Yesterday, a single IP address ( 204.76.203.210 ) scanned a number of our sensors for what looks like an anthropic API node. The IP address is known to be a Tor exit node. The requests are pretty …
Homepage-Fragments
** Ravie Lakshmanan ** Feb 02, 2026 Kerberos / Enterprise Security Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows …
** The Hacker News ** Feb 02, 2026 Threat Detection / Endpoint Security For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential …
⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
** Ravie Lakshmanan ** Feb 02, 2026 Hacking News / Cybersecurity Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while …
AI Coding Assistants Secretly Copying All Code to China There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they …
News diary 2-8 February: Alphabet financial results, Winter Olympics, NFL Super Bowl
Winter Olympics 2026 logo. Picture: Shutterstock/kovop This week features a wave of financial results to be released from major multinational and media companies, including Google parent Alphabet, …
Generative artificial intelligence models have been used to create enormous libraries of theoretical materials that could help solve all kinds of problems. Now, scientists just have to figure out how …
** Ravie Lakshmanan ** Feb 02, 2026 Threat Intelligence / Malware The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect …
** Ravie Lakshmanan ** Feb 02, 2026 Developer Tools / Malware Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat …
The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent …
ISC Stormcast For Monday, February 2nd, 2026 https://isc.sans.edu/podcastdetail/9790, (Mon, Feb 2nd)
ISC Stormcast For Monday, February 2nd, 2026 https://isc.sans.edu/podcastdetail/9790
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent …
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
** Ravie Lakshmanan ** Jan 31, 2026 Social Engineering / SaaS Security Google-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft consistent …
** Ravie Lakshmanan ** Jan 31, 2026 Network Security / SCADA CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and …
To what extent can an artificial system be rational? A new MIT course, 6.S044/24.S00 (AI and Rationality), doesn’t seek to answer this question. Instead, it challenges students to explore this and …
Evaluating generative AI models with Amazon Nova LLM-as-a-Judge on Amazon SageMaker AI
Evaluating the performance of large language models (LLMs) goes beyond statistical metrics like perplexity or bilingual evaluation understudy (BLEU) scores. For most real-world generative AI …
Friday Squid Blogging: New Squid Species Discovered A new species of squid . pretends to be a plant: Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in …
Managing ModelOps workflows can be complex and time-consuming. If you’ve struggled with setting up project templates for your data science team, you know that the previous approach using AWS Service …
Scale AI in South Africa using Amazon Bedrock global cross-Region inference with Anthropic Claude 4.5 models
Building AI applications with Amazon Bedrock presents throughput challenges impacting the scalability of your applications. Global cross-Region inference in the af-south-1 AWS Region changes that. You …
Charlie, one of our readers, has forwarded an interesting phishing email. The email was sent to users of the Vivladi Webmail service. While not overly convincing, the email is likely sufficient to …
ChatGPT, Gemini, Microsoft Copilot, Claude, and Perplexity app icons are seen on the screen of an iPhone. Picture: Shutterstock/Tada Images AI answers from OpenAI, Google and Perplexity draw on a …
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of …
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities From an Anthropic blog post : In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed …
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco …
‘Claudio is scamming’ article over which Mill Media’s The Londoner is being sued A reporter for Mill Media has been hit with an unusual £10,000 county court judgment after being sued by a businessman …