Cyber News & Updates
Breaking news, security alerts, and trending stories from across the cybersecurity landscape.
-

ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
This week’s cybersecurity bulletin highlights the re-emergence of Mirai-based botnets targeting IoT devices, a surge in sophisticated phishing attacks leveraging AI, and efforts by Singapore to curb government impersonation scams. It also covers privacy upgrades to the Tor Project, new malware techniques, and a major money laundering network takedown.
-

OpenAI leaks personal data and metadata of API users
OpenAI has disclosed a data leak affecting an undisclosed number of API users, with personal data and metadata exposed after an attack on its analytics provider, Mixpanel. The compromised data includes names, email addresses, location details, operating systems, browsers, referring websites, and user/organization IDs linked to API accounts.
-

Denmark is pleased with the adopted chat control proposal, but wanted to go further
Denmark welcomes the EU’s voluntary chat control proposal, though it initially sought broader, mandatory measures. Critics, including former MEP Patrick Breyer, warn the proposal is a ‘Trojan horse’ that could lead to mass surveillance and the end of online anonymity through age verification, with several countries opposing it due to privacy concerns.
-

Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
Microsoft is enhancing security for Entra ID authentication by blocking unauthorized script injection attacks, starting in late 2026. This move involves updating their Content Security Policy (CSP) for the “login.microsoftonline.com” sign-in experience, allowing only scripts from trusted Microsoft domains to execute, thereby preventing malicious code.
-

3 SOC Challenges You Need to Solve Before 2026
Cybersecurity is facing a pivotal shift by 2026 as threat actors increasingly use AI for attacks. This includes scaling operations, automating reconnaissance, and crafting hyper-realistic social engineering campaigns. One major challenge for Security Operations Centers (SOCs) is the rise of evasive threats. Attackers use sophisticated tactics like ClickFix campaigns, abusing LOLBins, and multi-stage phishing with…
-

Fire Department Insufficiently Prepared for Large and Long-Term Incidents
The Dutch fire department is currently unprepared to handle large-scale, simultaneous, or long-term incidents like wildfires or floods across multiple safety regions or nationwide. According to a new investigation by the Inspectorate of Justice and Security (Inspectie JenV), existing efforts to assist other regions directly compromise regular service coverage, endangering citizens and responders. The Inspectorate…
-

Concerns about Cyber Threats and Extremism Have Risen Sharply
A new survey from the NCTV in the Netherlands shows a sharp rise in public concern over cyber threats and extremism. These issues, along with tensions between population groups and disruptions to vital processes, are top worries for Dutch citizens. Concerns about extremism have notably increased by 10 percentage points since spring 2025. Cyber threats,…
-

Minister: Mandatory Acceptance of Digital Euro for Stores is Understandable
The Dutch Minister of Finance, Heinen, finds the mandatory acceptance of the digital euro by stores and businesses understandable. This stance comes as Europe continues negotiations on the digital currency, aiming for a council agreement this year. The minister emphasizes finding a balance between widespread adoption and practical implementation for smaller retailers. Concerns were raised…
-

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Five new vulnerabilities have been discovered in Fluent Bit, a popular open-source telemetry agent. These flaws could be exploited to compromise and take over cloud infrastructures, raising significant security concerns. Successful exploitation means attackers could disrupt operations, tamper with sensitive data, and gain deeper access into cloud and Kubernetes environments.

