<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security July 2025</title>
	<atom:link href="http://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 15:53:53 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-3/#comment-1860919</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 27 Aug 2025 13:53:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1860919</guid>
		<description><![CDATA[Hayden Field / The Verge:
Anthropic&#039;s Threat Intelligence report for August says Claude was weaponized for sophisticated cybercrimes, including a “vibe-hacking” data extortion scheme

‘Vibe-hacking’ is now a top AI threat
https://www.theverge.com/ai-artificial-intelligence/766435/anthropic-claude-threat-intelligence-report-ai-cybersecurity-hacking

Anthropic’s new report shows how bad actors are misusing Claude —and, likely, other AI agents.

“Agentic AI systems are being weaponized.”

That’s one of the first lines of Anthropic’s new Threat Intelligence report, out today, which details the wide range of cases in which Claude — and likely many other leading AI agents and chatbots — are being abused.

First up: “Vibe-hacking.” One sophisticated cybercrime ring that Anthropic says it recently disrupted used Claude Code, Anthropic’s AI coding agent, to extort data from at least 17 different organizations around the world within one month. The hacked parties included healthcare organizations, emergency services, religious institutions, and even government entities.

“If you’re a sophisticated actor, what would have otherwise required maybe a team of sophisticated actors, like the vibe-hacking case, to conduct — now, a single individual can conduct, with the assistance of agentic systems,” Jacob Klein, head of Anthropic’s threat intelligence team, told The Verge in an interview. He added that in this case, Claude was “executing the operation end-to-end.”]]></description>
		<content:encoded><![CDATA[<p>Hayden Field / The Verge:<br />
Anthropic&#8217;s Threat Intelligence report for August says Claude was weaponized for sophisticated cybercrimes, including a “vibe-hacking” data extortion scheme</p>
<p>‘Vibe-hacking’ is now a top AI threat<br />
<a href="https://www.theverge.com/ai-artificial-intelligence/766435/anthropic-claude-threat-intelligence-report-ai-cybersecurity-hacking" rel="nofollow">https://www.theverge.com/ai-artificial-intelligence/766435/anthropic-claude-threat-intelligence-report-ai-cybersecurity-hacking</a></p>
<p>Anthropic’s new report shows how bad actors are misusing Claude —and, likely, other AI agents.</p>
<p>“Agentic AI systems are being weaponized.”</p>
<p>That’s one of the first lines of Anthropic’s new Threat Intelligence report, out today, which details the wide range of cases in which Claude — and likely many other leading AI agents and chatbots — are being abused.</p>
<p>First up: “Vibe-hacking.” One sophisticated cybercrime ring that Anthropic says it recently disrupted used Claude Code, Anthropic’s AI coding agent, to extort data from at least 17 different organizations around the world within one month. The hacked parties included healthcare organizations, emergency services, religious institutions, and even government entities.</p>
<p>“If you’re a sophisticated actor, what would have otherwise required maybe a team of sophisticated actors, like the vibe-hacking case, to conduct — now, a single individual can conduct, with the assistance of agentic systems,” Jacob Klein, head of Anthropic’s threat intelligence team, told The Verge in an interview. He added that in this case, Claude was “executing the operation end-to-end.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-3/#comment-1858649</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 31 Jul 2025 14:27:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858649</guid>
		<description><![CDATA[Australia aikoo kieltää alle 16-vuotiailta pääsyn videopalvelu Youtubeen. Asiasta kertoo viestintäministeri Anika Wells. Ministerin mukaan hallinto haluaa suojella lapsia haitallisilta algoritmeilta.

Australia täräyttää kovan kiellon alle 16-vuotiaille
https://www.is.fi/digitoday/art-2000011395401.html]]></description>
		<content:encoded><![CDATA[<p>Australia aikoo kieltää alle 16-vuotiailta pääsyn videopalvelu Youtubeen. Asiasta kertoo viestintäministeri Anika Wells. Ministerin mukaan hallinto haluaa suojella lapsia haitallisilta algoritmeilta.</p>
<p>Australia täräyttää kovan kiellon alle 16-vuotiaille<br />
<a href="https://www.is.fi/digitoday/art-2000011395401.html" rel="nofollow">https://www.is.fi/digitoday/art-2000011395401.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-3/#comment-1858624</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 23:57:49 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858624</guid>
		<description><![CDATA[Incredibly, confirmation of the US military’s “assume breach” alert had to be dragged out of the Department of Defense via Freedom of Information Act requests by a campaigning non-profit called Property of the People.
https://www.telegraph.co.uk/business/2025/07/28/chinese-hackers-seized-control-how-let-it-happen/
These developments are the latest stage in an ongoing state-sponsored Chinese campaign, in which hacking has evolved from widespread commercial espionage a decade ago into something far more threatening.]]></description>
		<content:encoded><![CDATA[<p>Incredibly, confirmation of the US military’s “assume breach” alert had to be dragged out of the Department of Defense via Freedom of Information Act requests by a campaigning non-profit called Property of the People.<br />
<a href="https://www.telegraph.co.uk/business/2025/07/28/chinese-hackers-seized-control-how-let-it-happen/" rel="nofollow">https://www.telegraph.co.uk/business/2025/07/28/chinese-hackers-seized-control-how-let-it-happen/</a><br />
These developments are the latest stage in an ongoing state-sponsored Chinese campaign, in which hacking has evolved from widespread commercial espionage a decade ago into something far more threatening.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-2/#comment-1858623</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 23:56:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858623</guid>
		<description><![CDATA[An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house. (Not sure about Iraq&#039;s Nuclear program see typo)

What it means is that no system connected to the internet can be defended.

Our own national cybersecurity agency asked UK businesses to make this presumption in 2020. The reason this hasn’t been bigger news is that we’ve become fatalistic and weary, as one cybersecurity attack follows another.

Andrew Orlowski
Chinese hackers have seized control. How did we let this happen?
The complacency of the great and good of IT has left the West horribly exposed to Beijing
https://www.telegraph.co.uk/business/2025/07/28/chinese-hackers-seized-control-how-let-it-happen/

A civilisation that cannot defend itself really should not expect to survive, and after the latest cybersecurity news, I wonder how it can.

An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house.

Microsoft has warned that hackers linked to Beijing are exploiting the flaw, while Britain’s National Cyber Security Centre has said organisations in the UK have also been hit.

The flaw allows hackers to remotely run software code on victims’ servers, potentially allowing them to install malicious software and steal data.

According to Bloomberg, which reported the breach, no sensitive information is believed to have been stolen in the hack on the NNSA.

A spokesman for the US energy department said it was “minimally impacted” by the hack last Friday.

It is unclear whether Chinese hackers are responsible for the nuclear agency attack.

However, Microsoft has alleged that China-linked groups dubbed Linen Typhoon, Violet Typhoon and Storm-2603 have been exploiting the software vulnerability.

“It seems logical that it would be the Chinese,” 

The flaw disproportionately targets government agencies since they are more likely to run Microsoft software on their own servers. Many companies run the software on Microsoft’s cloud, which has not been affected by the attacks.




https://www.telegraph.co.uk/business/2025/07/23/chinese-hackers-suspected-americas-nuclear-weapons-agency/]]></description>
		<content:encoded><![CDATA[<p>An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house. (Not sure about Iraq&#8217;s Nuclear program see typo)</p>
<p>What it means is that no system connected to the internet can be defended.</p>
<p>Our own national cybersecurity agency asked UK businesses to make this presumption in 2020. The reason this hasn’t been bigger news is that we’ve become fatalistic and weary, as one cybersecurity attack follows another.</p>
<p>Andrew Orlowski<br />
Chinese hackers have seized control. How did we let this happen?<br />
The complacency of the great and good of IT has left the West horribly exposed to Beijing<br />
<a href="https://www.telegraph.co.uk/business/2025/07/28/chinese-hackers-seized-control-how-let-it-happen/" rel="nofollow">https://www.telegraph.co.uk/business/2025/07/28/chinese-hackers-seized-control-how-let-it-happen/</a></p>
<p>A civilisation that cannot defend itself really should not expect to survive, and after the latest cybersecurity news, I wonder how it can.</p>
<p>An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house.</p>
<p>Microsoft has warned that hackers linked to Beijing are exploiting the flaw, while Britain’s National Cyber Security Centre has said organisations in the UK have also been hit.</p>
<p>The flaw allows hackers to remotely run software code on victims’ servers, potentially allowing them to install malicious software and steal data.</p>
<p>According to Bloomberg, which reported the breach, no sensitive information is believed to have been stolen in the hack on the NNSA.</p>
<p>A spokesman for the US energy department said it was “minimally impacted” by the hack last Friday.</p>
<p>It is unclear whether Chinese hackers are responsible for the nuclear agency attack.</p>
<p>However, Microsoft has alleged that China-linked groups dubbed Linen Typhoon, Violet Typhoon and Storm-2603 have been exploiting the software vulnerability.</p>
<p>“It seems logical that it would be the Chinese,” </p>
<p>The flaw disproportionately targets government agencies since they are more likely to run Microsoft software on their own servers. Many companies run the software on Microsoft’s cloud, which has not been affected by the attacks.</p>
<p><a href="https://www.telegraph.co.uk/business/2025/07/23/chinese-hackers-suspected-americas-nuclear-weapons-agency/" rel="nofollow">https://www.telegraph.co.uk/business/2025/07/23/chinese-hackers-suspected-americas-nuclear-weapons-agency/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-2/#comment-1858609</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 19:12:27 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858609</guid>
		<description><![CDATA[Lenovo has released urgent BIOS updates and warned about high-severity flaws that allow privileged local attackers to gain complete control of systems

#Lenovo #cybersecurity

Major flaws found in Lenovo BIOS: attackers can take over systems
https://cybernews.com/security/lenovo-warns-about-major-bios-flaws/?utm_source=cn_facebook&amp;utm_medium=social&amp;utm_campaign=cybernews&amp;utm_content=post&amp;source=cn_facebook&amp;medium=social&amp;campaign=cybernews&amp;content=post

Lenovo has released urgent BIOS updates and warned about high-severity flaws that allow privileged local attackers to gain complete control of systems. Some updates are still pending.

Six newly discovered vulnerabilities are affecting Lenovo computers with BIOS from Insyde Software, a global provider of system firmware and software engineering services.

“Potential vulnerabilities were reported in Insyde BIOS used in some Lenovo IdeaCentre and Yoga All-In-One products that could allow a privileged local attacker to read SMRAM contents or execute arbitrary code in System Management Mode (SMM),” the Lenovo advisory reads.

https://support.lenovo.com/us/en/product_security/LEN-201013]]></description>
		<content:encoded><![CDATA[<p>Lenovo has released urgent BIOS updates and warned about high-severity flaws that allow privileged local attackers to gain complete control of systems</p>
<p>#Lenovo #cybersecurity</p>
<p>Major flaws found in Lenovo BIOS: attackers can take over systems<br />
<a href="https://cybernews.com/security/lenovo-warns-about-major-bios-flaws/?utm_source=cn_facebook&#038;utm_medium=social&#038;utm_campaign=cybernews&#038;utm_content=post&#038;source=cn_facebook&#038;medium=social&#038;campaign=cybernews&#038;content=post" rel="nofollow">https://cybernews.com/security/lenovo-warns-about-major-bios-flaws/?utm_source=cn_facebook&#038;utm_medium=social&#038;utm_campaign=cybernews&#038;utm_content=post&#038;source=cn_facebook&#038;medium=social&#038;campaign=cybernews&#038;content=post</a></p>
<p>Lenovo has released urgent BIOS updates and warned about high-severity flaws that allow privileged local attackers to gain complete control of systems. Some updates are still pending.</p>
<p>Six newly discovered vulnerabilities are affecting Lenovo computers with BIOS from Insyde Software, a global provider of system firmware and software engineering services.</p>
<p>“Potential vulnerabilities were reported in Insyde BIOS used in some Lenovo IdeaCentre and Yoga All-In-One products that could allow a privileged local attacker to read SMRAM contents or execute arbitrary code in System Management Mode (SMM),” the Lenovo advisory reads.</p>
<p><a href="https://support.lenovo.com/us/en/product_security/LEN-201013" rel="nofollow">https://support.lenovo.com/us/en/product_security/LEN-201013</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-2/#comment-1858604</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 16:20:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858604</guid>
		<description><![CDATA[Major air traffic control outage grounds flights across London
Traffic control issues have grounded planes in the London area, including at Heathrow airport
https://www.independent.co.uk/travel/news-and-advice/air-traffic-control-down-heathrow-gatwick-flights-latest-news-b2798976.html?utm_medium=social&amp;utm_source=facebook&amp;utm_campaign=picturepost&amp;fbclid=IwY2xjawL3HWtleHRuA2FlbQIxMQABHve68gzzQUh9QZciZWrAoIMdXDjSd2YeuuwwvRkY9lu-n5yLi4givK0PngBh_aem_15PzxiIuGUJMyyBGOSwRqg

Major delays have been reported to flights in the UK due to traffic control issues, grounding planes in the London area.

In a statement, Gatwick Airport said the technical issue meant there are currently no departures while the situation is being resolved.]]></description>
		<content:encoded><![CDATA[<p>Major air traffic control outage grounds flights across London<br />
Traffic control issues have grounded planes in the London area, including at Heathrow airport<br />
<a href="https://www.independent.co.uk/travel/news-and-advice/air-traffic-control-down-heathrow-gatwick-flights-latest-news-b2798976.html?utm_medium=social&#038;utm_source=facebook&#038;utm_campaign=picturepost&#038;fbclid=IwY2xjawL3HWtleHRuA2FlbQIxMQABHve68gzzQUh9QZciZWrAoIMdXDjSd2YeuuwwvRkY9lu-n5yLi4givK0PngBh_aem_15PzxiIuGUJMyyBGOSwRqg" rel="nofollow">https://www.independent.co.uk/travel/news-and-advice/air-traffic-control-down-heathrow-gatwick-flights-latest-news-b2798976.html?utm_medium=social&#038;utm_source=facebook&#038;utm_campaign=picturepost&#038;fbclid=IwY2xjawL3HWtleHRuA2FlbQIxMQABHve68gzzQUh9QZciZWrAoIMdXDjSd2YeuuwwvRkY9lu-n5yLi4givK0PngBh_aem_15PzxiIuGUJMyyBGOSwRqg</a></p>
<p>Major delays have been reported to flights in the UK due to traffic control issues, grounding planes in the London area.</p>
<p>In a statement, Gatwick Airport said the technical issue meant there are currently no departures while the situation is being resolved.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-2/#comment-1858590</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 10:33:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858590</guid>
		<description><![CDATA[Tekninen häiriö sekoitti pörssi­kursseja
Sijoittaminen&#124;Nasdaq Nordic kertoo Kauppalehdelle peruvansa kaikki kello 18 jälkeen tehdyt toimeksiannot Helsingin, Tukholman ja Islannin pörsseissä.
https://www.hs.fi/talous/art-2000011395169.html?fbclid=IwZXh0bgNhZW0CMTEAAR67xwC0f0hbl32HtL0vwOK4CKVyUhY8s6SrCDnGHoxaVMg9fFx_PRO5rWrgdg_aem_OGMY_wWN9kJ81OIX6P08qA]]></description>
		<content:encoded><![CDATA[<p>Tekninen häiriö sekoitti pörssi­kursseja<br />
Sijoittaminen|Nasdaq Nordic kertoo Kauppalehdelle peruvansa kaikki kello 18 jälkeen tehdyt toimeksiannot Helsingin, Tukholman ja Islannin pörsseissä.<br />
<a href="https://www.hs.fi/talous/art-2000011395169.html?fbclid=IwZXh0bgNhZW0CMTEAAR67xwC0f0hbl32HtL0vwOK4CKVyUhY8s6SrCDnGHoxaVMg9fFx_PRO5rWrgdg_aem_OGMY_wWN9kJ81OIX6P08qA" rel="nofollow">https://www.hs.fi/talous/art-2000011395169.html?fbclid=IwZXh0bgNhZW0CMTEAAR67xwC0f0hbl32HtL0vwOK4CKVyUhY8s6SrCDnGHoxaVMg9fFx_PRO5rWrgdg_aem_OGMY_wWN9kJ81OIX6P08qA</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-2/#comment-1858557</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Jul 2025 15:32:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858557</guid>
		<description><![CDATA[It-tuki antoi salasanat rikollisille
23.7.202518:40
Kyberhyökkäys aiheutti yhtiölle 380 miljoonan dollarin vahingot.
https://www.mikrobitti.fi/uutiset/a/6f5e1475-c392-4a78-bd7a-6f6a2c82636d]]></description>
		<content:encoded><![CDATA[<p>It-tuki antoi salasanat rikollisille<br />
23.7.202518:40<br />
Kyberhyökkäys aiheutti yhtiölle 380 miljoonan dollarin vahingot.<br />
<a href="https://www.mikrobitti.fi/uutiset/a/6f5e1475-c392-4a78-bd7a-6f6a2c82636d" rel="nofollow">https://www.mikrobitti.fi/uutiset/a/6f5e1475-c392-4a78-bd7a-6f6a2c82636d</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-2/#comment-1858556</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Jul 2025 15:32:05 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858556</guid>
		<description><![CDATA[The most industry-trusted compliance and security platform
Meet with a Vanta expert who will listen and learn about your business needs

Get full visibility into the Vanta platform

Receive one-to-one feedback on the best strategies to automate your security and compliance

The leading security compliance solution trusted by over 12,000 customers.

https://www.vanta.com/lp/demo-ad]]></description>
		<content:encoded><![CDATA[<p>The most industry-trusted compliance and security platform<br />
Meet with a Vanta expert who will listen and learn about your business needs</p>
<p>Get full visibility into the Vanta platform</p>
<p>Receive one-to-one feedback on the best strategies to automate your security and compliance</p>
<p>The leading security compliance solution trusted by over 12,000 customers.</p>
<p><a href="https://www.vanta.com/lp/demo-ad" rel="nofollow">https://www.vanta.com/lp/demo-ad</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/07/03/cyber-security-july-2025/comment-page-2/#comment-1858554</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 29 Jul 2025 15:30:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=197963#comment-1858554</guid>
		<description><![CDATA[https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/" rel="nofollow">https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
