Normal view
[webapps] mailcow 2025-01a - Host Header Password Reset Poisoning
[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow
[webapps] WeGIA 3.5.0 - SQL Injection
[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)
Google Cloud Security Threat Horizons Report #13 (H1 2026) Is Out!
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Cloud Threat Horizons Report, #13 (full version, no info to enter!) that we just released (the official blog for #1 report, my unofficial blogs for #2, #3, #4, #5, #6, #7, #8, #9, #10, #11 andΒ #12).
My favorite quotes from the report followΒ below:
- [in Google Cloud] βsoftware exploitation overtook credentials as the primary initial access vector for the first time.β and βThreat actors exploited third-party software-based entry (44.5%) more frequently than weak credentials.β [A.C.βββsome of you may say this is because AI is making more zero days, but a dozen more mundane answers may be correctΒ instead]

- βWhile threat actors continued to use brute-force attacks against weak credentials, the increase in RCE represents a pivot toward more automated exploitation of unpatched application-layer vulnerabilities.β [A.C.βββto some extent βcreds or vulnsβ debate is rather pointless as the real answer is βbothβ, and it varies by environment too, seeΒ below]
- βThreat actors continued to transition from traditional phishing to voice-based social engineering (vishing), and credential harvesting from third-party SaaS tokens to facilitate large-scale, silent data exfiltration.β [A.C.βββagain, this means βANDβ not βORβ because classic phishing still works well in many cases, but yes βcredential harvesting from third-party SaaSβ has become very fruitfulΒ too]
- [overall] Still βIdentity compromise underpinned 83% of compromises. [A.C.βββso, yes, βcredsβ still beat βvulnsβ on many environments]

- βHigh-volume data theft operationsβββexecuted through compromised but legitimate access channelsβββremained the primary goal for threat actors, with our metrics showing they targeted data in 73% of cloud-related incidents.β [A.C.βββagain, not new, but very useful data confirming the running trend.Β Beware!]
- βThe window between vulnerability disclosure and mass exploitation collapsed by an order of magnitude, from weeks to days.β [A.C.βββagain, some of you may see the invisible robot hand of an AI here, but, as usual, the reality is more complicatedβ¦]
- βTrend analysis from 2008β2025 indicates cloud services will soon surpass email as the primary data exfiltration pathway.β [A.C.βββ$32B reasons to finally get serious about it across allΒ clouds?]
- β45% of intrusions resulted in data theft without immediate extortion attempts at the time of the engagement, and these were often characterized by prolonged dwell times and stealthy persistence.β
- βThe traditional incident response model is no longer viable when dealing with containerized workloads and serverless architectures where data can vanish in seconds.β [A.C.βββa very useful reminder here! Cloud is cloudy! Donβt be that guy who thinks that cloud is a rented colo. Cloud is not JUST somebody elseβs computer.]
- βThreat actors used large language models (LLM) to automate credential harvesting and transition from a developerβs local environment to full cloud administration access.β [A.C.βββthis really should not be news for anybody in 2026, but if it is, HERE IS SOME NEWS: BAD GUYS USEΒ AI!]
- Thus βPrevent LLM exploitation as an extension of living-off-the-land (LOTL) by treating LLM activity with the same scrutiny as administrative command-line tools.β [A.C.βββor, as I say, βwith AI agents, every prompt injection is anΒ RCEβ]
Now, go and read the CTHR 13Β report!
Related posts:
- Google Cloud Security Threat Horizons Report #12 IsΒ Out!
- EP112 Threat HorizonsβββHow Google Does Threat Intelligence podcast
- Google Cloud Security Threat Horizons Report #11 IsΒ Out!
- Google Cloud Security Threat Horizons Report #10 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #9 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #8 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #7 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #6 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #5 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #4 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #3 IsΒ Out!
- Google Cybersecurity Action Team Threat Horizons Report #2 IsΒ Out!
- Illicit coin mining, ransomware, APTs target cloud users in firstΒ Google
- Cybersecurity Action Team Threat HorizonsΒ report
Google Cloud Security Threat Horizons Report #13 (H1 2026) Is Out! was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.
My Really Fun RSA 2026 Presentations!
This blog is perhaps a little bit more like an ad, so if you donβt want to check the ads, consider not readingΒ it.

But this year at RSA 2026, Iβm speaking on three topics: securing AI, using AI for SOC, and sharing lessons about how Google applies AI and other technologies toΒ D&R.
Here are these 3 funΒ things!
First, Iβm doing a presentation on governing shadow AI agents. Believe it or not, this presentation was created mostly before OpenClaw became a thing (but updated for it!). So you may be surprised how well the content aged (think wine!) Attend this if you are struggling with shadow AI, specifically shadow agents atΒ work.
Shadow Agents: A Pragmatistβs Guide to Governing Unsanctioned AIβββ[STR-W08]
- Wednesday, Mar 25 1:15 PMβββ2:05 PMΒ PDT
It is not the APT! The new threat is the βshadow AI agentsβ employees already use for work, leaking data and making decisions. Banning them is a losing game. This session will offer a better way: turn this organic behavior into a catalyst for secure progress. Learn to discover, assess, and channel unsanctioned agents into a formal strategy that empowers a team rather than force it underground.
The second is probably the most detailed discussion about how we use AI for detection and response at Google. You probably read our blogs and listen to our talks (especially this), but this time we are revealing a lot more interesting details about the machinery and also how we arrived at the state weβre in. I promise you this will be fun! And detailedΒ too.
This Is How We Do It: Building AI Agents for Cybersecurity and Defenseβββ[PART3-M07]
- Monday, Mar 23 2:20 PMβββ3:10 PMΒ PDT
Presenters will share the playbook for building and scaling AI agents in cybersecurity. Attendees will learn four core lessons: Building trust with the team, prioritizing real problems, measuring value, and establishing solid governance foundations for the agenticΒ SOC.
Finally, the third isnβt a presentation but a discussion that would help you understand the real state of AI in security operations / SOC. This would not be about the slides, but about sharing lessons on what works and whatΒ doesnβt.
AI in SecOps: Sharing Lessons Learned for Adoption Maturityβββ[CXN-R05]
- Thursday, Mar 26 12:20 PMβββ1:10 PMΒ PDT
Attendees in this peer-led discussion will share stories from the AI-powered SOC trenches. Explore real adoption journeys from manual processes to autonomous agents. Share practical use cases on analyst retraining, workflow auditing, malware analysis, remediation automation, RAG pipelines and more. Trade notes on whatβs working, whatβs breaking, trust gaps, AI hallucinations, and career redesign.
All in all, join me for securing AI and Shadow Agents, learning from Google about detection and response, and comparing the state of practice of AI in theΒ SOC.
See youΒ there!
P.S. Yes, we will also be podcasting from theΒ show.
Related:
RSA 2025: AIβs Promise vs. Securityβs PastβββA Reality Checkβ
My Really Fun RSA 2026 Presentations! was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.
Police arrests 651 suspects in African cybercrime crackdown
New 'Massiv' Android banking malware poses as an IPTV app
CPT Cybersecurity Conference
Name : CPT Cybersecurity Conference
Website: https://www.cpt.events/
Date: March 4-5, 2026
Location: Allianz Arena, Munich, Germany
CPT 2026: Connect. Protect. Transform.Join Germanyβs top voices for Cybersecurity at Munichβs Allianz Arena from March 4β5. Master NIS-2 compliance, AI resilience, and BSI standards through high-level networking and expert keynotes. Secure your strategy for the digital future.
CPT 2026: Strategic Resilience & Digital SovereigntyWho determines our digital future?Technological dependencies, data sovereignty, and AI-driven transformation are no longer abstract conceptsβthey are the decisive factors for Europeβs future. At CPT 2026, we bring together the leading voices of the Munich cybersecurity ecosystem to move from reactive implementation to active sovereignty.
The Key QuestionsIn the heart of Munichβs tech hub, we address the core challenges of our industry:
- How can we preserve digital sovereignty while maintaining global connectivity?
- How much technological dependency is unavoidable β and what are the strategic consequences?
- Who sets the rulesβ governments, global corporations, or the specialized expertise within our network?
Why You Should AttendCPT 2026 acts as a high-level summit for 400 selected decision-makers and experts, creating a space for perspectives that rarely meet directly.
- Eye-Level Dialogue: Engage with Claudia Plattner (BSI), Dunja Hayali, Uli HoeneΓ and top industry leaders.
- Knowledge Advantage: 16 interactive Masterclasses (e.g., AI liability, BSI-C5 standards) and 4 panel discussions.
- Network & Connect: Strengthen your ties within the Munich Cybersecurity Network and build lasting relationships with technology and policy experts.
Secure your place at the centre of the dialogue and establish your lead in the 2026 transformation.Get your ticket: https://www.cpt.events/
The post CPT Cybersecurity Conference appeared first on CISO MAG | Cyber Security Magazine.
Critical infra Honeywell CCTVs vulnerable to auth bypass flaw
AI platforms can be abused for stealthy malware communication
Telegram channels expose rapid weaponization of SmarterMail flaws
Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages
-
Data and computer security | The Guardian

- Stone, parchment or laser-written glass? Scientists find new way to preserve data
Stone, parchment or laser-written glass? Scientists find new way to preserve data
Hard disks and magnetic tape have a limited lifespan, but glass storage developed by Microsoft could last millennia
Some cultures used stone, others used parchment. Some even, for a time, used floppy disks. Now scientists have come up with a new way to keep archived data safe that, they say, could endure for millennia: laser-writing in glass.
From personal photos that are kept for a lifetime to business documents, medical information, data for scientific research, national records and heritage data, there is no shortage of information that needs to be preserved for very long periods of time.
Continue reading...
Β© Photograph: Tetra Images/Erik Isakson/Getty Images

Β© Photograph: Tetra Images/Erik Isakson/Getty Images

Β© Photograph: Tetra Images/Erik Isakson/Getty Images

