Friday Squid Blogging: Pyjama Squid - Schneier on Security
The small pyjama squid (Sepioloidea lineolata) produces toxic slime, âa rare example of a poisonous predatory mollusc.â As usual, you can also use this squid post to talk about the security stories in the news that I havenât covered.
Amazon, CrowdStrike, Google and Palo Alto Networks claim no change to threat intel sharing under Trump | CyberScoop
Top security leaders at some of the largest tech and cybersecurity vendors said public-private collaborative work continues, despite budget cuts and personnel changes.
Co-op confirms data theft after DragonForce ransomware claims attack
The Co-op cyberattack is far worse than initially reported, with the company now confirming that data was stolen for a significant number of current and past customers.
US indicts Yemeni man in Black Kingdom ransomware attacks
The U.S. Attorney's Office for the Central District of California announced charges against Rami Khaled Ahmed for allegedly helping to develop and deploy Black Kingdom, which infected âapproximately 1,500 computer systems."
Sooner or later, itâs going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think itâs worth thinking about the security of that now, while its still a nascent idea. In 2019, I joined Inrupt, a company that is commercializing Tim Berners-Leeâs open protocol for distributed data ownership. We are working on a digital wallet that can make use of AI in this way. (We used to call it an âactive wallet.â Now weâre calling it an âagentic wallet.â) I talked about this a bit at the RSA Conference...
Magento supply chain attack compromises hundreds of e-stores
A supply chain attack involving 21 backdoored Magento extensions has compromised between 500 and 1,000 e-commerce stores, including one belonging to a $40 billion multinational.
Salesforce expands model lineup in support of agentic AI
The software vendor added variations to its family of large action models for on-device implementation, limited GPU resources and industrial applications.
Ransomware attacks on food and agriculture industry have doubled in 2025
The uptick began in the fourth quarter of 2024 and continued into 2025, with the increases largely attributed to Clopâs exploitation of a popular file sharing service.
US indicts Black Kingdom ransomware admin for Microsoft Exchange attacks
A 36-year-old Yemeni national, who is believed to be the developer and primary operator of 'Black Kingdom' ransomware, has been indicted by the United States for conducting 1,500 attacks on Microsoft Exchange servers.
US wants to cut off key player in Southeast Asian cybercrime industry
The Treasury Department issued the proposed rulemaking Thursday, stating that Huione Group has helped launder funds from North Korean state-backed cybercrime operations and investment scams originating in Southeast Asia.
CISA Confirms Exploitation of SonicWall Vulnerabilities
The US Cybersecurity and Infrastructure Security Agency has added two flaws affecting SonicWall products to its catalog of Known Exploited Vulnerabilities
UK NCSC: Cyberattacks impacting UK retailers are a wake-up call
The United Kingdom's National Cyber Security Centre warned that ongoing cyberattacks impacting multiple UK retail chains should be taken as a "wake-up call."
Using AI to Operationalize Zero Trust in Multi-Cloud | CSA
The ability of AI to handle enormous data volumes and identify irregularities in real-time enables it to fill the gap across disparate Zero Trust architectures.
TikTok fined âŹ530 million for sending European user data to China
The Irish Data Protection Commission (DPC) has fined TikTok âŹ530 million (over $601 million) for illegally transferring the personal data of users in the European Economic Area (EEA) to China, violating the European Union's GDPR data protection regulations.
Harrods becomes latest retailer to announce attempted cyberattack
London retailer Harrods said it had ârecently experienced attempts to gain unauthorised access to some of our systemsâ but its security team "immediately took proactive steps to keep systems safe.â
NCSC Guidance on "Advanced Cryptography" - Schneier on Security
The UKâs National Cyber Security Centre just released its white paper on âAdvanced Cryptography,â which it defines as âcryptographic techniques for processing encrypted data, providing enhanced functionality over and above that provided by traditional cryptography.â It includes things like homomorphic encryption, attribute-based encryption, zero-knowledge proofs, and secure multiparty computation. Itâs full of good advice. I especially appreciate this warning: When deciding whether to use Advanced Cryptography, start with a clear articulation of the problem, and use that to guide the development of an appropriate solution. That is, you should not start with an Advanced Cryptography technique, and then attempt to fit the functionality it provides to the problem. ...
Explore how businesses can balance innovation with responsibility by adopting ethical AI practices that ensure fairness, transparency, and accountability.