Cloud Security

When Nation-States and Cybercriminals Hit Critical Infrastructure: This Week's Wake-Up Calls

When Nation-States and Cybercriminals Hit Critical Infrastructure: This Week’s Wake-Up Calls

I’ve been tracking several concerning developments this week that really highlight how our threat environment keeps evolving. From insider threats at tech giants to sophisticated vishing campaigns and critical infrastructure attacks, there’s a lot to unpack here.

The Google AI Theft Case: When Insiders Go Rogue

The conviction of Linwei Ding, the former Google engineer who stole AI supercomputer data and shared it with Chinese tech firms, is a stark reminder that our biggest threats often come from within. U.S. convicts ex-Google engineer for sending AI tech data to China

Shadow AI and Exposed LLMs: Why Your Organization's AI Security is Probably Worse Than You Think

Shadow AI and Exposed LLMs: Why Your Organization’s AI Security is Probably Worse Than You Think

I’ve been digging through this week’s security news, and there’s a pattern emerging that should make every CISO lose sleep. We’re seeing AI security failures across multiple fronts – from shadow AI deployments to exposed language model hosts to malicious browser extensions stealing ChatGPT tokens. The common thread? Organizations are rushing to adopt AI without understanding the attack surface they’re creating.

Google Takes Down IPIDEA Proxy Network While Critical Infrastructure Shows Alarming Security Gaps

Google Takes Down IPIDEA Proxy Network While Critical Infrastructure Shows Alarming Security Gaps

Last week brought some sobering reminders about the state of our cybersecurity defenses, from a major proxy network disruption to widespread vulnerabilities in critical infrastructure. Let me walk you through what happened and why it matters for our industry.

The IPIDEA Takedown: A Win Against Malware Infrastructure

Google’s Threat Intelligence Group scored a significant victory this week by disrupting IPIDEA, one of the largest residential proxy networks used by threat actors. This wasn’t just any proxy service – IPIDEA was essentially running on compromised residential devices infected with malware, creating a massive botnet disguised as a legitimate business service.

Zero-Day Season Continues: Ivanti Hit Again While FBI Launches Winter SHIELD

Zero-Day Season Continues: Ivanti Hit Again While FBI Launches Winter SHIELD

It feels like we’re stuck in a particularly rough patch of vulnerability disclosures, and this week’s news isn’t helping that feeling. The most pressing issue on my radar is another Ivanti situation – this time affecting their Endpoint Manager Mobile (EPMM) platform with two critical flaws that attackers are already exploiting in the wild.

The Ivanti Problem Keeps Getting Worse

I’ll be honest – when I saw another Ivanti vulnerability announcement, my first thought was “here we go again.” The company disclosed two critical vulnerabilities in their EPMM platform, tracked as CVE-2026-1281 and CVE-2026-1340, and these aren’t theoretical risks. Attackers are actively exploiting them.

When Trusted Platforms Turn Against Us: This Week's Supply Chain Wake-Up Call

When Trusted Platforms Turn Against Us: This Week’s Supply Chain Wake-Up Call

You know that sinking feeling when you realize attackers have found a new way to weaponize something we all thought was safe? That’s exactly what happened this week across multiple fronts, and honestly, it’s got me rethinking how we evaluate “trusted” platforms.

The most eye-opening story has to be the Hugging Face abuse campaign. Attackers are using the popular AI model repository to host thousands of Android malware variants targeting financial apps. Think about that for a second – Hugging Face has become such a cornerstone of the AI ecosystem that most of us probably whitelist it without a second thought. Now criminals are exploiting that trust to distribute credential-stealing malware.

When AI Servers Go Rogue and Car Doors Won't Open: This Week's Security Wake-Up Calls

When AI Servers Go Rogue and Car Doors Won’t Open: This Week’s Security Wake-Up Calls

You know that feeling when you realize just how interconnected and vulnerable our digital infrastructure really is? This week delivered a perfect storm of reminders, from 175,000 exposed AI servers scattered across the globe to Russian drivers literally locked out of their cars by hackers. Let me walk you through what happened and why it matters for all of us.

Critical Fortinet Flaw Under Active Attack While AI Reshapes Security Assumptions

Critical Fortinet Flaw Under Active Attack While AI Reshapes Security Assumptions

If you’re running Fortinet infrastructure, drop what you’re doing and check your patch status. The company just released emergency fixes for CVE-2026-24858, a critical authentication bypass in FortiOS that’s already being exploited in the wild. With a CVSS score of 9.4, this isn’t just another vulnerability to add to your backlog—it’s an active threat that affects FortiOS, FortiManager, and FortiAnalyzer systems.

When AI Assistants Become Security Liabilities: This Week's Enterprise Wake-Up Calls

When AI Assistants Become Security Liabilities: This Week’s Enterprise Wake-Up Calls

If you’ve been keeping an eye on enterprise AI adoption lately, you probably won’t be surprised to hear that we’re seeing some predictable security growing pains. But this week brought a particularly stark reminder of why security teams need to stay ahead of the curve when it comes to AI deployments.

The Moltbot Reality Check

The biggest story hitting my radar is the security mess surrounding Moltbot (formerly Clawdbot), an AI assistant that’s been making waves in enterprise environments. BleepingComputer reported that security researchers are finding some seriously concerning deployment issues that could expose API keys, OAuth tokens, conversation histories, and user credentials.

When Nation-States Target Power Grids: The Polish Attack That Should Keep Us All Awake

When Nation-States Target Power Grids: The Polish Attack That Should Keep Us All Awake

I’ve been following the investigation into that December cyberattack on Poland’s power grid, and frankly, it’s exactly the kind of scenario that keeps security professionals up at night. What started as reports of disruptions at around 30 energy facilities has now been attributed to ELECTRUM, a Russian state-sponsored group, marking what appears to be the first major nation-state attack specifically targeting distributed energy resources.

When Nation-States Hit Small Business: The WinRAR Problem That Won't Go Away

When Nation-States Hit Small Business: The WinRAR Problem That Won’t Go Away

You know that feeling when you patch a critical vulnerability and assume everyone else did too? Yeah, well, Russian and Chinese nation-state groups are betting heavily that most small and medium businesses haven’t gotten around to updating WinRAR from last July’s patch. And unfortunately, they’re probably right.

Dark Reading is reporting that these threat actors are actively exploiting a WinRAR vulnerability that’s been patched for over six months now. This hits close to home because it perfectly illustrates the patching gap that exists between enterprise environments and smaller organizations. While we might have automated patch management and dedicated security teams, SMBs are often running on skeleton IT crews who are juggling a dozen priorities.