HorizonEurope call HORIZON-CL6-2026-03-GOVERNANCE-06 invites consortia to es...

📢 # HorizonEurope call HORIZON-CL6-2026-03-GOVERNANCE-06 invites consortia to establish a services & business incubator for geospatial open-source developments, supporting long-term viability, innovation, and market uptake across Europe. We especially encourage organisations with experience in open-...

POLICY & REGULATION INTERNATIONAL & COOPERATION EU Europa
2026-02-10 10:03 ec.social-network.europa.eu 📄
P2 🌍 Global

Norsk forsvar opruster markant på AI

Nyt data- og AI-center skal bringe kunstig intelligens fra forskning til felten, fra prototyper til færdigdriftede løsninger.

POLICY & REGULATION SECURITY & THREATS
2026-02-10 09:05 version2.dk 📄
P3 🇸🇪 Sweden

Går ej att hämta ut receptbelagd medicin

Vi är medvetna att det är störningar i recepttjänsten. Felsökning pågår och vi beklagar verkligen, säger Ulrika Borgelin Stoltz, kommunikatör vid E-hälsomyndigheten till TT. Läkare kan förskriva som vanligt, men receptet går inte i väg. Störningarna gör att patienter inte kan hämta ut recepten. Pro...

POLICY & REGULATION OPERATIONS & TECHNICAL SKR E-hälsomyndigheten
2026-02-10 09:05 tv4.se 📄
P3 🇪🇺 EU Protection

⚖️ Judgment in Case C-97/23 P WhatsApp Ireland v European Data Protection Board:...

⚖️ Judgment in Case C-97/23 P WhatsApp Ireland v European Data Protection Board: Can a company challenge a binding decision of the European Data Protection Board before the EU courts? 🎥 💬 Vice-President von Danwitz explains with subtitles available in all EU languages 👉 https:// curia.europa.eu/site...

INTERNATIONAL & COOPERATION POLICY & REGULATION SAP EU
2026-02-10 08:55 curia.social-network.europa.eu 📄
P1 🌍 Global Protection

DON’T FREEZE ME OUT, BRO! ARC Labs Technical Analysis of EDR-Freeze

EDR-Freeze is a recently published proof-of-concept that automates a flow to cause a dumper process to suspend an EDR/antivirus process (via minidump behavior) and then keep it suspended — effectively disabling the agent’s runtime hooks while the attacker performs follow-on actions. Targets protecte...

OPERATIONS & TECHNICAL SECURITY & THREATS
2026-02-10 08:35 andreadraghetti.it 📄
P1 🌍 Global

Google uses Safer Internet Day to remind people about its protection tools

Just like Microsoft, Google is using Safer Internet Day for a dash of self-promotion. The company has used a blog post to remind people about the steps it has taken and the tools that it has produced to help keep younger people safe online, and to promote healthier use of technology. Google uses a m...

TECHNOLOGY & INNOVATION ogle
2026-02-10 08:32 betanews.com 📄
P2 🌍 Global Threat

How AI is reshaping attack path analysis

Cybersecurity teams are overwhelmed with data and short on clarity, while adversaries use AI to move faster and operate at unprecedented scale. Most organizations collect enormous volumes of findings: vulnerabilities, misconfigurations, penetration test results, detection gaps, threat intelligence, ...

STRATEGY & CAPABILITY SECURITY & THREATS Teams Cisco
2026-02-10 08:27 helpnetsecurity.com 📄
P3 🌍 Global Risk

Sverige tappar mark i globalt korruptionsindex – växande risk för samhällssäkerheten

Sverige ligger kvar på sin lägsta nivå någonsin i Transparency Internationals årliga Corruption Perceptions Index (CPI), som publicerades den 10 februari. Med 80 poäng har Sverige tappat nio poäng sedan 2015, vilket är det största fallet bland de nordiska länderna och det största tappet inom EU blan...

POLICY & REGULATION CER RED
2026-02-10 08:17 aktuellsakerhet.se 📄
P1 🌍 Global

Full kontroll över varje nyckel

Nycklar, värdeföremål och personliga tillhörigheter cirkulerar i organisationer där minsta miss kan få stora konsekvenser. Enligt Nicklaz Eneroth på Creone skapar bristande spårbarhet risker, administration och otydligt ansvar. – Genom att samla allt i ett enda system som ger kontroll, trygghet och ...

POLICY & REGULATION TECHNOLOGY & INNOVATION
2026-02-10 08:00 di.se 📄
P1 🇸🇪 Sweden

Fotonik – en möjliggörare för försvarsindustrin

Moderna system inom flyg- och försvarsteknik är i hög grad beroende av fotonik – vetenskapen och teknologin för att generera, styra och detektera fotoner. Fotoniken möjliggör utvecklingen av avancerade, tillförlitliga system där hög precision och robusthet är avgörande.

POLICY & REGULATION CER CER
2026-02-10 08:00 di.se 📄
P3 🌍 Global

ICE List: the small European website exposing US immigration agents

Netherlands-based site uses public information and tips to reveal identities of agents involved in crackdowns across US It started as a cheeky response on social media to the US secretary for homeland security. Months later, however, a Europe-based project to unmask US immigration and custom enforce...

STRATEGY & CAPABILITY BSI CRA
2026-02-10 07:23 theguardian.com 📄
P1 🌍 Global

Nettgigantene i retten i USA

I to rettssaker i USA må nettgiganter svare på anklager om at de skaper avhengighet av sosiale medier og villeder om sikkerhet og risiko for overgrep mot barn.

POLICY & REGULATION USA
2026-02-10 07:00 digi.no 📄
P1 🇸🇪 Sweden

Minskad hushållskonsumtion i december 2025

Hushållens konsumtion minskade med 3,7 procent i december 2025 jämfört med november 2025, mätt i fasta priser, kalenderkorrigerade och säsongrensade tal. Jämfört med december 2024 ökade hushållskonsumtionen med 0,5 procent, mätt i fasta priser och kalenderkorrigerade tal.

POLICY & REGULATION NSA
2026-02-10 07:00 scb.se 📄
P1 🇸🇪 Sweden

Industrins orderingång minskade i december

Industrins totala orderingång minskade med 7,9 procent i december 2025 jämfört med november, i säsongrensade tal. Jämfört med december föregående år ökade orderingången med 6,8 procent i kalenderkorrigerade tal.

POLICY & REGULATION NSA NSA
2026-02-10 07:00 scb.se 📄
P3 🇸🇪 Sweden Risk

Varning: Falsk säkerhetsapp till Android sprider skadlig kod

Säkerhetsforskare på Bitdefender varnar för en ny avancerad skadlig kod till Android som sprids under namnet “TrustBastion”. Appen utger sig för att vara ett säkerhetsverktyg och visar falska varningar om att mobilen är infekterad för att lura användaren att installera den. I själva verket fungerar ...

POLICY & REGULATION RESEARCH & ANALYSIS CER CER
2026-02-10 07:00 m3.se 📄
P3 🌍 Global Vulnerability

Norway Says Salt Typhoon Hackers Hit Vulnerable Systems

Security Service Says China-Linked Actor Compromised Vulnerable Network Devices Norway's security service confirmed it was targeted by the China-linked Salt Typhoon campaign, marking one of Europe’s clearest public acknowledgements that the cyberespionage operation extended beyond U.S. telecom and f...

POLICY & REGULATION STRATEGY & CAPABILITY Salt Typhoon EU
2026-02-10 05:49 bankinfosecurity.com 📄
P3 🇸🇪 Sweden

Ny bedömning av terrorhotet: Sprids på sociala medier och i spel

I sin bedömning för 2026 skriver NCT att det främsta hotet mot Sverige fortsatt utgörs av ensamutförande våldsbejakande islamister och våldsbejakande högerextremister. Sprids bland unga på sociala medier Under förra året avvärjdes ett attentat mot en kulturfestival i Stockholm med islamistiskt moti...

POLICY & REGULATION STRATEGY & CAPABILITY SKR SKR
2026-02-10 05:43 tv4.se 📖
P3 🌍 Global Vulnerability

Norway Says Salt Typhoon Hackers Hit Vulnerable Systems

Security Service Says China-Linked Actor Compromised Vulnerable Network Devices Norway's security service confirmed it was targeted by the China-linked Salt Typhoon campaign, marking one of Europe’s clearest public acknowledgements that the cyberespionage operation extended beyond U.S. telecom and f...

POLICY & REGULATION STRATEGY & CAPABILITY Salt Typhoon EU
2026-02-10 05:39 healthcareinfosecurity.com 📄
P3 🌍 Global Vulnerability

Norway Says Salt Typhoon Hackers Hit Vulnerable Systems

Security Service Says China-Linked Actor Compromised Vulnerable Network Devices Norway's security service confirmed it was targeted by the China-linked Salt Typhoon campaign, marking one of Europe’s clearest public acknowledgements that the cyberespionage operation extended beyond U.S. telecom and f...

POLICY & REGULATION STRATEGY & CAPABILITY Salt Typhoon EU
2026-02-10 05:36 databreachtoday.eu 📄
P3 🌍 Global Vulnerability

Norway Says Salt Typhoon Hackers Hit Vulnerable Systems

Security Service Says China-Linked Actor Compromised Vulnerable Network Devices Norway's security service confirmed it was targeted by the China-linked Salt Typhoon campaign, marking one of Europe’s clearest public acknowledgements that the cyberespionage operation extended beyond U.S. telecom and f...

POLICY & REGULATION STRATEGY & CAPABILITY Salt Typhoon EU
2026-02-10 05:00 inforisktoday.com 📄
P1 🌍 Global

AI Is Transforming the Chief Data Officer Role

AI Elevates CDO Job From Gatekeeper to Data-Driven Change Agent The chief data officer is being pushed out of the shadows and into the C-suite spotlight with the rise of AI. While the role emerged as one rooted in compliance and risk management, it has evolved to be a business driver, holding the ke...

POLICY & REGULATION STRATEGY & CAPABILITY CER RED
2026-02-10 05:00 bankinfosecurity.asia 📄
P3 🌍 Global Vulnerability

Norway Says Salt Typhoon Hackers Hit Vulnerable Systems

Security Service Says China-Linked Actor Compromised Vulnerable Network Devices Norway's security service confirmed it was targeted by the China-linked Salt Typhoon campaign, marking one of Europe’s clearest public acknowledgements that the cyberespionage operation extended beyond U.S. telecom and f...

POLICY & REGULATION STRATEGY & CAPABILITY Salt Typhoon EU
2026-02-10 05:00 bankinfosecurity.asia 📄
P3 🌍 Global Incident

Coupang Obstructed Korean Probe Into Data Breach, Ministry Says

Coupang staff obstructed a Korean government probe into a massive breach of customer data by deleting sensitive information, the ministry carrying out the investigation said, adding the country’s largest e-commerce firm defied an order to preserve access logs and other data.

SECURITY & THREATS
2026-02-10 05:00 bloomberg.com 📄
P1 🌍 Global

”Utan bredd ingen spets – om folkbildningens betydelse”

Folkbildning Ett civiliserat samhälle som vill hålla kulturen levande ser till att det finns vägar som gör att så många som möjligt kan utveckla sin förmåga och berika livet för oss alla. Det samhället avvecklas nu till förmån för ett där enbart några få ska få chansen att vidareutvecklas.

POLICY & REGULATION RED EU
2026-02-10 05:00 barometern.se 📄
P1 🌍 Global

BadSNN: Backdoor Attacks on Spiking Neural Networks via Adversarial Spiking Neuron

arXiv:2602.07200v1 Announce Type: new Abstract: Spiking Neural Networks (SNNs) are energy-efficient counterparts of Deep Neural Networks (DNNs) with high biological plausibility, as information is transmitted through temporal spiking patterns. The core element of an SNN is the spiking neuron, which...

SECURITY & THREATS EU
2026-02-10 05:00 arxiv.org 📄
P3 🇪🇺 EU

Rymden – Europas nya säkerhetsfråga: ”Vi är farligt beroende av andra”

Det militära intresset för rymden har exploderat, men Sverige och Europa halkar efter och är fortfarande alltför beroende av andra länders teknik.  ”Att vi behöver ha egen kapacitet är fortfarande lite yrvaket”, varnar Charlotta Sund, vd för SSC Space, som nu rustar för att snart kunna skjuta upp sa...

INTERNATIONAL & COOPERATION Sverige EU
2026-02-10 04:00 di.se 📄
P1 🌍 Global

Försvarsjättarnas mikrofabrik ska skriva ut reservdelar vid fronten

Intresset för snabba 3D-utskrifter av reservdelar har vuxit snabbt i världens försvarsindustrier. Nu har försvarsjättarna BAE Systems Hägglunds och Saab, tillsammans med Försvarets materielverk, utvecklat en ”mikrofabrik”, som ska låta kunden skriva ut godkända reservdelar direkt vid fronten.

POLICY & REGULATION INTERNATIONAL & COOPERATION SKR SKR
2026-02-10 04:00 di.se 📄
P3 🇸🇪 Sweden

Militärforskaren: Snart fattar AI beslut åt militären

Ska AI få fatta beslut under militära operationer? Frågan är kontroversiell, men enligt försvarsforskaren Peter Bovet Emanuel står det klart att det är så det kommer bli. Nu har han varit med och utvecklat en AI-modell för planering av militära operationer som bland annat väckt amerikanska försvarsm...

POLICY & REGULATION RESEARCH & ANALYSIS Försvarsmakten pet
2026-02-10 04:00 di.se 📄
P3 🇸🇪 Sweden

Vem blir den första cio:n att få sparken för kaos orsakat av AI-agenter?

Otillräcklig kontroll och styrning av AI-agenter kommer att leda till ett stort antal stämningar, böter och avskedanden av cio:er under de kommande fyra åren, förutspår it-analysföretaget IDC. Upp till 20 procent av de 1 000 största företagen kommer att drabbas av något av dessa tre scenarier fram t...

POLICY & REGULATION
2026-02-10 03:30 computersweden.se 📄
P2 🌍 Global Threat

Largest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore’s Telecommunications Sector

On 18 July 2025, Coordinating Minister for National Security Mr K Shanmugam shared that Advanced Persistent Threat (APT) actor UNC3886 had been detected attacking our critical infrastructure. No further details were shared then, to preserve operational security. Over the past months, our investigati...

POLICY & REGULATION STRATEGY & CAPABILITY RED hanmu
2026-02-10 03:00 ncsc.fi 📄
P2 🌍 Global Risk

What Anthropic’s Latest Model Reveals About the Future of Cybersecurity

AI can find vulnerabilities with unprecedented speed, but discovery alone doesn’t reduce cyber risk. We need exposure prioritization, contextual risk analysis, and AI-driven remediation to transform findings into security outcomes. Key takeaways AI is dramatically accelerating vulnerability discover...

STRATEGY & CAPABILITY SECURITY & THREATS RED CER
2026-02-09 23:10 tenable.com 📄
P1 🌍 Global Incident

UK Tightens Security After Review Reveals Scale of Budget Breach

The UK Treasury will tighten up security around future fiscal events to prevent a repeat of the unprecedented early release of market-sensitive documents at the November budget and to stop leaks by government officials.

STRATEGY & CAPABILITY SECURITY & THREATS
2026-02-09 22:58 bloomberg.com 📄
P3 🌍 Global Threat

Chinese cyberspies breach Singapore's four largest telcos

The Chinese threat actor tracked as UNC3886 breached Singapore's four largest telecommunication service providers, Singtel, StarHub, M1, and Simba, at least once last year. [...]

RESEARCH & ANALYSIS INTERNATIONAL & COOPERATION ese chinese
2026-02-09 22:47 bleepingcomputer.com 📄
P3 🇪🇺 EU

Giorgia Meloni – Europas nästa ”drottning”?

Efter årtionden med darrig ekonomi och svaga regeringar kliver Italien fram som en allt viktigare politisk motor i EU. Premiärminister Giorgia Meloni kan landa som nästa EU-topp i Bryssel.

POLICY & REGULATION INTERNATIONAL & COOPERATION EU Europa
2026-02-09 21:15 sydsvenskan.se 📄
P2 🌍 Global Threat

#318 – Övervakningens resa – Från signaturer till beteenden

I detta avsnitt utforskar vi hur cybersäkerhetsövervakning har utvecklats från enkla regelbaserade system till avancerade AI-drivna lösningar, och diskuterar den pågående kapprustningen mellan försvarare och angripare. Vi undersöker viktiga teknologiska trender, organisatoriska tillvägagångssätt och...

POLICY & REGULATION INTERNATIONAL & COOPERATION CER
2026-02-09 20:36 itsakerhetspodden.se 📄
P2 🌍 Global Threat

GRITREP: 0APT and the Victims Who Weren’t

2025 shattered many cyber attack and threat records. Get the details in the 2026 GRIT Ransomware and Cyber Threat Report.

RESEARCH & ANALYSIS SECURITY & THREATS RED
2026-02-09 18:05 guidepointsecurity.com 📄
P3 🌍 Global

Microsoft develops scanner to detect backdoors in LLMs

Microsoft developers have introduced a scanner capable of detecting backdoors in open‑weight language models. The tool relies on three indicators that reveal the presence of hidden mechanisms in a model. As representatives of the AI Security team explain, the signatures are based on how trigger inpu...

STRATEGY & CAPABILITY TECHNOLOGY & INNOVATION
2026-02-09 18:00 hackmag.com 📄
P2 🌍 Global

Comment on LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days by Rontea

It’s important to remember that intelligence—whether human or artificial—is ultimately a tool. Systems like Claude Opus 4.6 show that machine intelligence can surface vulnerabilities at unprecedented speed and scale. But deploying AI in cybersecurity doesn’t eliminate the need for human intelligence...

STRATEGY & CAPABILITY SECURITY & THREATS
2026-02-09 17:46 schneier.com 📄
P3 🌍 Global Threat

Microsoft Warns of Active SolarWinds Web Help Desk Exploitation

Microsoft's Defender Security Research Team has observed threat actors actively exploiting internet-exposed SolarWinds Web Help Desk instances in multi-stage intrusions that led to lateral movement toward high-value assets within targeted organizations.

RESEARCH & ANALYSIS STRATEGY & CAPABILITY
2026-02-09 17:37 redmondmag.com 📄
P1 🌍 Global

How much does chatbot bias influence users? A lot, it turns out

Customers are 32% more likely to buy a product after reading a review summary generated by a chatbot than after reading the original review written by a human. That's because large language models introduce bias, in this case a positive framing, in summaries. That, in turn, affects users' behavior.

POLICY & REGULATION TECHNOLOGY & INNOVATION
2026-02-09 17:00 techxplore.com 📄
P2 🌍 Global

When AI goes haywire: The case of the skyscraper and the slide trombone

Artificial Intelligence (AI) is now part of our everyday life. It is perceived as "intelligence" and yet relies fundamentally on statistics. Its results are based on previously learned patterns in data. As soon as we move away from the subject matter it has learned, we're faced with the fact that th...

TECHNOLOGY & INNOVATION SECURITY & THREATS CRA
2026-02-09 16:58 techxplore.com 📄
P2 🌍 Global Vulnerability

Vulnerability Summary for the Week of February 2, 2026

Vulnerability Summary for the Week of February 2, 2026 rgeraldo Feb 09, 2026 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source Info Patch Info Insaat--Fikir Odalari AdminPando A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminP...

SECURITY & THREATS RESEARCH & ANALYSIS NSA
2026-02-09 15:19 cisa.gov 📄
P1 🌍 Global

Small modular reactors gain competitive edge with new digital twin

Advanced nuclear is within reach—and a new digital twin reveals how smarter plant operations can enhance the economic viability and safety of small modular reactors, or SMRs. In collaboration with the University of Tennessee and GE Vernova Hitachi, researchers at Oak Ridge National Laboratory recent...

RESEARCH & ANALYSIS TECHNOLOGY & INNOVATION
2026-02-09 14:38 techxplore.com 📄
P3 🌍 Global Protection

German agencies warn of phishing targeting Signal users — trusted secure messeng...

German agencies warn of phishing targeting Signal users — trusted secure messengers are now prime bait. Encryption doesn’t stop social engineering. 📱🎣 # PhishingAlert # SecureMessaging https:// thehackernews.com/2026/02/germ an-agencies-warn-of-signal-phishing.html

STRATEGY & CAPABILITY SECURITY & THREATS erman
2026-02-09 14:05 cyberplace.social 📄
P3 🌍 Global Incident

European Commission hit by cyberattackers targeting mobile management platform

The European Commission’s mobile device management platform was hacked but the incident was swiftly contained and no compromise of mobile devices was detected, EU’s executive branch announced on Friday. The intrusion was detected on January 30, 2026, by CERT-EU, the cybersecurity team protecting all...

STRATEGY & CAPABILITY INTERNATIONAL & COOPERATION CERT-EU ITU
2026-02-09 14:02 helpnetsecurity.com 📄
P2 🌍 Global Incident

European Commission probes cyberattack on mobile device management system

The European Commission is investigating a cyberattack after detecting signs that its mobile device management system was compromised. The European Commission is investigating a cyberattack on its mobile device management platform after detecting intrusion traces. Attackers may have accessed some st...

SECURITY & THREATS INTERNATIONAL & COOPERATION EU pean
2026-02-09 14:00 securityaffairs.com 📄
P1 🇸🇪 Sweden

Utsatt för kinesisk hockeybluff: ”Jäkligt sofistikerat”

Under tre månader skulle 56 studenter från Kina, som sponsrades av ett kinesiskt företag, träna ishockey vid det nystartade utbildningscentret Nordic Hockey Center i Stenungssund. Men några kinesiska studenter dök aldrig upp – trots att idrottsverksamheten lagt ut stora summor pengar för deras ankom...

POLICY & REGULATION TECHNOLOGY & INNOVATION Kina nordic hockey center
2026-02-09 13:26 tv4.se 📖
P3 🌍 Global Incident

EU-kommissionens mobila it-infrastruktur utsatt för cyberangrepp

Europeiska kommissionen bekräftar att dess centrala system för hantering av mobila enheter har utsatts för ett it-angrepp. Intrånget upptäcktes den 30 januari och kan ha lett till att personuppgifter – främst namn och mobilnummer – tillhörande vissa anställda exponerades. Inlägget EU-kommissionens m...

POLICY & REGULATION INTERNATIONAL & COOPERATION Europeiska kommissionen EU-kommissionen
2026-02-09 13:09 aktuellsakerhet.se 📄
P2 🌍 Global Threat

OpenClaw integrates VirusTotal malware scanning as security firms flag enterprise risks

OpenClaw, the viral open-source AI agent that security firms warn is “insecure by default,” has integrated VirusTotal’s malware scanning into its ClawHub skills marketplace following weeks in which security researchers documented malicious extensions and widespread unauthorized deployments in enterp...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS claw pet
2026-02-09 12:23 csoonline.com 📄
P1 🇸🇪 Sweden

Myndighetsregistret har bytt namn till SRO-registret

Registret över myndigheterna i den statliga redovisningsorganisationen har bytt namn från Myndighetsregistret till SRO-registret. Efter sammanslagningen av det tidigare Statskontoret och Ekonomistyrningsverket vid årsskiftet, ansvarar Statskontoret för både SRO-registret och en myndighetsförteckning...

POLICY & REGULATION RED styrningsverket
2026-02-09 11:55 statskontoret.se 📖
P2 🌍 Global Threat

EU-kommissionen utsatt för cyberattack

EU-kommissionen låter meddela att hackare kan ha fått tillgång till telefonnummer till vissa anställda, detta efter en cyberattack mot kommissionens system för mobilhantering som genomfördes i slutet av januari. Lyckligtvis upptäcktes attacken relativt fort, så det ska inte finnas någon risk för att...

POLICY & REGULATION SECURITY & THREATS ITU EU-kommissionen
2026-02-09 11:23 computersweden.se 📄
P3 🌍 Global Threat

Italy and Germany Under DDoS Assault: Weekly DDoS Threat Intelligence Analysis

Italy and Germany Under DDoS Assault: Weekly DDoS Threat Intelligence Analysis Analysis Period: February 2–8, 2026 Between February 2 and 8, 2026, SOCRadar identified an extensive coordinated DDoS campaign conducted by the pro-Russian threat actor NoName057(16) using their DDoSia attack tool. The ca...

STRATEGY & CAPABILITY SECURITY & THREATS CRA CRA
2026-02-09 11:18 socradar.io 📄
P3 🌍 Global Protection

Russian hackers weaponized a Microsoft Office bug within days — patch windows ar...

Russian hackers weaponized a Microsoft Office bug within days — patch windows are collapsing while attacker speed accelerates. Defense now hinges on hours, not weeks. ⏱️⚠️ # ZeroDay # ThreatIntelligence https://www. darkreading.com/cyberattacks-d ata-breaches/russian-hackers-weaponize-office-bug-wit...

SECURITY & THREATS RESEARCH & ANALYSIS ussian
2026-02-09 11:05 cyberplace.social 📄
P1 🌍 Global

International Cooperation

International Cooperation ikampoio Mon, 02/09/2026 - 11:34 In an increasingly interconnected and globalised digital landscape, cybersecurity challenges are becoming more complex and creating more cross-border dependencies. Acting within its mandate, ENISA looks for ways to strengthen the EU cybersec...

INTERNATIONAL & COOPERATION STRATEGY & CAPABILITY ENISA Interpol
2026-02-09 10:34 enisa.europa.eu 📄
P3 🇸🇪 Sweden

MISP-övningar 2026

Behöver din organisation stärka sin förmåga att hantera cyberhot och arbeta effektivt med informationsdelning?

INTERNATIONAL & COOPERATION STRATEGY & CAPABILITY
2026-02-09 09:30 cert.se 📄
P1 🌍 Global

Cyberattacks are hitting Poland’s energy and industrial sectors — critical syste...

Cyberattacks are hitting Poland’s energy and industrial sectors — critical systems are becoming frontline targets. OT resilience is now a matter of national security. ⚡🏭 # EnergySecurity # IndustrialResilience https://www. helpnetsecurity.com/2026/02/06 /poland-cyberattacks-energy-sector-industrial-...

POLICY & REGULATION SECURITY & THREATS
2026-02-09 09:05 cyberplace.social 📄
P1 🌍 Global

Samsung Stock Rises After Report on Mass Production of AI Chips

Samsung Electronics Co.’s shares climbed as much as 6.4% after a report that the company will soon begin mass production of HBM4 memory chips, used as part of the buildout for artificial intelligence infrastructure.

POLICY & REGULATION TECHNOLOGY & INNOVATION ung
2026-02-09 00:29 bloomberg.com 📄
P3 🌍 Global

Statsministern bjöd in till partiledarmöte om valpåverkan

Fredagen den 6 februari samlade statsminister Ulf Kristersson partiledarna för riksdagens partier till en lägesuppdatering om regeringens och svenska myndigheters arbete för att skydda de allmänna valen 2026 mot otillbörlig påverkan. Från regeringen deltog också utrikesminister Maria Malmer Stenerga...

POLICY & REGULATION regeringen regeringen
2026-02-09 00:00 g0v.se 📄
P3 🌍 Global

Genomförande av ändringar i EU:s krishanteringsdirektiv och EU:s insättningsgarantidirektiv, Dir. 2026:11

Inom Europeiska unionen (EU) pågår förhandlingar om ändringar i EU:s krishanteringsregelverk för banker (EU:s krishanteringsdirektiv och EU:s insättningsgarantidirektiv). Förhandlingarna förväntas vara klara under våren 2026. En särskild utredare ska analysera och föreslå vilka författningsändringar...

POLICY & REGULATION RED RED
2026-02-09 00:00 g0v.se 📄
P3 🌍 Global

Telcos aren't saying how they fought back against China's Salt Typhoon attacks

PLUS: OpenClaw teams with VirusTotal; Crypto kidnappings in France; Critical vulns at SmarterMail; And more Infosec In Brief So-hot-right-now AI assistant OpenClaw, which is very much not secure right now , has teamed up with security scanning service VirusTotal.…

POLICY & REGULATION STRATEGY & CAPABILITY Salt Typhoon Teams
2026-02-08 22:25 theregister.co.uk 📄
P1 🌍 Global

New configuration detected for DDosia. Hosts: * www.kronplatz.com * www.stradean...

New configuration detected for DDosia. Hosts: * www.kronplatz.com * www.stradeanas.it * www.comune.parma.it * www.consiglio.vda.it * www.dosb.de * www.skirama.it * www.ristorantetivolicortina.it * www.valgardena.it * www.regione.emilia-romagna.it * www.herabit.com * www.cortinaexpress.it * www.bormi...

RESEARCH & ANALYSIS SECURITY & THREATS region EU
2026-02-08 21:30 social.circl.lu 📄
P3 🌍 Global

Top Korean tech firms ban OpenClaw over security breach fears

Lee Gyu-lee reports: Major Korean tech companies, including Kakao, Naver and Karrot Market, are moving to restrict the use of the popular artificial intelligence (AI) agent OpenClaw within corporate networks due to the rising concerns about security and data privacy. The move reflects mounting globa...

STRATEGY & CAPABILITY TECHNOLOGY & INNOVATION CER CER
2026-02-08 21:06 pogowasright.org 📄
P1 🌍 Global

New configuration detected for DDosia. Hosts: * www.olympia.at * www.skirama.it...

New configuration detected for DDosia. Hosts: * www.olympia.at * www.skirama.it * www.kronplatz.com * www.comune.giugliano.na.it * www.olympiakomitea.fi * www.regione.emilia-romagna.it * www.ristorantetivolicortina.it * www.stradeanas.it * www.comune.parma.it * www.valgardena.it * www.herabit.com * ...

RESEARCH & ANALYSIS SECURITY & THREATS region EU
2026-02-08 21:05 social.circl.lu 📄
P2 🇸🇪 Sweden

Civilförsvaret om planerna vid Lovsjön: ”Då avvecklar vi”

Kommunen förhandlar med avfallföretaget PreZero om en flytt till Moliden vid Lovsjön. Här huserar idag Frivilliga Automobilkåren, FAK, men de vill inte flytta på sig. –  Värderar man en avfallsanläggning mer än civil beredskap får man ta hand om den civila beredskapen själv, säger Bill Skoglund, tf ...

POLICY & REGULATION RED kommun
2026-02-08 20:45 jp.se 📄
P1 🇸🇪 Sweden

Trenden i EU: Begränsa ungdomars sociala medier

BRYSSEL. I Europa rör sig flera länder mot att begränsa tillgången till sociala medier för barn och ungdomar. Bland andra Frankrike, Luxemburg och EU-parlamentet vill även se ett EU-förbud.

POLICY & REGULATION STRATEGY & CAPABILITY NSA EU
2026-02-08 20:23 dn.se 📄
P3 🌍 Global Threat

OpenClaw partners with VirusTotal and says that all skills published to ClawHub are now scanned using VirusTotal's threat intelligence (The Hacker News)

The Hacker News : OpenClaw partners with VirusTotal and says that all skills published to ClawHub are now scanned using VirusTotal's threat intelligence —  Artificial Intelligence / Vulnerability  —  OpenClaw (formerly Moltbot and Clawdbot) has announced that it's partnering with Google-owned VirusT...

STRATEGY & CAPABILITY RESEARCH & ANALYSIS claw openclaw
2026-02-08 17:45 techmeme.com 📄
P1 🌍 Global

Why Is China Building So Many Coal Plants Despite Its Solar and Wind Boom?

Long-time Slashdot reader schwit1 shared this article from the Associated Press: Even as China's expansion of solar and wind power raced ahead in 2025, the Asian giant opened many more coal power plants than it had in recent years — raising concern about whether the world's largest emitter will red...

STRATEGY & CAPABILITY CER RED
2026-02-08 17:34 slashdot.org 📄
P2 🇸🇪 Sweden

Ukraina ska producera drönare i Tyskland

Ukraina planerar att öppna tio center för vapenexport i länder i Baltikum och norra Europa under året.

INTERNATIONAL & COOPERATION CER EU
2026-02-08 17:13 rss.aftonbladet.se 📄
P1 🌍 Global Threat

CVE-2026-23901: Apache Shiro: Brute force attack possible to determine valid user names

Posted by Lenny Primak on Feb 08 Severity: low Affected versions: - Apache Shiro (org.apache.shiro:shiro-core) before 2.0.7 Description: Observable Timing Discrepancy vulnerability in Apache Shiro. This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7. Users are recommended to upgrade to versi...

SECURITY & THREATS
2026-02-08 16:49 seclists.org 📖
P1 🇸🇪 Sweden

Starmers stabschef avgår efter Epsteinskandal

Storbritanniens premiärminister Keir Starmers stabschef Morgan McSweeney avgår. McSweeneys besked om att avgå kommer efter att pressen har ökat på Starmer när det gäller hans beslut att utse Peter Mandelson, som haft en nära relation till sexförbrytaren Jeffrey Epstein, till ambassadör i USA. ”Det å...

POLICY & REGULATION TECHNOLOGY & INNOVATION Storbritannien USA
2026-02-08 16:02 sverigesradio.se 📄
P1 🌍 Global Threat

Starting point for simple ransomware detection

A practical Sanctum EDR walkthrough: hook IRP_MJ_SET_INFORMATION and IRP_MJ_CREATE, extract normalised filenames, and emit high-signal telemetry for ransomware-like behavior.

OPERATIONS & TECHNICAL SECURITY & THREATS
2026-02-08 15:49 andreadraghetti.it 📄
P1 🌍 Global

Cyber-Espionage Group Breached Systems in 37 Nations, Security Researchers Say

An anonymous reader shared this report from Bloomberg: An Asian cyber-espionage group has spent the past year breaking into computer systems belonging to governments and critical infrastructure organizations in more than 37 countries, according to the cybersecurity firm Palo Alto Networks, Inc. Th...

POLICY & REGULATION STRATEGY & CAPABILITY RED Palo Alto
2026-02-08 15:34 slashdot.org 📄
P1 🌍 Global Threat

Romania’s oil pipeline operator confirms cyberattack as hackers claim data theft

Daryna Antoniuk reports: Romania’s national oil pipeline operator Conpet said a cyberattack disrupted parts of its technology infrastructure and knocked its website offline earlier this week, adding that oil transport operations were not affected. Conpet, which operates about 3,800 kilometers (2,360...

POLICY & REGULATION SECURITY & THREATS BSI EU
2026-02-08 15:09 databreaches.net 📄
P2 🌍 Global

FCC Cybersecurity Alert and Recommendations to Communications Providers

On January 29, 2026, the FCC issued public notice DA 26-96: PUBLIC SAFETY AND HOMELAND SECURITY BUREAU HIGHLIGHTS BEST PRACTICES FOR DEFENDING AGAINST RANSOMWARE ATTACKS By this Public Notice, the Public Safety and Homeland Security Bureau (Bureau) of the Federal Communications Commission (Commissio...

STRATEGY & CAPABILITY SECURITY & THREATS
2026-02-08 15:03 databreaches.net 📄
P2 🇸🇪 Sweden Protection

Investeringar i klimat och försvar ger riktig resiliens

Parallellt med försvarsupprustningen behöver vi accelerera investeringarna i den gröna omställningen för att skapa resiliens, förutsättningar för ett modernt försvar och konkurrensfördelar för svensk innovation. Det verkliga hotet är att vi accepterar separationen av klimat och försvar, skriver Auro...

POLICY & REGULATION SKR
2026-02-08 15:00 di.se 📄
P1 🇸🇪 Sweden

Rymdchefen: ”Sverige har en roll att fylla”

Konflikten om herraväldet över Grönland och därmed Arktis ger Sverige en särställning, enligt Försvarsmaktens rymdchef Anders Sundeman. ”Vi har det som krävs: rätt geografiskt läge, nödvändiga polarkunskaper och innovativ industri. De tre vill jag gifta ihop”, säger han efter det turbulenta toppmöte...

POLICY & REGULATION INTERNATIONAL & COOPERATION Försvarsmakten Sverige
2026-02-08 14:36 di.se 📄
P3 🌍 Global Incident

Some good news: downstream victims of mass data theft campaigns are less likely to pay — incident responders

Mathew J. Schwartz reports: The Clop digital extortion gang for years perfected a method for wringing tens of millions out of cybercrime. Find a zero-day flaw, often in file transfer software, swarm vulnerable networks and post online the sensitive data of any victim unwilling to pay for a promise o...

SECURITY & THREATS INTERNATIONAL & COOPERATION Clop schwart
2026-02-08 14:35 databreaches.net 📄
P1 🌍 Global

Försvarsministeriet: Ålands demilitarisering ifrågasätts inte

Ålands demilitariserade ställning diskuteras inte inom Försvarsministeriet och existerande avtal respekteras fullt ut. Samtidigt betonade Anu Sallinen under sitt besök att Åland ingår i Finlands försvar och att beredskapssamarbetet med landskapsregeringen är mycket välutvecklat.

POLICY & REGULATION regeringen RED
2026-02-08 14:01 alandstidningen.ax 📄
P2 🇸🇪 Sweden

Uppgifter till Expressen: Insats vid rikspolischef Petra Lundhs bostad

Det pågår en polisinsats vid rikpolischef Petra Lundhs bostad – det enligt uppgifter till Expressen och Aftonbladet. Enligt tidningarnas uppgifter rör det sig om ett misstänkt inbrott. Hör polisens presstalesperson Carina Skagerlind.

POLICY & REGULATION NSA pet
2026-02-08 13:02 sverigesradio.se 📄
P3 🌍 Global

Week 06 – 2026

No sponsor this week. If your organisation is interested, head over here to find out more. Chris at AskCleesDecrypting Threema4.db Mike Wilkinson at Cyber TriageConfiguring Your System for IR: Windows Logging Derek EiriExploring frame-counts-galore and hashing pixel data Oleg Afonin at Elc...

POLICY & REGULATION INTERNATIONAL & COOPERATION NSA NSA
2026-02-08 12:33 thisweekin4n6.com 📄
P2 🌍 Global

Comment on How to Unblock Imagine Meta AI Anywhere in the World by Met is NOT your mind

Dear authors and editors of Cyberinsider, Please write something about this, please do some research on these points: 1. The Meta AI app has significant privacy issues, as many users unknowingly share their private conversations publicly, including sensitive information. This occurs because the a...

INTERNATIONAL & COOPERATION
2026-02-08 11:16 cyberinsider.com 📄
P1 🌍 Global Threat

Dynamic Malware Analysis: A Complete Guide to Behavioral Monitoring (Part 2)

Dynamic Malware Analysis: A Complete Guide to Behavioral Monitoring (Part 2) Dynamic Malware Analysis: A Complete Guide to Behavioral Monitoring (Part 2) Updated on February 08, 2026 This is Part 2 of our malware analysis series. If you missed the fundamentals of examining files without execution, r...

RESEARCH & ANALYSIS SECURITY & THREATS FIRST
2026-02-08 11:09 hackingdream.net 📄
P2 🌍 Global Threat

DKnife toolkit abuses routers to spy and deliver malware since 2019

DKnife is a Linux toolkit used since 2019 to hijack router traffic and deliver malware in cyber-espionage attacks. Cisco Talos found DKnife, a powerful Linux toolkit that threat actors use to spy on and control network traffic through routers and edge devices. It inspects and alters data in transit ...

SECURITY & THREATS RESEARCH & ANALYSIS Linux Cisco
2026-02-08 10:04 securityaffairs.co 📄
P1 🌍 Global Threat

Week in review: Notepad++ supply chain attack details and targets, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Global Threat Map: Open-source real-time situational awareness platform Global Threat Map is an open-source project offering security teams a live view of reported cyber activity across the globe, pulli...

SECURITY & THREATS STRATEGY & CAPABILITY ITU RED
2026-02-08 09:00 helpnetsecurity.com 📄
P2 🌍 Global

THIS AI Pentest CLI Broke My Targets In Minutes!!!

Have you ever wished for a smart tool that automates penetration testing with artificial intelligence right from your command line… Continue reading on OSINT Team »

TECHNOLOGY & INNOVATION OPERATIONS & TECHNICAL
2026-02-08 02:49 osintteam.blog 📄
P2 🌍 Global Vulnerability

“The Forgotten Vulnerability: How CRLF Injection Almost Broke Twitter’s Ad Platform”

Let me tell you about a vulnerability that feels like it’s from another era — CRLF injection. While everyone’s chasing fancy XSS and SQL injection bugs, I stumbled across a report that reminded me why the classics never really go out of style. I was digging through old Twitter security reports when ...

STRATEGY & CAPABILITY SECURITY & THREATS DIGG
2026-02-08 02:47 osintteam.blog 📄
P1 🌍 Global Vulnerability

“The $750 Password Reset That Traveled in Plain Sight”

During my research into authentication security flaws, I came across an important finding from researcher uchihaluckycs(His Name is funny)… Continue reading on OSINT Team »

STRATEGY & CAPABILITY AWS chihalucky
2026-02-08 02:47 osintteam.blog 📄
P2 🌍 Global Protection

Lab: Authentication bypass via encryption oracle | Portswigger

This lab contains a logic flaw that exposes an encryption oracle to users. To solve the lab, exploit this flaw to gain access to the admin… Continue reading on OSINT Team »

OPERATIONS & TECHNICAL SECURITY & THREATS Oracle
2026-02-08 02:47 osintteam.blog 📄
P2 🌍 Global Vulnerability

A New Era for Security? Anthropic's Claude Opus 4.6 Found 500 High-Severity Vulnerabilities

Axios reports: Anthropic's latest AI model has found more than 500 previously unknown high-severity security flaws in open-source libraries with little to no prompting, the company shared first with Axios. Why it matters: The advancement signals an inflection point for how AI tools can help cyber...

STRATEGY & CAPABILITY SECURITY & THREATS FIRST RED
2026-02-08 02:34 slashdot.org 📄
P1 🌍 Global Incident

Several Dutch agencies suffer major data breach

APA reports: Personal data of employees of the Dutch Data Protection Authority (Autoriteit Persoonsgegevens, AP) and the Council for Justice was accessed by unauthorized persons as a result of a leak caused by a vulnerability in software used by government agencies, APA reports citing ANP news agenc...

SECURITY & THREATS Ivanti vanti
2026-02-08 01:31 databreaches.net 📄
P1 🌍 Global

NTT Data publishes its 2026 technology outlook highlighting major digital and AI shifts

Like every aspect of human endeavor, change is inevitable, from the era of steam-powered engines to advanced AI infrastructure capable of automating entire workflows. In recent times, organizations are looking to integrate AI for the sole purpose of streamlining workflows and processes to maximize e...

POLICY & REGULATION TECHNOLOGY & INNOVATION RED Outlook
2026-02-07 23:38 gcn.com 📄
P1 🌍 Global Threat

Static Malware Analysis: Analyzing Malicious Files (Part 1)

Static Malware Analysis: Analyzing Malicious Files (Part 1) Static Malware Analysis: Analyzing Malicious Files (Part 1) Updated on February 8, 2026 Table of Contents Prerequisites Initial Information Gathering Basic Static Analysis Advanced Static Analysis IOC Extraction Detection Perspective Key Ta...

RESEARCH & ANALYSIS STRATEGY & CAPABILITY FIRST ITU
2026-02-07 21:52 hackingdream.net 📄
P3 🌍 Global Threat

Analyze Malicious Office Documents: The Complete Guide

Analyze Malicious Office Documents: The Complete Guide Analyze Malicious Office Documents: The Complete Guide Updated on 2026-02-08 Table of Contents Prerequisites Port Information Document Types Overview Initial Information Gathering Basic Static Analysis Advanced Static Analysis Dynamic Analysis I...

SECURITY & THREATS TECHNOLOGY & INNOVATION
2026-02-07 21:31 hackingdream.net 📄
P1 🌍 Global

Finansinspektionen ökar fokus på bedrägerier: ”Bankerna måste fortsätta satsa”

Uppemot 1,5 miljarder kronor förlorade svenskarna i investeringsbedrägerier förra året, enligt Finansinspektionen. Nu ska myndigheten skärpa sitt fokus på bedrägerier och kriminell ekonomi lovar den nya generaldirektören Johan Almenberg. – När bankerna tar sitt ansvar så gör det faktiskt skillnad. D...

POLICY & REGULATION OPERATIONS & TECHNICAL Finansinspektionen SKR
2026-02-07 18:09 dn.se 📄
P1 🌍 Global Threat

Italian university La Sapienza still offline to mitigate recent cyber attack

Rome’s La Sapienza University was hit by a cyberattack that disrupted IT systems and caused widespread operational issues. Since February 2, Rome’s La Sapienza University, one of the most important Italian universities, has been offline due to a cyberattack. For days, students have been unable to bo...

SECURITY & THREATS RESEARCH & ANALYSIS SAP SAP
2026-02-07 18:02 securityaffairs.co 📄
P3 🇸🇪 Sweden

State actor targets 155 countries in 'Shadow Campaigns' espionage op

A new state-aligned cyberespionage threat group tracked as TGR-STA-1030/UNC6619, has conducted a global-scale operation dubbed the "Shadow Campaigns," where it targeted government infrastructure in 155 countries.

POLICY & REGULATION RESEARCH & ANALYSIS
2026-02-07 15:30 andreadraghetti.it 📄
P1 🌍 Global Threat

CTO at NCSC Summary: week ending February 8th

Nation-state threat actors exploit end-of-support (EOS) edge devices -ncluding, but not limited to, load balancers, firewalls, routers, and virtual private network (VPN) gateways

RESEARCH & ANALYSIS POLICY & REGULATION NCSC NSA
2026-02-07 09:55 ctoatncsc.substack.com 📄
P1 🌍 Global Protection

RADICL, which offers threat detection and response services to SMBs supporting US defense industrial base and critical infrastructure, raised a $31M Series A (Duncan Riley/SiliconANGLE)

Duncan Riley / SiliconANGLE : RADICL, which offers threat detection and response services to SMBs supporting US defense industrial base and critical infrastructure, raised a $31M Series A —  Cybersecurity-as-a-service startup Radicl Defense Inc. announced today that it has raised $31 million in earl...

POLICY & REGULATION STRATEGY & CAPABILITY
2026-02-07 05:45 techmeme.com 📄
P1 🌍 Global

Security Governance & Leadership

Part 1 of a series on creating information security policies Contents * Security Starts at the Top (or, Governance Makes or Breaks Your Security Program) * Disclaimer * Why Governance Comes First * The Information Security Policy: Setting the Tone * Risk Management: Replace Guesswork with Dis...

STRATEGY & CAPABILITY POLICY & REGULATION FIRST FIRST
2026-02-06 20:18 andreadraghetti.it 📄
P2 🌍 Global Vulnerability

Why organizations need cloud attack surface management

<div> <div> <p paraeid="{391f7bcb-7164-4bda-b387-679b7c275a0e}{29}" paraid="781871645"><span xml:lang="EN-US" data-contrast="auto">As more organizations move to public cloud environments, they're finding that their attack surfaces are no longer fixed perimeters but inste...

STRATEGY & CAPABILITY POLICY & REGULATION
2026-02-06 16:02 rss.techtarget.com 📄
P1 🌍 Global Vulnerability

POC available for critical n8n remote command execution flaw

At a glance: A proof-of-concept exploit is available for a critical n8n remote command execution vulnerability tracked as CVE-2026-25049 (CVSS 9.4). The flaw allows authenticated users with workflow-creation permissions to execute system-level commands and achieve full server compromise, including a...

SECURITY & THREATS POLICY & REGULATION RED RED
2026-02-06 14:04 fieldeffect.com 📄
P1 🌍 Global

Techjättarna rekordinvesterar i AI: satsar 650 miljarder dollar under 2026

Alphabet, Amazon, Meta och Microsoft planerar att tillsammans investera omkring 650 miljarder dollar under 2026. Pengarna ska främst gå till datacenter och AI-infrastruktur i jakten på dominans inom AI-marknaden, rapporterar Bloomberg . Amazon väntas spendera upp till 200 miljarder dollar, Alphabet ...

POLICY & REGULATION TECHNOLOGY & INNOVATION datacenter oom
2026-02-06 13:54 computersweden.se 📄
P1 🌍 Global Protection

CISA orders federal agencies to replace end-of-life edge devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new binding operational directive requiring federal agencies to identify and remove network edge devices that no longer receive security updates from manufacturers. [...]

STRATEGY & CAPABILITY POLICY & REGULATION CISA Cybersecurity and Infrastructure Security Agency
2026-02-06 08:41 bleepingcomputer.com 📄
P3 🌍 Global

Netnod ny medlem i Säkerhets- och försvarsföretagen (SOFF)

Företaget Netnod, en aktör inom kritisk digital infrastruktur i Norden, har beviljats medlemskap i branschorganisationen Säkerhets- och försvarsföretagen (SOFF). Medlemskapet markerar ett viktigt steg i att fördjupa samarbetet mellan civilt försvar och försvarsindustrin för att säkra landets digital...

POLICY & REGULATION STRATEGY & CAPABILITY försvarsindustri Norden
2026-02-06 08:00 aktuellsakerhet.se 📄
P1 🌍 Global

SynthForensics: A Multi-Generator Benchmark for Detecting Synthetic Video Deepfakes

arXiv:2602.04939v1 Announce Type: new Abstract: The landscape of synthetic media has been irrevocably altered by text-to-video (T2V) models, whose outputs are rapidly approaching indistinguishability from reality. Critically, this technology is no longer confined to large-scale labs; the proliferat...

POLICY & REGULATION RESEARCH & ANALYSIS CRA RED
2026-02-06 05:00 arxiv.org 📄
P1 🌍 Global Vulnerability

Extracting Recurring Vulnerabilities from Black-Box LLM-Generated Software

arXiv:2602.04894v1 Announce Type: new Abstract: LLMs are increasingly used for code generation, but their outputs often follow recurring templates that can induce predictable vulnerabilities. We study \emph{vulnerability persistence} in LLM-generated software and introduce \emph{Feature--Security T...

STRATEGY & CAPABILITY SECURITY & THREATS FIRST RED
2026-02-06 05:00 arxiv.org 📄
P3 🌍 Global

Ändrade regler om tillstånd och tillsyn för Totalförsvarets forskningsinstitut

I lagrådsremissen föreslås att Totalförsvarets forskningsinstitut ska omfattas av samma reglering som Försvarsmakten, Fortifikationsverket, Försvarets materielverk och Försvarets radioanstalt dels i fråga om tillstånd och tillsyn inom miljö- och hälsoskyddsområdet, dels i fråga om tillsyn på strålsk...

POLICY & REGULATION OPERATIONS & TECHNICAL regeringen Försvarsmakten
2026-02-06 00:00 g0v.se 📄
P1 🌍 Global

Privatkopieringsersättning

Upphovsmän och andra rättighetshavare har rätt till rimlig kompensation för privatkopiering av deras skyddade verk och prestationer. I Sverige, och de flesta andra EU-länder, betalas ersättningen av de företag som tillverkar eller för in elektronikprodukter som kan användas för privatkopiering. I la...

POLICY & REGULATION NSA LEK
2026-02-05 00:00 g0v.se 📄
P1 🌍 Global

Det europeiska nätpaketet, 2025/26:FPM62

Det europeiska nätpaketet 2025/26:FPM62 Publicerad Faktapromemoria gällande det europeiska nätpaketet. Ladda ner: Den 10 december 2025 presenterade kommissionen ett meddelande om det europeiska nätpaketet. Samtidigt presenterades även förslag om revideringar av förordningen om transeuropeisk energii...

POLICY & REGULATION EU
2026-02-05 00:00 g0v.se 📄
P1 🌍 Global

Pål Jonson i Bryssel för flera högnivåmöten

Den 11 och 12 februari kommer försvarsminister Pål Jonson att delta på försvarsministermötet inom EU samt Nato. I samband med Natos försvarsministermöte kommer även ett möte att hållas inom ramen för Ukraine Defence Contact Group. Ökat stöd till Ukraina är den fråga som kommer prägla alla tre möten.

POLICY & REGULATION INTERNATIONAL & COOPERATION EU Ukraina
2026-02-05 00:00 g0v.se 📄
P1 🌍 Global

Regeringen tillsätter en utredning i syfte att förenkla och påskynda utbyggnaden av militära fastigheter och anläggningar

Regeringen tillsätter en utredning för att förenkla och påskynda utbyggnad av det militära försvarets fastigheter och anläggningar. I uppdraget ingår att analysera vad i plan- och byggprocesserna som medför fördröjningar för utbyggnaden av den militära delen av totalförsvaret. Utifrån sin analys ska...

POLICY & REGULATION regeringen regeringen
2026-02-05 00:00 g0v.se 📄
P1 🌍 Global

Fler åtgärder för ny kärnkraft

I dag lägger regeringen fram flera förslag som ska göra det enklare att etablera ny kärnkraft i Sverige. Det handlar om en ny godkännandelag, fler möjliga platser för kärnkraft vid kust och ökat statligt stöd till kommuners förstudier.

POLICY & REGULATION regeringen SKR
2026-02-05 00:00 g0v.se 📄

OODA Loop Methodology

👁️
Observe

RSS crawling

🧭
Orient

ML scoring

⚖️
Decide

Prioritization

🔄
Act

Feedback loop