#PeterTheil and #Palentir A Clear and Present Danger to Social Democracies. The #Swiss rejected the product, #Australia has not, and the #UK is in the middle of acquiring it for wide useage. If you think this all sounds like some sort of conspiracy theory, well, think again. PeteTheil who owns Palantir is a #Fundamentalist #Christian (aka #ChristoFascist) currently controlling the US propaganda machine in #tRump ‘s service. The same man who recently lectured on the #AntiChris in Rome (the Pope isn’t happy about it).

Also consider this: “The Nerve has identified a previous case in which Palantir claimed proprietary rights to data insights after its contract was cancelled. In the early 2010s, the New York Police Department contracted Palantir to help find high-profile targets using data scraping and analysis. In 2017, it cancelled the contract, but Palantir claimed its platforms – Gotham and Foundry, the same systems used inside the UK government – created a unique ecosystem that sat on top of NYPD data. That meant any analysis derived from those platforms was, they claimed, Palantir’s intellectual property.”

Read more here:
https://www.thenerve.news/p/palantir-technologies-uk-mod-sources-government-data-insights-security-state-secrets

#CyberThreat

‘It beggars belief’: MoD sources warn Palantir’s role at heart of government is threat to UK’s security

Experts say that claims UK data remains under government ownership miss the point that the company has the capability to build its own detailed picture of the British population, and even infer state secrets. Report by Charlie Young and Carole Cadwalladr

The Nerve

Nation-state actors and ransomware groups dominated the headlines this week, with some critical vulnerabilities in widely-used software are also demanding attention from security teams.

#cybersecurity #vulnerabilities #ransomware #patching #cyberthreat

https://cybernewsweekly.substack.com/p/cybersecurity-news-review-week-11-066

Cybersecurity News Review - Week 11 (2026)

Nation-state actors and ransomware groups dominated the headlines this week, with some high-profile victims caught in the crossfire.

Cybersecurity News Weekly

Most people think the biggest cyber threat is a shadowy hacker in a hoodie.

After two decades investigating cyber criminals I can tell you the real answer is far more human.

The intelligence community has used a framework called M.I.C.E for decades to explain why people betray their country. I've spent years applying it to explain why people and organizations get compromised online.

M.I.C.E stands for: Money. Ideology. Curiosity. Ego.

These are the four core motivations behind virtually every cyber attack I've ever investigated. And understanding WHY an attacker acts changes everything about how you defend against them.

→ Money-motivated attackers move fast. Smash and grab.

→ Ideology-motivated attackers are patient. They'll wait months.

→ Curiosity-interest and inquisitiveness leaving to growth .

→ Ego-driven hackers want you to KNOW they were there.

Each motivation requires a completely different defensive posture.

That's the foundation of my new book: How MICE Threaten Cyber Security.

If you work in security, HR, risk, or lead a team - this framework will
change how you think about your threat landscape.

It's available now on Amazon. https://a.co/d/0awR4gNr

#cybercrime #CyberThreat #MICE

Critical Microsoft Excel bug weaponizes Copilot Agent for zero-click information disclosure attack

: Could steal sensitive personal and financial data

The Register

🚨 Intersport Rent — Alleged Data Breach

Actor "placenta" claims 1.2 million records exposed
📋 Email addresses, Genders, Loyalty numbers

⚠️ Unverified dark web claim — not independently confirmed.

Full analysis:
https://www.yazoul.net/intel/claim/2026-03-11-intersport-rent-database-leaked-download

#DarkWeb #InfoSec #CyberThreat

High: Dark Web Claim: Intersport Rent | Yazoul Intel

Dark web claim targeting Intersport Rent by placenta. 1.2 million records claimed.

Yazoul Security

In this month's meetup we have switched things a bit. We will have 1 long form talk with plenty of chances to discuss.

Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

RSVP fast as we are already filling up at https://buff.ly/G72uBEA

#cyberthreat #infrastructuresecurity #security #threatmodeling

ClawJacked attack let malicious websites hijack OpenClaw to steal data

Security researchers have disclosed a high-severity vulnerability dubbed "ClawJacked" in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally running instance and take control over it.

BleepingComputer

Финтех 2026: почему фраза «у нас всё защищено» стала самой опасной

Исследование само тут, можно забрать, там тоже с картинками 😍 Последние пару лет в разговорах с безопасниками и топами всё чаще звучит одна и та же мысль Мы перестали задаваться вопросом будет ли атака Мы начали думать что будет когда она произойдёт И это очень показательный сдвиг Финансовая отрасль всегда была мишенью Деньги данные инфраструктура доверие Всё в одном месте Но сейчас изменилось не только количество атак Изменилась их логика Если раньше злоумышленник пытался проникнуть в систему то теперь он пытается остановить бизнес И это совсем другой уровень игры

https://habr.com/ru/articles/1004834/

#security #information_security #information_security #information_security_management_act #ciso #cybersecurity #cybercrime #cyberthreat #cyberattack #fintech

Финтех 2026: почему фраза «у нас всё защищено» стала самой опасной

Привет ХАБР! Мнение по недавнему исследованию от ПТ и ФТ (с картинками - как Вы любите) Исследование само тут, можно забрать, там тоже с картинками ) Последние пару лет в разговорах с безопасниками и...

Хабр

Zero-day exploits dominated the cyber threat landscape in 2025, with critical flaws in React2Shell, Oracle EBS, and CitrixBleed 2 causing rapid, severe damage.

To help organizations stay ahead in 2026, Outpost24’s threat intelligence team highlights the year’s most impactful exploits and the actors behind them.

Read here: https://outpost24.com/blog/top-zero-day-exploits-2025/

#ZeroDay #Exploitation #CyberThreat

#SSHStalker new #Linux #Cyberthreat deploys scanners, malware, an IRC bot, and kernel exploits through a mass-compromise pipeline targeting Linux servers. #Linux admins enforce strong SSH passwords, apply patches, and restrict access through firewall policies.

https://www.securityweek.com/new-sshstalker-linux-botnet-uses-old-techniques/

New 'SSHStalker' Linux Botnet Uses Old Techniques

The SSHStalker Linux botnet has ensnared 7,000 systems, deploying various scanners and malware, an IRC bot, and multiple kernel exploits.

SecurityWeek