Advertisement · 728 × 90
#
Hashtag
#Cyber
Advertisement · 728 × 90
Preview
Iran Cyber War 2026: APT33 and APT35 Exploit the Conflict 340% increase in cyber attacks on US infrastructure. Synchronized with military strikes. APT33 targets energy, APT35 targets people.

Iran Cyber War 2026: APT33 and APT35 Exploit the Conflict

340% increase in cyber attacks on US infrastructure. Synchronized with military strikes. APT33 targets energy, APT35 targets peo…

theboard.world/articles/technology/iran...

#tech #AI #innovation #Iran #cyber

0 0 0 0
Post image

Rising ICS incidents drive shift from reactive risk models to intelligence-driven OT security strategies Traditional organizational risk models are struggling to cope with the changing industrial t...

#Attacks #and #Vulnerabilities #Control #device […]

[Original post on industrialcyber.co]

0 0 0 0
Iran‑linked hackers flooded Israeli civilians fleeing missile strikes with SMS links that installed Pegasus‑style spyware, hijacking cameras, GPS and data in real time. The attack, timed to the missil

Iran‑linked hackers flooded Israeli civilians fleeing missile strikes with SMS links that installed Pegasus‑style spyware, hijacking cameras, GPS and data in real time. The attack, timed to the missil

Iran‑linked hackers flooded Israeli civilians fleeing missile strikes with SMS links that installed Pegasus‑style spyware, hijacking cameras, GPS and data in real time. The...

blackwirein.tel/article/iranlinked-hacke...

#Cyber #War

0 0 0 0
Preview
Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate The last few big cyberattacks on government organizations all have one thing in common. They started because of something a person did wrong, not because of technology. These cyberattacks occur when an employee clicks a link in an email or answers a strange phone call. Sometimes they even give away information by mistake. So technology is like the line of defense. The mistake people make is usually what makes them vulnerable there. Government employees are not bad at their jobs. That is how cyberattacks work. Hackers know it is hard to get into a computer network. It is much easier to get in if they have an employee to let them in. Government organizations have to deal with cyberattacks, and human error is part of the problem. In this context, Texas DIR has initiated a cybersecurity AI awareness training mandate that considers the human aspect of cybersecurity. This is because it is not only encouraged but also funded. In addition, qualified vendors are certified. Moreover, organizations are held legally accountable for compliance. Kratikal is a cybersecurity company specializing in people-centric solutions. Kratikal designed Threatcop to help organizations address this problem. Threatcop is now one of only five qualified cybersecurity AI awareness training vendors certified by the Texas Department of Information Resources. ## **What Good Cybersecurity Awareness Training Actually Does** An employee may have sat through a phishing awareness video and may even understand the concept. When they are confronted with a real phishing attack amid a busy workday, they may not know how to respond. Knowing about a threat vs knowing what it looks like in a real-world scenario are two different things. A quality security awareness training program bridges the gap between knowing and doing by allowing employees to experience a simulated environment nearly identical to the real thing. They learn not only how to spot attacks but how they are constructed, the psychology that drives them, and how to react. Texas codified this standard into law. Under Section 2054.519, DIR-certified training must build genuine information security habits, teach employees to detect, assess, report, and respond to threats, and reflect current attack methods. That standard rules out a substantial portion of what the training market offers. ## **The Texas DIR Mandate: Who It Covers and What It Requires** Texas Government Code Section 2054.5191 casts a wider net than most agencies initially assume. The covered workforce includes: * All state and local government employees who use computers for at least 25 percent of their job duties * Elected officials at the state and local government levels * Appointed officials across all covered institutions * Contractors with access to any government computer system or database, regardless of how frequently that access is used The institutions subject to this requirement include: * State government agencies and departments * Local governments and county offices * Public universities and community colleges * School districts The annual compliance deadline is August 31. Agencies must submit a signed certification to DIR confirming that all covered personnel have completed an approved training program. The agency is responsible for tracking and documenting the completion of each individual. Many organizations encounter challenges here. DIR’s free training option lacks tracking features and does not issue completion certificates. Agencies must create their own documentation systems. As the August 31 deadline approaches, dispersed completion data increases the risk of inaccurate certification submissions. ## **Threatcop: Built by Kratikal for the Human Attack Surface** Threatcop was created because most attacks start with mistakes. The people who started Kratikal saw that more than 90 percent of successful cyberattacks happen because of human error, such as being careless or not knowing something, or because of social engineering. So they thought there should be a platform that helps people change their behavior during an attack, rather than just watching what is happening on the network. Threatcop aims to change user behavior in response to cyberattacks, which can really help people. The founders of Kratikal wanted Threatcop to focus on the factor in cyberattacks, which is a big part of the problem. The Threatcop training is simulation-based. This is where employees interact with attack scenarios, assess their effectiveness, and develop response patterns to apply in the event of a real attack. It is updated and can be customized to the organization’s threat and environment, and it meets the requirements of Texas Government Code Sections 2054.519, 2054.5191, and 2054.5192. It is created for the public sector and includes: * Recognition of AI-generated phishing campaigns * Identification of deepfake voice impersonation attempts * Awareness of synthetic identity attacks * Understanding of automated social engineering techniques * Data privacy risks associated with generative AI tools * Best practices aligned with Texas DIR compliance requirements * Legal and regulatory considerations around AI usage in government workflows In addition to the Texas-specific program, Threatcop addresses seven attack vectors: email phishing, smishing, vishing, QR code phishing, WhatsApp phishing, attachment phishing, and ransomware simulation. Agencies using Threatcop for DIR compliance establish a security awareness infrastructure that extends beyond annual certification. ## **Why AI Awareness Is Now a Core Part of the Training Requirement** Texas House Bill 3512 established formal guidance on artificial intelligence awareness for government employees. Understanding its importance requires examining how AI has changed the attack landscape. * AI-Generated Phishing: Phishing emails sent five years ago were usually detectable because they lacked proper grammar, used generic salutations, and were unrealistic. Employees could detect this. However, this is no longer true. Phishing emails are now generated using language models and information available online. These emails are highly customized and look legitimate. Phishing emails that mention employees’ positions, their managers’ positions, and their ongoing work do not arouse suspicion. * Deepfake Voice Impersonation: This is a new kind of attack that uses audio synthesis to create realistic voice copies. This can be used to impersonate department heads, IT support personnel, and other top officials. This kind of attack is nearly impossible to detect. * Synthetic Identity Attacks: In this type of attack, cybercriminals create fake professional identities using publicly available information and AI. They gain credibility before asking for access. This kind of attack is initiated long before any suspicious behavior is detected. Threatcop’s training addresses these attack types by explaining their construction, not just their appearance. Employees who understand the mechanics of deepfake impersonation are better prepared to recognize variations than those who have only received general warnings. ## **The Real Gap: Between Compliance and Security** It is important to note that an organization can achieve full DIR compliance by August 31, yet still have a workforce unprepared for future attacks. Compliance training that employees complete solely for documentation purposes does not reliably change their response to real threats, such as phishing emails, unexpected calls requesting access, or inappropriate information requests. The organizations that build genuinely resilient workforces treat cybersecurity awareness training as a continuous operational discipline. They run simulated attack campaigns between training cycles. Also, they track which departments and roles show persistent behavioral gaps. They use that data to target follow-up training where it is actually needed rather than distributing the same module uniformly across the organization. Kratikal designed Threatcop to support this approach. Its simulation capabilities across multiple attack vectors enable organizations to maintain active security awareness. Compliance certification becomes a natural outcome of a program focused on substantive results. The financial rationale is clear. A single successful phishing attack can result in costs far exceeding the annual investment in comprehensive training, including forensic investigations, legal notifications, regulatory reporting, litigation, and reputational damage. Threatcop’s DIR certification removes the vendor qualification question entirely. Agencies do not need to assess whether the platform’s content complies with Texas law. Organizations that select their training platform early and set completion milestones have time to address gaps before certification issues arise. The post Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate appeared first on Kratikal Blogs. *** This is a Security Bloggers Network syndicated blog from Kratikal Blogs authored by Shikha Dhingra. Read the original post at: https://kratikal.com/blog/cybersecurity-ai-awareness-training-for-texas-government/

Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate The last few big cyberattacks on government organizations all have one thing in c...

#Security #Bloggers #Network #Compliance #Cyber #awareness

Origin | Interest | Match

0 0 0 0

The hacking group ShinyHunters claims to have stolen over 350GB of data from the European Commission in a cyberattack detected on March 24. The Commission states that its internal systems remain unaffected. #Europe #Cyber

0 0 0 0
Original post on securityaffairs.com

ShinyHunters claims the hack of the European Commission The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers. The Europe...

#Breaking #News #Cyber #Crime #Data #Breach #Hacking […]

[Original post on securityaffairs.com]

0 0 0 0
Video

Daily Sketch Challenge recap 2026 mar 24–28 ✏️
A tribute week inspired by Sam Kieth. The Maxx, characters from his world, Morpheus, and Cyber. RIP 🖤

#dailysketch #dailysketchchallenge #sketchdump #samkieth #themaxx #sandman #morpheus #cyber #comicart #fanart #illustration #eyz #shorts

3 1 0 0
Post image

Cybersecurity Companies’ Stocks Fall as Anthropic Tests Powerful New Model Cybersecurity stocks declined sharply on Friday following revelations that Anthropic has begun testing “Mythos,” an ...

#Cyber #Security #Cyber #Security #News #cyber #security […]

[Original post on cybersecuritynews.com]

0 0 0 0
Post image

New week new batch of daily sketches!

#Eyz #myart #CYBER #samkieth #wolverine #adamantium #xmen #marvelcomics #marvel #comics #DailySketch #DSC

5 0 0 0
Preview
Report: Public Sector Scottish Cyber Activity 2026 The Scottish Government has shared the first of an annual publication analysing the cyber activity of the Scottish public sector.

The Scottish Government has shared the first of an annual publication in partnership with the Scottish Cyber Coordination Centre (SC3), analysing the cyber activity of the Scottish public sector.

Full story below 👇
www.digit.fyi/report-publi...

#Tech | #News | #Cyber

0 0 0 0
Post image

Malicious Browser Extensions Can Steal AI Chats in New “Prompt Poaching” Attack A growing wave of malicious browser extensions is quietly harvesting sensitive AI chat data in a technique now du...

#AI #Cyber #Security #News #Cybersecurity #Cyber #Security […]

[Original post on cyberpress.org]

0 0 0 0
Post image

Fake Certificate Loader Conceals BlankGrabber Malware Chain BlankGrabber’s operators are experimenting with a stealthy loader chain that abuses Windows certificate tooling to hide a Rust‑based ...

#Cyber #Security #News #Cybersecurity #Malware #Cyber […]

[Original post on cyberpress.org]

0 0 0 0
Original post on securityboulevard.com

What is Shift Left Security? Gartner predicts that by 2028, cloud computing will be a core business necessity, with global spending expected to surpass $1 trillion. As organizations continue to ado...

#Security #Bloggers #Network #Cyber #Security […]

[Original post on securityboulevard.com]

0 0 0 0
Post image

European Commission Confirms Cyberattack After AWS Account Breach The European Commission has confirmed a cyberattack on its cloud-based infrastructure following the identification of a compromised...

#AWS #Cyber #Security #News #Cybersecurity #Cyber […]

[Original post on cyberpress.org]

0 0 0 0
Preview
FBI director’s personal email, photos and documents leaked by Iran-linked hackers The Handala Hack Team published more than 300 emails from Kash Patel’s inbox between 2010 and 2019

#Cyber - " #FBI director’s personal email, photos and documents leaked by #Iran -linked hackers"
www.theguardian.com/us-news/2026...

0 0 0 0
Post image

European Commission Confirms Cyberattack Following AWS Account Hack The European Commission has officially confirmed a cyberattack following a targeted cyberattack that compromised its Amazon Web S...

#Cyber #Security #Cyber #Security #News #cyber […]

[Original post on cybersecuritynews.com]

0 0 0 0
Post image

Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed Kernel Drivers by Default Microsoft is taking a major step to harden the Windows operating system against kernel-level threats by r...

#Cyber #Security #News #Security #Updates #Windows […]

[Original post on cybersecuritynews.com]

0 0 0 0
Post image

CISA Adds Aquasecurity Trivy Scanner Vulnerability to KEV Catalog CISA has officially added a critical vulnerability affecting Aquasecurity’s Trivy scanner to its Known Exploited Vulnerabilities ...

#Cyber #Security #News #Vulnerability #News #cyber […]

[Original post on cybersecuritynews.com]

0 0 0 0
Post image

As a #Cyber Security professional I really don’t like to take pleasure in the misfortune of those who get breached.

But as a petty bitch, all I have to say is HAHAHAHAHHAHA 😂😂😂😂🤪🤪🤪🤪😹😹😹😹😹HAHAHAHAHAHA … Dumbass!!!!

0 0 0 0
Preview
MarvelousMissZuri - Watch me stream now on joystick.tv Dog tries to save the world wif maffs

I'm streaming live on @joystick.tv

Come Say Hi 😀🕹️ #vtuber #en #puppygirl #cyber #sub

1 0 0 0
Original post on securityaffairs.com

The European Commission confirmed a cyberattack affecting part of its cloud systems The European Commission confirmed a cyberattack affecting part of its cloud systems, now contained, with no impac...

#Cyber #Crime #Data #Breach #Hacking #Security #Cybercrime #data #breach #European #Commission […]

0 0 0 0
Iran‑linked Handala Hack Team says it stole and posted FBI Director Kash Patel’s personal emails from 2010‑19, framing the dump as a tribute after a US submarine sank Iran’s navy ship Dena. Check Poin

Iran‑linked Handala Hack Team says it stole and posted FBI Director Kash Patel’s personal emails from 2010‑19, framing the dump as a tribute after a US submarine sank Iran’s navy ship Dena. Check Poin

Iran‑linked Handala Hack Team says it stole and posted FBI Director Kash Patel’s personal emails from 2010‑19, framing the dump as a tribute after a US submarine sank Iran’s navy...

blackwirein.tel/article/iran-linked-hack...

#Cyber #War

2 1 0 0
Post image

Neon Noel Synth Elf.
#cyber #elf #neon #aiart #anime #MstrAndr_ART

29 5 0 0
Original post on politico.eu

Orbán’s spies were hunting me, says Hungarian journalist accused of espionage Szabolcs Panyi tells POLITICO that Budapest's accusations are "meant to psychologically pressure me and shat...

#Communications #Cyber #Espionage #Cybersecurity #and #Data #Protection […]

[Original post on politico.eu]

0 0 0 0
Post image

"Stop right there! You're under arrest for Public Indecency! You have the right to moan lewdly!"

(ft. @rhaelto.bsky.social)
#miqote #elezen #ffxivgpose #nsfwgpose #cyber

12 1 0 0

Compliance automation tools: panacea for SMEs or a waste of funds? New analysis reveals a concerning disconnect between compliance automation, marketing claims and SME implementation reality. By Dm...

#Cyber #Security #Tech

Origin | Interest | Match

0 0 0 0

Apple: The #iPhone is an insecure piece of shit, but you can make it secure severely degrading your user experience. #cyber #cybersecurity

0 0 0 0
TeamPCP Compromises Telnyx Python Package on PyPI, Conceals Credential Stealer in WAV Files - Cyber Warriors Middle East In a significant cybersecurity breach, the threat actor known as TeamPCP has compromised the Telnyx Python package by introducing malicious versions designed

TeamPCP Compromises Telnyx Python Package on PyPI, Conceals Credential Stealer in WAV Files TeamPCP Compromises Telnyx Python Package on PyPI, Conceals Credential Stealer in WAV Files In a signific...

#Global #Cyber #Defense #Cyber #Warriors #information #security

Origin | Interest | Match

0 0 0 0
Preview
Iran Cyber War 2026: Attacks on US Hospitals, Banks, and While missiles fly, Iran's Electronic Operations Room is attacking US medical companies, financial systems, and water infrastructure.

Iran Cyber War 2026: Attacks on US Hospitals, Banks, and

While missiles fly, Iran's Electronic Operations Room is attacking US medical companies, financial systems, and wate…

theboard.world/articles/technology/iran...

#tech #AI #innovation #Iran #cyber

0 0 0 0
Iran‑linked “Handala Hack Team” claims it breached FBI Director Kash Patel’s personal email, posting his resume and messages from 2010‑2019. The Justice Department confirmed the intrusion, while the F

Iran‑linked “Handala Hack Team” claims it breached FBI Director Kash Patel’s personal email, posting his resume and messages from 2010‑2019. The Justice Department confirmed the intrusion, while the F

Iran‑linked “Handala Hack Team” claims it breached FBI Director Kash Patel’s personal email, posting his resume and messages from 2010‑2019. The Justice Department confirmed the...

blackwirein.tel/article/iran-linked-hack...

#Cyber #War

0 0 0 0