** Ravie Lakshmanan ** Feb 03, 2026 Malware / Open Source A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the …
Homepage-Fragments
ISC Stormcast For Tuesday, February 3rd, 2026 https://isc.sans.edu/podcastdetail/9792, (Tue, Feb 3rd)
ISC Stormcast For Tuesday, February 3rd, 2026 https://isc.sans.edu/podcastdetail/9792
A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks. ClawHub is …
How Clarus Care uses Amazon Bedrock to deliver conversational contact center interactions
This post was cowritten by Rishi Srivastava and Scott Reynolds from Clarus Care. Many healthcare practices today struggle with managing high volumes of patient calls efficiently. From appointment …
** Ravie Lakshmanan ** Feb 02, 2026 Vulnerability / Artificial Intelligence A high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow …
Doreen Lawrence accuses Mail of ‘pretending to be her friend’ while stealing her private information
Baroness Doreen Lawrence arriving at the International Dispute Resolution Centre in November 2025. Picture: James Manning/PA Wire Baroness Doreen Lawrence has accused the Daily Mail of “pretending to …
Yesterday, a single IP address ( 204.76.203.210 ) scanned a number of our sensors for what looks like an anthropic API node. The IP address is known to be a Tor exit node. The requests are pretty …
** Ravie Lakshmanan ** Feb 02, 2026 Kerberos / Enterprise Security Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows …
** The Hacker News ** Feb 02, 2026 Threat Detection / Endpoint Security For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential …
⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
** Ravie Lakshmanan ** Feb 02, 2026 Hacking News / Cybersecurity Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while …
AI Coding Assistants Secretly Copying All Code to China There’s a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they …
News diary 2-8 February: Alphabet financial results, Winter Olympics, NFL Super Bowl
Winter Olympics 2026 logo. Picture: Shutterstock/kovop This week features a wave of financial results to be released from major multinational and media companies, including Google parent Alphabet, …
Generative artificial intelligence models have been used to create enormous libraries of theoretical materials that could help solve all kinds of problems. Now, scientists just have to figure out how …
** Ravie Lakshmanan ** Feb 02, 2026 Threat Intelligence / Malware The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect …
** Ravie Lakshmanan ** Feb 02, 2026 Developer Tools / Malware Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat …
The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent …
ISC Stormcast For Monday, February 2nd, 2026 https://isc.sans.edu/podcastdetail/9790, (Mon, Feb 2nd)
ISC Stormcast For Monday, February 2nd, 2026 https://isc.sans.edu/podcastdetail/9790
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent …
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
** Ravie Lakshmanan ** Jan 31, 2026 Social Engineering / SaaS Security Google-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft consistent …
** Ravie Lakshmanan ** Jan 31, 2026 Network Security / SCADA CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and …
To what extent can an artificial system be rational? A new MIT course, 6.S044/24.S00 (AI and Rationality), doesn’t seek to answer this question. Instead, it challenges students to explore this and …
Evaluating generative AI models with Amazon Nova LLM-as-a-Judge on Amazon SageMaker AI
Evaluating the performance of large language models (LLMs) goes beyond statistical metrics like perplexity or bilingual evaluation understudy (BLEU) scores. For most real-world generative AI …
Friday Squid Blogging: New Squid Species Discovered A new species of squid . pretends to be a plant: Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in …
Managing ModelOps workflows can be complex and time-consuming. If you’ve struggled with setting up project templates for your data science team, you know that the previous approach using AWS Service …
Scale AI in South Africa using Amazon Bedrock global cross-Region inference with Anthropic Claude 4.5 models
Building AI applications with Amazon Bedrock presents throughput challenges impacting the scalability of your applications. Global cross-Region inference in the af-south-1 AWS Region changes that. You …