THE KNOWNSEC LEAK: Yet Another Leak of China’s Contractor-Driven Cyber-Espionage Ecosystem

Leaked internal documents show Knownsec operates as a state-aligned cyber contractor supplying a vertically integrated espionage stack—ZoomEye/TargetDB reconnaissance, o_data_* identity correlation, GhostX/Un‑Mail exploitation and mailbox takeover, and Passive Radar PCAP-based internal mapping—to Chinese public‑security, military, and regulator customers. The corpus includes organizational charts, employee emails, high‑confidence IOCs targeting Taiwanese critical infrastructure, and detailed tradecraft emphasizing persistence, anti‑forensics, and APT‑style operational workflows. #Knownsec #GhostX

Read More
Cyber Insights 2026: API Security – Harder to Secure, Impossible to Ignore

This article discusses the growing importance, proliferation, and security challenges of Application Programming Interfaces (APIs) in the context of AI advancements and cyber threats. It highlights how the rapid increase in APIs, especially with autonomous AI systems, expands the attack surface, making effective security measures more critical than ever. #SesameOp #OpenAIAPI…

Read More
Cyber Resilience in Healthcare: Lessons from 2025 and Priorities for 2026

This article highlights the increasing cyber threats faced by healthcare organizations in 2025, emphasizing the need for enhanced cyber resilience strategies. It discusses the importance of Zero Trust, AI, supply chain vigilance, and leadership accountability in strengthening cybersecurity in healthcare. #CyberResilience #HealthcareSecurity #AI #ZeroTrust #SupplyChainSecurity…

Read More
Do You Really Know Your AI Landscape?

Enterprise AI adoption is accelerating, expanding security boundaries across Cloud, SaaS, and Endpoint environments and exposing a complex, AI-driven attack surface. Traditional security tools struggle to protect AI assets, making advanced AI security posture management essential for full visibility, risk assessment, data lineage, and zero-trust enforcement across the AI ecosystem. #HuggingFace #ModelContextProtocol

Read More
LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams

SentinelLABS’ analysis finds that current LLM benchmarks from major players reduce continuous, collaborative security work to isolated, static tasks and therefore do not measure the operational outcomes defenders need. Benchmarks such as Microsoft’s ExCyTIn-Bench, Meta’s CyberSOCEval/CyberSecEval 3, and CTIBench show LLMs struggle with multi-hop investigations, poor calibration on severity, and evaluation loops that rely on vendor models to judge vendor models. #ExCyTIn-Bench #CyberSOCEval

Read More
Attack Surface Visibility Tops CISO Infrastructure Security Priorities for 2026

Modern organizations are prioritizing attack surface visibility as a key component of infrastructure security in 2026 due to the increasing complexity of digital assets across cloud, API, and hybrid environments. Industry experts highlight how interconnected priorities like identity management and governance are essential for effective cybersecurity strategies. #AttackSurfaceVisibility #APISecurity…

Read More
Cybersecurity News | Daily Recap [16 Jan 2026]

Daily Recap, AI & ML security dominates the recap with threats ranging from voice cloning, PLC vulnerabilities, and poisoned dependencies to privilege escalation via AI agents and escalating workflow risks. The report highlights a mix of incidents, patches, and enforcement actions across vendors, botnets, data breaches, and regulatory penalties, underscoring the need to secure workflows, access controls, and AI governance. #VoidLink #Kimwolf #Aisuru #FortiSIEM #PLUGGYAPE #GrokBlock #GrokProbe #Eurail #Kyowon #FreeMobile #RedVDS #Verizon #Uganda #Siemens #Schneider #Aveva #PhoenixContact #Tines #Aikido #CrowdStrike #FTC #GM

Read More
Reco Shadow AI Report 2025

The 2025 State of Shadow AI Report reveals the widespread and persistent use of unsanctioned AI applications in enterprises, highlighting critical security risks, especially related to tools like OpenAI and low-security-rated apps such as Jivrus Technologies and Happytalk. It emphasizes the urgent need for real-time discovery, governance, and remediation strategies to manage shadow AI exposure, particularly in small and mid-sized organizations. #ShadowAI #OpenAI #RecoSecurity

Read More
AI Security Is Top Cyber Concern: World Economic Forum

The World Economic Forum’s annual cybersecurity outlook highlights AI as the primary driver of change and concern in cybersecurity, with organizations increasingly assessing AI security risks. Top concerns include AI vulnerabilities, cyber-enabled fraud, and geopolitical threats, prompting organizations to adopt AI-driven defense strategies and governance models. #AIsecurity #CyberEnabledFraud…

Read More
New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Research shows a significant increase in third-party applications accessing sensitive data without justification, with government and education sectors experiencing sharp rises in malicious activity. Despite prioritizing web security, most organizations lack implemented solutions to mitigate these risks, emphasizing governance gaps and over-permissioned tracking tools like Facebook Pixel and Google Tag Manager….

Read More
Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

Nicole Ozer’s appointment to the California Privacy Protection Agency board signals a strengthened focus on privacy rights, digital civil liberties, and responsible data governance in California. This leadership update coincides with evolving national security and cybersecurity efforts, highlighting the importance of experienced governance in digital rights protection. #CaliforniaPrivacyAct #NicoleOzer #CalPrivacy #NSADeputyDirector…

Read More