๐Ÿ› Faster Bugs, Same Backlog โ€” #Mythos Preview found thousands of zero-days across every major OS and browser in a matter of weeks. Anthropic was nervous enough about it to not release it publicly. That's notable. What's also notable is that "thousands of critical vulnerabilities" describes a perfectly ordinary patch Tuesday for most security teams โ€” the backlog isn't new, the speed is.

The uncomfortable truth Project #Glasswing surfaces isn't that attackers are about to get a superpower (they are), it's that defenders have been relying on a fundamentally broken triage model for years. CVSS 10 gets the fire drill. The exploitable CVSS 6 sitting on an internet-facing legacy box gets the backlog. That gap is the actual attack surface. AI-accelerated discovery doesn't fix it โ€” it just makes it more expensive to ignore.

โ†’ Week #16/2026 also covers: AI vishing platforms hit the cybercrime market, NIST quietly caps CVE coverage, and Russia goes after a Swedish power grid.

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-16-2026-faster-bugs-same-backlog

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ #infosecMASHUP #cybersecurity #infosec #threatintel #AI

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 16/2026 - Faster Bugs, Same Backlog

Plus: AI vishing platforms hit the cybercrime market, NIST quietly caps CVE coverage, and Russia goes after a Swedish power grid.

Xโ€™s InfoSec Newsletter

Cybercrime losses hit $20.9 billion in 2025 โ€” a 26% jump, per the FBI's IC3 report. That figure covers only what victims bothered to report, so treat it as a floor, not a ceiling. This week's issue arrives alongside a proposal to cut CISA's budget by $707 million. Whether that's a bold strategic bet or a spectacular misread of the moment is, apparently, still under debate.

โ†’ Week #15/2026 also covers:

REvil's alleged leader unmasked, Adobe Reader zero-day since December, and the most uncomfortable job interview you'll watch this week.

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-15-2026-budgets-cut-breaches-climbing

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ

#infosecMASHUP #cybersecurity #infosec #threatintel #AI

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 15/2026 - Budgets Cut, Breaches Climbing

Plus: REvil's alleged leader unmasked, Adobe Reader zero-day since December, and the most uncomfortable job interview you'll watch this week

Xโ€™s InfoSec Newsletter

RSA Conference was in full swing in San Francisco this week โ€” booths, buzzwords, and billion-dollar pitches as far as the eye can see. Meanwhile, out in the real world, threat actors didn't get the memo. Iran-linked hackers are using Telegram to hunt down dissidents and journalists, while TeamPCP's supply chain worm is deploying Kubernetes wipers that specifically target Iranian clusters. Two sides of the same geopolitical coin, playing out in parallel โ€” and neither one is buying a vendor badge.

โ†’ Week #13/2026 also covers:

๐Ÿชฑ TeamPCP's worm ;

๐Ÿ‡ฎ๐Ÿ‡ฑ ๐Ÿ‡ฎ๐Ÿ‡ท Iran's hacked cameras ;

๐Ÿ†™ โœ… A Tycoon 2FA that just won't die ;

โŒ ๐Ÿ‡บ๐Ÿ‡ธ The FCC has banned the sale of new consumer routers made outside the USA;

๐Ÿ’ฐ๏ธ #OpenAI launched a public safety bug bounty for #AI-specific abuse and safety risks;

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-13-2026-rsa-week-real-world-problems

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ #infosecMASHUP #cybersecurity #infosec #threatintel

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 13/2026 - RSA Week, Real World Problems

Plus: TeamPCP's worm, Iran's hacked cameras, and a Tycoon 2FA that just won't die. The real RSA keynotes.

Xโ€™s InfoSec Newsletter

๐Ÿ‘‹ Writing this from San Diego ๐Ÿ‡บ๐Ÿ‡ธ โ€” about as far from my Swiss desk as a timezone can stretch. But the news didn't care about my travel schedule.

If there's one thread running through this week, it's Iran: Boggy Serpens refining its AI-enhanced espionage playbook, an attempted intrusion at Poland's nuclear research center with Iranian fingerprints, the EU hitting Iranian entities with fresh sanctions โ€” and Iran's own population cut off from the internet for over two weeks now. Stryker is still cleaning up from last week's Handala attack too. A lot of activity from a lot of pro-Iran actors in one week.

โ†’ Week #12/2026 also covers:

๐Ÿชฑ GlassWorm escalates its supply chain campaign,

๐Ÿ‡ช๐Ÿ‡บ ๐Ÿ—ณ๏ธ EU votes to ban mass message scanning,

๐Ÿค“ ๐Ÿ‡ฌ๐Ÿ‡ง A witness blamed ChatGPT for his smartglasses

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-12-2026-iran-is-everywhere-this-week

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ

#infosecMASHUP #cybersecurity #infosec #threatintel

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 12/2026 - Iran Is Everywhere This Week

Plus: GlassWorm escalates its supply chain campaign, EU votes to ban mass message scanning, a witness blamed ChatGPT for his smartglasses

Xโ€™s InfoSec Newsletter

When bombs fall, keyboards follow. The #Handala attack on #Stryker โ€” 200,000 systems claimed wiped, 50TB stolen, timed explicitly to the US-Israeli assault on Iran โ€” is textbook retaliation hacktivist logic. But here's the thing nobody wants to say out loud: it barely matters whether the group is genuinely aggrieved civilians or a state front wearing a keffiyeh. The effect is identical. The deniability is the point.

Governments have learned that a "spontaneous" hacktivist campaign does more reputational work than an official cyberunit ever could โ€” and when the targeting is this clean, "spontaneous" deserves serious scare quotes. We saw it with pro-Russian groups after #Ukraine. We saw it with pro-Palestinian groups after #Gaza. We're seeing it again now with #Iran. The pattern is consistent enough to be a doctrine at this point.

What makes it strategically interesting โ€” and analytically treacherous โ€” is the deliberate ambiguity it manufactures. A group claiming to represent bombed civilians carries far more narrative weight than one that's transparently state-linked. Attribution becomes a second-order problem: even if the group is genuinely independent, states benefit from the chaos and quietly let it run. Sometimes they seed it. Sometimes they just watch. The outcome for the victim is the same either way.

The targeting logic follows a reliable playbook too. Not purely military or intelligence targets โ€” those carry too much legal and escalatory risk. Instead: corporations with visible ties to the aggressor country, ideally ones with symbolic weight or defense adjacency. #Stryker, with its $450M U.S. military contract and the same name as an Army armored carrier, checked every box. The selection wasn't random. It was a message dressed as an attack.

For defenders, none of this is new โ€” but the tempo is accelerating. Geopolitical flashpoints are now predictable threat amplifiers with a measurable lag between event and campaign. Your company's government contracts, your country of incorporation, your defense-adjacent partnerships โ€” these are part of your attack surface whether you've modelled them that way or not. The groups carrying the flag may be real, fake, or somewhere in the uncomfortable middle. It doesn't matter. The wiper doesn't care about the ideology behind it.

โ†’ Week #11/2026 also covers:

๐Ÿ‡บ๐Ÿ‡ธ FBI hacked,

๐Ÿ‡จ๐Ÿ‡ณ Salt Typhoon goes global,

๐Ÿคฏ ๐Ÿ”“๏ธ ๐Ÿ’ฌ #Instagram dropping E2E encryption

๐Ÿค– โฑ๏ธ An #AI agent hacked McKinsey's #chatbot in two hours.

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-11-2026-when-bombs-fall-keyboards-follow

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ #infosecMASHUP #cybersecurity #infosec #threatintel

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 11/2026 - When Bombs Fall, Keyboards Follow

Plus: FBI hacked, Salt Typhoon goes global, Instagram dropping E2E encryption, and an AI agent hacked McKinsey's chatbot in two hours

Xโ€™s InfoSec Newsletter

War makes excellent phishing bait. It also gives politically motivated threat actors a reason to double down. This week had both, plus:

๐Ÿ™Š #Anthropic CEO responds to #Trump order and #Pentagon clash,

๐Ÿ”“๏ธ #Quantum threatens RSA-2048,

๐Ÿชฑ A #Wikipedia worm,

๐Ÿ‡จ๐Ÿ‡ฆ 38M Canadian Tire accounts, and

๐Ÿ‡ช๐Ÿ‡บ ๐ŸŽฃ Europol kills a #phishing factory.

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-10-2026-they-don-t-need-new-malware-they-just-need-the-news

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ #infosecMASHUP #cybersecurity #infosec #threatintel

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 10/2026 - They don't need new malware. They just need the news.

Plus: Quantum threatens RSA-2048, 38M Canadian Tire accounts, and Europol kills a phishing factory.

Xโ€™s InfoSec Newsletter

This week's signal: Predator #spyware bypasses #iOS camera/mic indicators โ€” that green dot means nothing if you're compromised;

โ†’ Week #09/2026 also covers:

๐Ÿ”“ Conduent #breach: 25M people's data exposed;

๐Ÿ‡ฐ๐Ÿ‡ต #Lazarus goes #ransomware with Medusa;

โฑ๏ธ #CrowdStrike: avg attacker breakout time now 29 minutes;

๐Ÿค– #Anthropic drops core #AI safety pledge & stands firm against Pentagon;

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-09-2026-your-iphone-has-a-green-dot-predator-doesn-t-care

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ #infosecMASHUP #cybersecurity #infosec #threatintel

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 09/2026 - Your iPhone has a green dot. Predator doesn't care.

Plus: Conduent exposes 25M, Lazarus goes ransomware, Anthropic relaxes core AI safety pledge, while refusing to bend to Pentagon on AI safeguards, and breakout times hit 29 minutes.

Xโ€™s InfoSec Newsletter

This week's signal: attackers aren't hacking in โ€” they're logging in. Identity-based techniques accounted for nearly two-thirds of initial intrusions last year, per Palo Alto Networks Unit 42's latest IR report.

โ†’ Week #08/2026 also covers:

๐Ÿ‡ซ๐Ÿ‡ท ๐Ÿฆ Franceโ€™s Ministry of Economy disclosed a breach that exposed 1.2 million accounts:

๐ŸŒ๏ธ African police arrested 651 suspects in a coordinated INTERPOL operation against investment fraud;

๐Ÿ”Ž Anthropic launched Claude Code Security, an hashtag#AI tool that scans code for hashtag#vulnerabilities and suggests fixes;

Full issue ๐Ÿ‘‰ https://infosec-mashup.santolaria.net/p/infosec-mashup-08-2026-credentials-beat-exploits-in-2025

If you find it useful, subscribe to get it in your inbox every weekend ๐Ÿ“จ #infosecMASHUP #cybersecurity #infosec

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 08/2026

Multiple Password Managers Vulnerable to Vault Compromise Under Malicious Server;

Xโ€™s InfoSec Newsletter

๐Ÿ”ฅ Latest issue of my curated #cybersecurity and #infosec list of resources for week #07/2026 is out!

As #AI tools become the fastest, cheapest way to get medical advice, a quiet gap is opening in how our most sensitive data is protected. Many AI-powered health assistants โ€” built by companies like #OpenAI, #Anthropic, and #Google โ€” operate outside traditional healthcare regulations such as HIPAA. The result: deeply personal health data may be handled under consumer-tech #privacy standards, not medical ones.

This isnโ€™t just a #healthcare story. Itโ€™s a pattern weโ€™re seeing across industries and geographies: AI systems moving faster than the regulations designed for the roles theyโ€™re now playing. From #finance to #education, from #HR to legal advice, AI increasingly acts like a regulated professional โ€” without always being treated like one under the law.

As convenience wins and guardrails lag, this weekโ€™s news raises a familiar infosec question: when technology changes the function, but regulation still defines the form, where does accountability really sit?

โ†’ Letโ€™s now dive into this weekโ€™s top insights! It includes the following and much more:

๐Ÿ‡ช๐Ÿ‡บ ๐Ÿ‘€ European Commission Investigating Cyberattack;

๐Ÿ‡ท๐Ÿ‡ด ๐Ÿ›ข๏ธ Romania's oil pipeline operator Conpet confirmed it was hit by a Qilin ransomware attack;

๐Ÿฆž ๐Ÿฆ  #OpenClaw Integrates #VirusTotal Scanning to Detect Malicious #ClawHub Skills;

๐Ÿ›‘ ๐Ÿ’ฌ ๐Ÿ‡ท๐Ÿ‡บ #Russia is trying to fully block #WhatsApp;

๐Ÿ‡ฐ๐Ÿ‡ท ๐Ÿ’ Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches;

๐Ÿ‡ช๐Ÿ‡บ ๐Ÿค The EU gave unconditional approval for Googleโ€™s $32 billion buyout of cloud security firm #Wiz

--
๐Ÿ‘‰ NEVER MISS my curations and updates on information security and cybersecurity news and challenges ๐Ÿ“จ Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end โฌ‡๏ธ

https://infosec-mashup.santolaria.net/p/infosec-mashup-07-2026

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 07/2026

European Commission Investigating Cyberattack; OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills; Russia is trying to fully block WhatsApp; Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches;

Xโ€™s InfoSec Newsletter

๐Ÿ”ฅ Latest issue of my curated #cybersecurity and #infosec list of resources for week #06/2026 is out!

This weekโ€™s #AI zeitgeist didnโ€™t just spawn memes โ€” it exposed real, systemic risks at the intersection of autonomy, identity, and trust. On one front, a critical vulnerability in the selfโ€‘hosted AI assistant #OpenClaw ๐Ÿฆž (previously Clawdbot/Moltbot) allowed attackers to steal authentication tokens and achieve remote code execution via a single malicious link โ€” a classic web attack chain repurposed against an AI agent ecosystem. The flaw (tracked as CVEโ€‘2026โ€‘25253) hinged on improper origin validation in OpenClawโ€™s local gateway, letting a crafted page trigger a token leak and session hijack before it was patched.

At the same time, #Moltbook โ€” a Redditโ€‘style social network exclusively for AI agents โ€” went viral, attracting millions of registered bots and widespread fascination about the idea of autonomous digital actors forming โ€œmachine societies.โ€ But the hype masked serious cybersecurity failures: misconfigured backends exposed millions of API keys, agent tokens, and private messages to unauthenticated access, and researchers found prompt injection and botโ€‘toโ€‘bot social engineering risks that could propagate malicious instructions through the agent population.

These two developments are linked by more than branding. They illustrate a converging threat landscape where:

  • Autonomous agents operate with deep system access,

  • Shared agent ecosystems become new attack surfaces, and

  • Viral prompt sharing and AIโ€‘toโ€‘AI networks can amplify hidden exploits.

Itโ€™s a reminder that even as AI autonomy grabs attention, the fundamentals of cybersecurity: protecting data, accounts, and trust boundaries โ€” remain as crucial as ever. Because before we debate sentience, we need to secure the agents we already deployed.

โ†’ Letโ€™s now dive into this weekโ€™s top insights! It includes the following and much more:

๐Ÿ—’๏ธ ๐Ÿ‡จ๐Ÿ‡ณ Notepad++ was hit by a supply-chain attack

๐Ÿ“ค๏ธ Newsletter platform #Substack notifies users of #databreach;

๐Ÿ‡ซ๐Ÿ‡ท French prosecutors raid X offices, summon #Musk over #Grok #deepfakes;

๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‘€ Homeland Security is trying to force tech companies to hand over data about Trump critics;

๐Ÿ‡ท๐Ÿ‡บ Russian-state hackers quickly exploited a critical #Microsoft Office flaw (CVE-2026-21509) within 48 hours of a patch;

๐Ÿ‡ณ๐Ÿ‡ด ๐Ÿ‡จ๐Ÿ‡ณ Chinaโ€™s Salt Typhoon hackers broke into Norwegian companies;

--

๐Ÿ‘‰ NEVER MISS my curations and updates on information security and cybersecurity news and challenges ๐Ÿ“จ Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end โฌ‡๏ธ

https://infosec-mashup.santolaria.net/p/infosec-mashup-06-2026

๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ [InfoSec MASHUP] 06/2026

French prosecutors raid X offices, summon Musk over Grok deepfakes; Homeland Security is trying to force tech companies to hand over data about Trump critics; Security incident on Plone GitHub org; Russian-state hackers quickly exploited a critical Microsoft Office flaw (CVE-2026-21509) within 48 hours of a patch; Newsletter platform Substack notifies users of data breach; Chinaโ€™s Salt Typhoon hackers broke into Norwegian companies;

Xโ€™s InfoSec Newsletter