Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Data protection. Show all posts

Using a VPN Is Essential for Online Privacy and Data Protection

 

Virtual Private Networks, or VPNs, have evolved from tools used to bypass geographic content restrictions into one of the most effective defenses for protecting digital privacy and data security. By encrypting your internet traffic and concealing your real IP address, VPNs make it far more difficult for anyone — from hackers to internet service providers (ISPs) — to monitor or intercept your online activity. 

When connected to a VPN, your data is sent through a secure, encrypted tunnel before reaching its destination. This means that any information transmitted between your device and the VPN server remains unreadable to outsiders. Once your data reaches the server, it’s decrypted and forwarded to the intended website or application. In return, the response is re-encrypted before traveling back to you. Essentially, your data is “cloaked” from potential attackers, making it especially valuable when using public Wi-Fi networks, where Man-in-the-Middle (MITM) attacks such as IP spoofing or Wi-Fi eavesdropping are common. 

For businesses, combining VPN usage with endpoint security and antivirus software strengthens overall cybersecurity posture by reducing exposure to network vulnerabilities.

A key advantage of VPNs lies in hiding your IP address, which can otherwise reveal your geographic location and online behavior. Exposing your IP makes you vulnerable to phishing, hacking, and DDoS attacks, and it can even allow malicious actors to impersonate you online. By rerouting your connection through a VPN server, your actual IP is replaced by the server’s, ensuring that websites and external entities can’t trace your real identity or location. 

In addition to safeguarding data, VPNs also help counter ISP throttling — the practice of deliberately slowing internet connections during high-traffic periods or after reaching data caps. With a VPN, your ISP cannot see the exact nature of your online activities, whether streaming, gaming, or torrenting. While ISPs can still detect VPN usage and measure total data transferred, they lose visibility into your specific browsing habits. 

Without a VPN, ISPs can track every website you visit, your search history, and even personal information transmitted over unencrypted connections. This data can be sold to advertisers or used to create detailed user profiles. Even browsing in Incognito mode doesn’t prevent ISPs from seeing your activity — it merely stops your device from saving it locally. 

Beyond using a VPN, good cyber hygiene is crucial. Keep your software and devices updated, use strong passwords, and enable antivirus protection. Avoid sharing unnecessary personal data online and think twice before storing sensitive information on unsecured platforms.  

Ultimately, a VPN isn’t a luxury — it’s a fundamental privacy tool. It protects your data, masks your identity, and keeps your online behavior hidden from prying eyes. In an era of widespread tracking and data monetization, using a VPN is one of the simplest and most effective ways to reclaim your digital privacy.

Mobdro Pro VPN Under Fire for Compromising User Privacy

 


A disturbing revelation that highlights the persistent threat that malicious software poses to Android users has been brought to the attention of cybersecurity researchers, who have raised concerns over a deceptive application masquerading as a legitimate streaming and VPN application. Despite the app's promise that it offers free access to online television channels and virtual private networking features—as well as the name Modpro IPTV Plus VPN—it hides a much more dangerous purpose.

It is known as Mobdro Pro IPTV Plus VPN. Cleafy conducted an in-depth analysis of this software program and found that, as well as functioning as a sophisticated Trojan horse laced with Klopatra malware, it is also able to compromise users' financial data, infiltrating devices, securing remote controls, and infecting devices with Klopatra malware. 

Even though it is not listed in Google Play, it has spread through sideloaded installations that appeal to users with the lure of free services, causing users to download it. There is a serious concern among experts that those who install this app may unknowingly expose their devices, bank accounts, and other financial assets to severe security risks. At first glance, the application appears to be an enticing gateway to free, high-quality IPTV channels and VPN services, and many Android users find the offer hard to refuse. 

It is important to note, however, that beneath its polished interface lies a sophisticated banking Trojan with a remote-access toolkit that allows cybercriminals to control almost completely infected devices through a remote access toolkit. When the malware was installed on the device, Klopatra, the malware, exploiting Android's accessibility features, impersonated the user and accessed banking apps, which allowed for the malicious activity to go unnoticed.

Analysts have described the infection chain in a way that is both deliberate and deceptive, using social engineering techniques to deceive users into downloading an app from an unverified source, resulting in a sideload process of the app. Once installed, what appears to be a harmless setup process is, in fact, a mechanism to give the attacker full control of the system. 

In analyzing Mobdro Pro IPTV Plus VPN further, the researchers have discovered that it has been misusing the popularity of the once popular streaming service Mobdro (previously taken down by Spanish authorities) to mislead users and gain credibility, by using the reputation of the once popular streaming service Mobdro. 

There are over 3,000 Android devices that have already been compromised by Klopatra malware, most of which have been in Italy and Spain regions, according to Cleafy, and the operation was attributed to a Turkish-based threat group. A group of hackers continue to refine their tactics and exploit public frustration with content restrictions and digital surveillance by using trending services, such as free VPNs and IPTV apps. 

The findings of Cleafy are supported by Kaspersky's note that there is a broader trend of malicious VPN services masquerading as legitimate tools. For example, there are apps such as MaskVPN, PaladinVPN, ShineVPN, ShieldVPN, DewVPN, and ProxyGate previously linked to similar attacks. In an effort to safeguard privacy and circumvent geo-restrictions online, the popularity of Klopatra may inspire an uproar among imitators, making it more critical than ever for users to verify the legitimacy of free VPNs and streaming apps before installing them. Virtual Private Networks (VPNs) have been portrayed for some time as a vital tool for safeguarding privacy and circumventing geo-restrictions. 

There are millions of internet users around the world who use them as a way to protect themselves from online threats — masking their IP addresses, encrypting their data traffic, and making sure their intercepted communications remain unreadable. But security experts are warning that this perception of safety can sometimes be false.

In recent years, it has become increasingly difficult to select a trustworthy VPN, even when downloading it directly from official sites, such as the Google Play Store, since many apps are allegedly compromising the very privacy they claim to protect, which has made the selection process increasingly difficult. In the VPN Transparency Report 2025, published by the Open Technology Fund, significant security and transparency issues were highlighted among several VPN applications that are widely used around the world. 

During the study, 32 major VPN services collectively used by over a billion people were examined, and the findings revealed opaque ownership structures, questionable operational practices, and the misuse of insecure tunnelling technologies. Several VPN services, which boasted over 100 million downloads each, were flagged as particularly worrying, including Turbo VPN, VPN Proxy Master, XY VPN, and 3X VPN – Smooth Browsing. 

Several providers utilised the Shadowsocks tunnelling protocol, which was never intended to be private or confidential, and yet was marketed as a secure VPN solution by researchers. It emphasises the importance of doing users' due diligence before choosing a VPN provider, urging users to understand who operates the service, how it is designed, and how their information is handled before making a decision. 

It is also strongly advised by cybersecurity experts to have cautious digital habits, including downloading apps from verified sources, carefully reviewing permission requests, installing up-to-date antivirus software, and staying informed on the latest cybersecurity developments through trusted cybersecurity publications. As malicious VPNs and fake streaming platforms become increasingly important gateways to malware such as Klopatra, awareness and vigilance have become increasingly important defensive tools in the rapidly evolving online security landscape. 

As Clearafy uncovered in its analysis of the Klopatra malware, the malware represents a new level of sophistication in Android cyberattacks, utilising several sophisticated mechanisms to help evade detection and resist reverse engineering. As opposed to typical smartphone malware, Klopatra permits its operators to fully control an infected device remotely—essentially enabling them to do whatever the legitimate user is able to do on the device. 

It has a hidden VNC mode, which allows attackers to access the device while keeping the screen black, making them completely unaware of any active activities going on in the device. This is one of the most insidious features of this malware. If malicious actors have access to such a level of access, they could open banking applications without any visible signs of compromise, initiate transfers, and manipulate device settings without anyone noticing.

A malware like Klopatra has strong defensive capabilities that make it very resilient. It maintains an internal watchlist of popular Android security applications and automatically attempts to uninstall them once it detects them, ensuring that it stays hidden from its victim. Whenever a victim attempts to uninstall a malicious application manually, they may be forced to trigger the system's "back" action, which prevents them from doing so. 

The code analysis and internal operator comments—primarily written in Turkish—led investigators to trace the malware’s origins to a coordinated threat group based in Turkey, where most of their activities were directed towards targeting Italian and Spanish financial institutions. Cleafy's findings also revealed that the third server infrastructure is carrying out test campaigns in other countries, indicating an expansion of the business into other countries in the future. 

With Klopatra, users can launch legitimate financial apps and a convincing fake login screen is presented to them. The screen gives the user the appearance of a legitimate login page, securing their credentials via direct operator intervention. The campaign evolved from a prototype created in early 2025 to its current advanced form in 2035. This information is collected and then used by the attackers in order to access accounts, often during the night when the device is idle, making suspicions less likely. 

A few documented examples illustrate that operators have left internal notes in the app's code in reference to failed transactions and victims' unlock patterns, which highlights the hands-on nature of these attacks. Cybersecurity experts warn that the best defence against malware is prevention - avoiding downloading apps from unverified sources, especially those that offer free IPTV or VPN services. Although Google Play Protect is able to identify and block many threats, it cannot detect every emerging threat. 

Whenever an app asks for deep system permissions or attempts to install secondary software, users are advised to be extremely cautious. According to Cleafy's research, curiosity about "free" streaming services or privacy services can all too easily serve as a gateway for full-scale digital compromise, so consumers need to be vigilant about these practices. In a time when convenience usually outweighs caution, threats such as Klopatra are becoming increasingly sophisticated.

A growing number of cybercriminals are exploiting popular trends such as free streaming and VPN services to ensnare unsuspecting users into ensnaring them. As a result, it is becoming increasingly essential for each individual to take steps to protect themselves. Experts recommend that users adopt a multi-layered security approach – pairing a trusted VPN with an anti-malware tool and enabling multi-factor authentication on their financial accounts to minimise damage should their account be compromised. 

The regular review of system activity and app permissions can also assist in detecting anomalies before they occur. Additionally, users should cultivate a sense of scepticism when it comes to offers that seem too good to be true, particularly when they promise unrestricted access and “premium” services without charge. In addition, organisations need to increase awareness campaigns so consumers are able to recognise the warning signs of fraudulent apps. 

The cybersecurity incidents serve as a reminder that cybersecurity is not a one-time safeguard, but must remain constant through vigilance and informed decisions throughout the evolving field of mobile security. Awareness of threats remains the first and most formidable line of defence as the mobile security battlefield continues to evolve.

Cheung Sha Wan Wholesale Market Faces Major Data Breach Impacting Thousands

 


As part of an alarming incident that highlights the growing threat of cyberattacks on public sector systems, the Vegetable Marketing Organisation (VMO) reported that it was targeted by a ransomware attack that disrupted the Cheung Sha Wan Vegetable Wholesale Market's operations through a ransomware attack on a segment of its computer infrastructure. 

Upon discovering the breach on October 13, immediate suspension of network service was imposed as a precautionary measure to contain the intrusion and safeguard critical data. VMO announced on Wednesday that the affected servers were quickly isolated from external access and alerted the Hong Kong Police, the Hong Kong Computer Emergency Response Team Coordination Centre, and the Office of the Privacy Commissioner for Personal Data to the incident. 

A preliminary study suggests that the attack had a significant effect on the gate and accounting systems of the market, potentially exposing the personal information of approximately 7,000 registered users to the outside world. Founded in 1946 to ensure that local produce will be available continuously, the VMO, a non-profit organisation established to ensure this, has begun a comprehensive investigation into the extent of the data breach to determine whether any personal information has been compromised, and it has promised to inform individuals if any personal information is found to be at risk.

As of Thursday, the organisation's official website has remained inaccessible as a result of the ongoing disruption that the cyber incident has caused. After detecting the breach, Vegetable Marketing Organisation engaged an external contractor to assist them with restoring the system and supporting the ongoing investigation into the attack after the breach had been discovered. 

Although the core operations of the Cheung Sha Wan Vegetable Wholesale Market remain unaffected, the company has announced that it will temporarily utilise manual processes to manage invoicing and payment procedures, ensuring continuity of operations. Hong Kong's digital resilience has been questioned in the wake of a series of cybersecurity breaches that have struck numerous prominent institutions in the city in recent years. 

These have included Cyberport, the Consumer Council, and the Hong Kong Post, raising concerns about the city's digital resilience in general. There has been an increase in cyber threats over the past few years, which has led lawmakers to pass legislation to strengthen critical infrastructure security, including penalties of up to HK$5 million for lapses in cybersecurity compliance, resulting in an increase in cybersecurity threats. 

In a statement made by the VMO, it was noted that it would conduct a thorough review of the incident and that reinforced measures would be implemented to safeguard its systems from future attacks. The Vegetable Marketing Organisation has hired an external contractor to assist with restoring its systems, thereby accelerating the recovery process and facilitating the investigation.

It was acknowledged by the organisation that, despite continuing to operate daily, certain administrative functions, such as invoicing and payment processing, are being handled manually temporarily so that business continuity can be maintained. Hong Kong has been experiencing an increasing number of cybersecurity breaches in recent years, including Cyberport, the Consumer Council, and Hong Kong Post, which have put major institutions in a state of anxiety. 

As a result, critical infrastructure remains vulnerable to cyberattacks, which has been highlighted in recent months. Recently, the city's legislature approved a new measure aimed at bolstering defences against cyberattacks, with penalties of up to HK$5 million for non-compliance outlined in the legislation. VMO reiterated its commitment to digital security, and that it places a high level of importance on cybersecurity, and that a comprehensive review of the event would be conducted, along with enhancements to network safeguards to prevent similar events from recurring. 

Considering the recent incident at the Cheung Sha Wan Vegetable Wholesale Market, it has become increasingly apparent to me that Hong Kong's public and semi-public sectors need to strengthen cybersecurity resilience urgently.

The security experts have long warned that as digital systems are becoming increasingly integrated into key components of the services that consumers rely on, the effects of cyberattacks can quickly escalate from data breaches to disruptions in the regular functioning of processes and the public trust in them. Several industry observers believe that organisations like the VMO should go beyond enhancing only technical safeguards and make a concerted effort to train their staff regularly, to perform continuous vulnerability assessments, and to update their monitoring frameworks in real time to detect anomalies early. 

As a supplement to this, the establishment of cross-agency collaboration and information-sharing mechanisms could also enhance the city's overall preparedness to handle similar attacks in the future. Despite the VMO's quick response and transparency in handling the incident, it highlights a crucial national imperative-the strengthening of cyber hygiene and cultivation of a culture of sensitive information across all levels of governance and commerce in order to mitigate the immediate risks. 

The resilience of Hong Kong's institutions will be determined by how proactive vigilance is managed against cyber-attacks as much as it will be determined by their ability to defend themselves against technological disruption.

Asahi Group Confirms Ransomware Attack Disrupting Operations and Leaking Data

 

Japanese food and beverage conglomerate Asahi Group Holdings has confirmed that a ransomware attack severely disrupted its operations and potentially exposed sensitive data, including employee and financial information. The cyberattack, which occurred on September 29, 2025, forced the company to delay releasing its January–September financial results, originally scheduled for November 12. 

The attack paralyzed Asahi’s domestic order and shipment systems, halting automated operations across Japan. Despite the disruption, the company implemented manual order processing and resumed partial shipments to ensure a continued supply of its popular beverages and food products. 

The Qilin ransomware group has claimed responsibility for the breach, asserting that it stole over 9,300 files containing personal and financial data. On October 8, Asahi confirmed that some of the stolen data was found online, prompting a detailed investigation into the scope and type of compromised information. In a public statement, the company said it is working to identify affected individuals and will issue notifications once the investigation confirms unauthorized data transfer.  

Although the incident primarily impacted systems within Japan, Asahi stated there is no evidence of compromise affecting its global operations. 

Recovery efforts are steadily progressing. Asahi Breweries resumed production at all six of its factories by October 2, restoring shipments of Asahi Super Dry, with other product lines following soon after. Asahi Soft Drinks restarted production at six of its seven plants by October 8, while Asahi Group Foods has also resumed partial operations at all seven domestic facilities.  

However, Asahi’s systems have not yet been fully restored, and the company has not provided a definite recovery timeline. The ongoing disruption has delayed access to critical accounting systems, forcing a postponement of quarterly financial reporting. 

In its official statement, Asahi explained that the financial disclosure delay is necessary to ensure accuracy and compliance amid system recovery. The company issued an apology to shareholders and stakeholders for the inconvenience caused and promised transparent updates as investigations and remediation progress. 

The Asahi Group cyberattack serves as another reminder of the rising frequency and impact of ransomware incidents targeting major corporations worldwide.

Bypassing TPM 2.0 in Windows 11 While Maintaining System Security

 


One of the most exciting features of Windows 11 has been the inclusion of the Trusted Platform Module, or TPM, as Microsoft announced the beginning of a new era of computing. Users and industry observers alike have been equally intrigued and apprehensive about this requirement. 

TPM is an important hardware feature that was originally known primarily within cybersecurity and enterprise IT circles, but has now become central to Microsoft's vision for creating a more secure computing environment. 

However, this unexpected requirement has raised a number of questions for consumers and PC builders alike, resulting in uncertainty regarding compatibility, accessibility, and the future of personal computing security. Essentially, the Trusted Platform Module is a specialised security chip incorporated into a computer's motherboard to perform hardware-based cryptographic functions. 

The TPM system is based upon a foundational hardware approach to security, unlike traditional software systems that operate on software. As a result, sensitive data such as encryption keys, passwords, and digital certificates are encapsulated in a protected enclave and are protected from unauthorised access. This architecture ensures that critical authentication information remains secured against tampering and unauthorised access, no matter what sophisticated malware attacks are launched. 

A key advantage of the technology is that it allows devices to produce, store, manage, and store cryptographic keys securely, authenticate hardware by using unique RSA keys that are permanently etched onto the chip, and monitor the boot process of the system for platform integrity. 

The TPM performs the verification of each component of the boot sequence during startup, ensuring that only the proper firmware and operating system files are executed and that rootkits and unauthorised modifications are prevented. When multiple errors occur in authorisation attempts, the TPM's internal defence system engages a dictionary attack prevention system, which temporarily locks out further attempts to gain access and keeps the system intact, preventing multiple incorrect authorisation attempts. 

It has been standardised by the Trusted Computing Group (TCG) and has been developed in multiple versions to meet the increasing demands of security. With Windows 11, Microsoft is making a decisive move towards integrating stronger, hardware-based safeguards across consumer devices, marking a decisive shift in the way consumer devices are secured. 

Even though Microsoft has stated its intent to protect its users from modern cyber threats by requiring TPM 2.0, the requirement has also sparked debate, particularly among users whose PCs are old or custom-built and do not support it. It is difficult for these users to find the right balance between enhanced security and the practical realities of hardware limitations and upgrade constraints.

In Microsoft's Windows 11 security architecture, the Trusted Platform Module 2.0 is the cornerstone of the system, a dedicated hardware security component that has been embedded into modern processors, motherboards, and even as a standalone chip, as part of Microsoft's security architecture. It is a sophisticated module that creates a secure, isolated environment for handling cryptographic keys, digital certificates, and sensitive authentication data. As a result, it creates an environment of trust between the operating system and the hardware. 

By incorporating cryptographic functionality within a secure and isolated environment, TPM 2.0 is capable of preventing malicious software from infecting and compromising a system, as well as preventing firmware tampering and other software-driven attacks that attempt to compromise a system's security. 

A variety of security functions are controlled by the module. With Secure Boot, TPM 2.0 ensures only trusted software components are loaded during system startup, thus preventing malicious code from being embedded during the most vulnerable stage of system booting. A device encryption program like Microsoft's BitLocker utilises TPM to secure data with cryptographic barriers that are accessible only by authenticated users.

In addition to the attestation feature, organisations and users can also verify both the integrity and authenticity of both hardware and software, while robust key management also makes it possible to generate and store encryption keys directly in the chips, which ensures a secure storage environment for the security keys. 

With the introduction of TPM 2.0 in 2014, the replacement of TPM 1.2 brought significant advances in cryptography, including stronger cryptographic algorithms like SHA-256, improved flexibility, as well as greater compatibility with modern computing environments. A global consortium known as the Trusted Computing Group (TCG), the standard's governing body, is a group dedicated to establishing open and vendor-neutral specifications that will enhance interoperability and standardize hardware-based security across all platforms through open, vendor-neutral specifications. 

As a result of Microsoft's insistent reintroduction of TPM 2.0 for Windows 11, which is a non-negotiable requirement as opposed to an optional feature as in Windows 10, we have taken a step towards strengthening the integrity of hardware at the device level. In spite of the fact that it is technically possible to get around the requirement of installing Windows 11 on unsupported systems by bypassing this requirement, Microsoft strongly discourages any such practice, stating that it undermines the intended security framework and could restrict the availability of future updates. 

Despite the fact that Windows 11 has brought the Trusted Platform Module (TPM) into mainstream discussion, its integration within Microsoft's ecosystem is far from new, nor is it a new concept. Prior versions of Windows, like Windows 10, had long supported TPM technology, which is especially helpful when working with enterprise-grade devices that need data protection and system integrity. 

Several companies have adopted TPMs initially for their laptops and desktops thanks to their stringent IT security standards, which have led to these compact chips being largely replaced by traditional smart cards, which once served as physical keys to authenticate the system.

A TPM performs the same validation functions as smart cards, which require manual insertion or contact with a wireless reader in order to confirm the system integrity. TPMs do this automatically and seamlessly, which ensures both convenience and security. As the operating system becomes increasingly dependent on TPM technology, more and more features will be available. Windows Hello, an extremely popular feature that uses facial recognition to log in to the user's computer, also relies heavily on a TPM for the storage of biometric data and identity verification.

In July 2016, Microsoft mandated support for TPM 2.0 in Windows 10 Home editions, Business editions, Enterprise editions, and Education editions, a policy that naturally extended into Windows 11, which also requires this capability in order to function properly. Despite this mandate, in some cases, a TPM might exist inside a system but remain inactive in certain circumstances. 

In other words, it ensures that both consumer and business systems benefit from a uniform hardware-based security standard. It is quite common for computer systems configured with old BIOS settings, rather than the modern UEFI (Unified Extensible Firmware Interface), to not allow TPM functionality by default. It is possible for users to verify how their system is configured through Windows System Information, and they can then enable the TPM through the UEFI settings if necessary. 

As a result of the auto-initialisation and ownership of the TPM during installation, Windows 10 and Windows 11 eliminate the need for manual configuration during installation. Additionally, TPM's utility extends beyond Windows and applies to a multitude of platforms. There has been a rapid increase in the use of TPM in Linux distributions and Internet of Things (IoT) devices for enhanced security management, demonstrating its versatility and importance to the protection of digital ecosystems. 

In addition to this, Apple has developed its own proprietary Secure Enclave, which performs similar cryptographic operations and protects sensitive user information on its own hardware platform as a parallel approach to its own hardware architecture. There is a trend in the industry toward embedding security at the hardware level, which represents a higher level of security that continues to redefine how modern computing environments can defend themselves against increasingly sophisticated threats, as these technologies play together. 

During the past few years, Microsoft has simplified the integration of the Trusted Platform Module (TPM) to the highest degree possible, beginning with Windows 10 and continuing through Windows 11. This has been done by ensuring that the operating system takes ownership of the chip during the setup process by automating the initialisation process. By automating the configuration process, the TPM management console can be used to reduce the need for manual configuration, which simplifies deployment. 

In the past, certain Group Policy settings of Windows 10 permitted administrators even to back up TPM authorisation values in Active Directory and ensure continuity of cryptographic trust across system reinstalls. However, these exceptions mostly arise when performing a clean installation or resetting a device. In enterprise settings, TPM has a variety of practical applications, including ensuring continuity of cryptographic trust across reinstallations. 

With the TPM-equipped systems, certificates and cryptographic keys are locked to the hardware itself and cannot be exported or duplicated without authorisation, effectively substituting smart cards with these new security systems. In addition to strengthening authentication processes, this transition reduces the administrative costs associated with issuing and managing physical security devices significantly. 

Further, TPM's automated provisioning capabilities streamline deployment by allowing administrators to verify device provisioning or state changes without the need for a technician to physically be present. Apart from the management of credentials, TPM is also an essential part of preserving the integrity of a device's operating system as well. 

The purpose of anti-malware software is to verify that a computer has been launched successfully and has not been tampered with, making it a key safeguard for data centres and virtualised environments using Hyper-V. When it comes to large-scale IT infrastructures, features like BitLocker Network Unlock are designed to allow administrators to update or maintain their systems remotely while remaining assured that they remain secure and compliant without manually modifying the system. 

As a means of further enhancing enterprise security, device health attestation is a process that allows organisations to verify both hardware and software integrity before permitting access to sensitive corporate resources. With this process, managed devices communicate their security posture, including information about Data Execution Prevention, BitLocker Drive Encryption, and Secure Boot, enabling Mobile Device Management (MDM) servers to make informed choices on how access can be controlled. 

As a result of these capabilities, TPM is no longer just a device that provides hardware security features; it is now a cornerstone of trusted computing that enables enterprises to bridge security, manageability, and compliance issues across the multi-cloud or multi-domain platforms they have adopted. 

Despite the changing nature of the digital landscape, Microsoft's Trusted Platform Module stands as a defining element of its long-term vision of secure, trustworthy computing by embedding security directly into the hardware. By doing so, a proactive approach to security can be taken instead of a reactive defence.

There is no doubt that the growing realisation that system security must begin on the silicon level, where vulnerabilities are the easiest to exploit, is further evidenced by the integration of TPM across both consumer and enterprise devices. When organisations and users embrace TPM, they not only strengthen data protection but also prepare their systems for the next generation of digital authentication, encryption, and compliance standards that will be released soon. 

Considering that cyber-threats are likely to become even more sophisticated as time goes on, the presence of TPM ensures that security remains an integral principle of the modern computing experience rather than an optional one.

China’s DNA Data Bank Initiative Sparks Debate on Privacy and Surveillance

 


Xilinhot, Inner Mongolia, a northern city that has been subject to widespread scrutiny as a result of a police initiative that has reignited debate over privacy and government surveillance, has recently received widespread attention from the Chinese public. In an effort to reduce crime and enhance public safety, authorities have recently announced their intention to establish a DNA database by collecting blood samples from male residents.

The project is being presented as a modern tool to prevent crime and prevent crime-related deaths. A China Newsweek article published on September 23 stated that officials in China described the project as part of a broader effort to update the identification system for documents, like national ID cards and passports, which was a major initiative for China. 

It was also asserted by the police that this database would assist in finding missing elderly people and children, while emphasising that any personal information or biological material would remain strictly private. A number of privacy advocates, as well as citizens, are deeply concerned about the plan because they believe that it may lead to the expansion of state surveillance, posing the threat of overreach on behalf of the government.

In a national debate about privacy, consent, and state management of genetic data, the proposed initiative has triggered a national debate that has centred around enhancing identification systems and strengthening investigative capabilities. 

As China Newsweek reported, authorities in the Inner Mongolian city of Xilinhot announced their intention to collect blood samples for updating a database that is used for passports and national ID cards, which sparked controversy. 

According to officials, the initiative was promoted as a preventive measure to assist in the search for missing children and elderly people. They stressed that all personal data and biological information would remain confidential and would not be shared with anyone else. It has been reported that the official announcement vanished from the department's website and its social media accounts shortly after it was made, further fueling public suspicion.

During a subsequent interview with a police representative, he clarified that participation in the program was completely voluntary and that those who opted out would not face any repercussions. According to the investigators, the collected samples were intended to be added to a local DNA database for Y-chromosomes, commonly known as the "Y bank", which would help law enforcement to trace male lineages in criminal investigations.

In many countries across the globe, DNA databases have become a crucial aspect of crime governance and investigation, with over sixty countries now maintaining national databases, as well as numerous others developing similar programs. The Indian Government has, however, been struggling to go beyond the planning stage despite a number of drafts of its DNA Bill, which had been released to the public some time ago, despite ongoing efforts to set up a National DNA Database since 2003. Despite the numerous drafts, the project has still not reached operation. 

There have been a number of legal and academic experts arguing that this prolonged delay is due to the absence of transparent, inclusive, and participatory decision-making processes that could have incorporated key concerns related to privacy, ethics, and human rights into the decision-making process. 

As privacy has become an increasingly prominent issue in the global debate, the way in which India approaches the construction of its National DNA Database has also been challenged, which is regarded as being primarily driven by a technocratic and bureaucratic vision that fails to take social and legal safeguards into consideration.

It is argued, given India's status as a constitutional democracy, that a robust privacy governance framework has to be established before such a database can be fully implemented in order to ensure that technological advancements do not outpace the nation's commitments in regards to human rights and ethical practices. 

As an alternative to this, New Zealand’s approach to the forensic DNA collection process is a great example of how a successful, transparent system can be implemented. Having established a DNA Profile Databank (DPD) only a few years ago, New Zealand became the second country in the world to do so in the world. Managed by ESR on behalf of the New Zealand Police, the database compiles DNA profiles of both convicted offenders and voluntarily volunteered DNA profiles. 

The comprehensive database is based on two interconnected systems that are linked together - the Criminal Sample Databank, which stores genetic material that is gathered from unsolved crime scenes, and the DNA Profile Database, which contains profiles of individuals. A routine cross-reference of the databases, often daily, to identify potential matches between crime scene evidence and stored profiles is performed regularly, and the results are immediately communicated to law enforcement authorities. 

It has achieved impressive results in the field of DNA analysis by collecting over 200,000 samples as well as 40,000 DNA profiles, which have been taken from casework: approximately seventy per cent of all unsolved cases, which are added to the database, have been linked to individuals, while about thirty per cent have been linked to other crimes. New Zealand has established itself as one of the world's leading players in the use of DNA technology in criminal investigations thanks to its proactive and data-driven approach. 

Taking its name from the National DNA Data Bank, Canada's DNA database stands as the cornerstone of the modern forensic investigation field, consistently maintaining more than half a million DNA profiles that are vital to the pursuit of criminal justice and to the identification of remains. In addition to serving as an important tool for investigators who help them identify or exclude suspects, connect related crimes, and determine whether a serial offender might be involved, the databank is also under strict legal and ethical supervision. 

Besides contributing significantly to the investigation of criminal crimes, the database also aids in the identification of missing people and victims, which is an important component of humanitarian efforts. Through its comprehensive framework, the databank entails the development of collaboration between police, coroners, and medical examiners from all across Canada, enhancing Canada's role as one of the world's leading nations in the responsible use of genetic technology for the protection and justice of the public. 

The discussion revolves around a forensic technique referred to as Y-STR family screening, which enables authorities to narrow the potential suspects in investigations by analysing genetic markers shared among male relatives. In this method, investigators are able to trace a suspect's family members, even though they do not all possess a similar short tandem repeat on their Y chromosomes.

The method allows investigators to locate the suspect before applying additional tools to identify the particular suspect. Several cases involving high-profile people have been solved using the technology, including the notorious Baiyin serial killings that took place between 1988 and 2002 in Gansu province that resulting in the death of 11 women. 

The recent initiative in Xilinhot to collect blood samples has prompted questions about proportionality, necessity, and transparency regarding the public's interest. The commentary in Nanfang Daily reported that the police had provided very limited information regarding the storage, use, or disposal of DNA data, but opinions among legal scholars differed as well: In his argument in South Reviews, Tian Fang, a law professor at Nanjing University, argued that the technology focuses only on non-coding DNA segments, which are not genetically associated with eye color or blood type, so that this technology does not constitute an invasion of privacy at all. 

Nevertheless, others, such as Chen Xuequan, a professor at the University of International Business and Economics in Beijing, spoke out against the system, warning that it could still raise issues related to the ethics of data security and privacy if there were no clear legal safeguards. With nations struggling to balance technological advancement with individual rights, China's DNA data bank initiative highlights the need for clear legal boundaries, ethical oversight, and transparent governance when it comes to the use of genetic information as a whole. 

Even though DNA database systems have proven to be very useful for solving crimes and reuniting families, these systems need to be managed within the framework of privacy, consent, and accountability. The establishment of independent regulatory bodies, the enforcement of strict data protection measures, and the encouragement of public dialogue could ensure that such initiatives serve justice while protecting fundamental freedoms without compromising them. 

In the end, the success of any national DNA database is not determined by the number of samples it collects. It is more important to ensure the integrity of its operation, as well as the trust of the citizens who will be protected by the database.

Data Breach at Bectu Exposes Members’ Information and Bank Details


 

Prospect, one of the UK's leading trade unions, has revealed that in June 2025, it was seriously affected by a cyberattack which had been discovered in the wake of a sophisticated cyberattack that had been launched against it. This underscores the sophistication and persistence of cyber attacks against professional bodies that are becoming ever more sophisticated. A significant part of the data that has been compromised is sensitive financial and personal data belonging to members of Prospect, the union affiliated with Prospect, and its member union, Bectu, a major representation body for professionals in the film and television industry in the country. 

Prospect, a national organisation of close to 160,000 engineers, scientists, managers, and specialists from companies including BT Group, Siemens, and BAE Systems, disclosed that the breach involved a considerable amount of confidential information from its members. Based on preliminary findings, it has been found that the attackers have accessed names, birthdates, contact information, bank account information, including sort codes, for over one year. 

Moreover, it has been suggested that data related to protected personal characteristics, including gender, race, religion, disability status, and employment status, may also have been compromised. A disclosure of this nature is not surprising considering that unions and membership-based organisations are increasingly relying on digital platforms for managing member records, communicating with members, and processing subscriptions – all of which make them attractive targets for cybercriminals who are looking for large quantities of personal information in bulk. 

Bectu Members Among the Most Affected

It is estimated that thousands of people, including Bectu, one of the largest unions in the UK representing professional workers in the film and television industries, as well as theatre and live entertainment, will be affected by this strike. The organisation, which operates under Prospect, acts as an important voice for screen and stage workers, from technicians to creative freelancers, as well as the production crew. A significant percentage of Bectu's approximately 40,000 members may have been affected by the breach, according to internal assessments. While it has not yet been officially confirmed how large a compromise was, early indications suggest that the attack may have exposed highly detailed personal information, leaving individuals open to the possibility that their data could be misused. There are several types of information that have been compromised in addition to bank account information and financial details, including addresses, phone numbers, and email accounts, as well as personal identifiers such as birth dates. The information, which includes diversity and equality statistics and individual case files - often used in representation and employment disputes - was also accessed in some instances. 

Timeline and Discovery of the Breach 

There was a report of a cyberattack that occurred in June 2025, however the full extent of the incident did not become apparent until a detailed forensic investigation of the incident in the months that followed. Prospect's General Secretary, Mike Clancy, formally notified members of the breach in October 2025 via email communications, explaining the nature of the breach, as well as the measures that were being taken to address it. After the incident occurred, Prospect has reported it to the Information Commissioner's Office (ICO), the police, and other relevant authorities. The company has also hired cybersecurity specialists to assist in the ongoing investigation, strengthen internal defences, and ensure that affected individuals receive information on how to safeguard their personal information. 

Prospect’s Official Response 

Michael Clancy, president of the company, issued an official statement addressing the incident in which he confirmed that internal investigations had confirmed that unauthorised access had been gained to the data of specific members. “This investigation is ongoing, but we have unfortunately identified that some member information was accessed during this incident. The evidence we have gathered has identified the members that we need to contact about an impact on their personal information. We have written to them with information on what this means for them and the support Prospect will provide to mitigate risk,” Clancy said.

Among the union's commitments to transparency and determination to assist affected members after the breach, the union stressed its commitment to transparency. Prospect will be offering a free 12-month credit and identity monitoring service as part of its response strategy to help safeguard members from potential financial fraud or identity theft caused by the stolen information as part of its response strategy. 

Cybersecurity Experts Warn of Growing Risks to Unions.  Several cybersecurity analysts have pointed out that trade unions, as well as professional associations, are becoming prime targets for data breaches due to the sheer amount of personal information they collect and store. Many unions, in contrast to corporations, do not have a lot of IT resources at their disposal, making them more vulnerable to sophisticated cyberattacks than other organisations. 

It is important to note that unions store an enormous amount of sensitive information - from payroll information to contact information to equality and disciplinary records. In addition to this, cybercriminals are highly interested in these types of data and can exploit or sell it for financial or political gain. Although the motives behind the Prospect breach remain unclear, investigators have not yet officially identified any specific threat actor responsible for the attack, despite similar incidents occurring in recent years having been linked to organised cybercrime groups that extort organisations or sell stolen data via dark web marketplaces in an attempt to profit. 

Regulatory and Legal Implications 

The UK Data Protection Act 2018 and the UK GDPR require Prospect to report significant data breaches to the Information Commissioner (ICO) and inform affected individuals “without undue delay.” As part of its review of the case, the ICO will examine whether appropriate data protection measures had been implemented before the incident and whether additional sanctions or guidance should have been issued in the future. 

There may be substantial penalties imposed on organisations which fail to implement sufficient cybersecurity safeguards, including a fine of up to £17.5 million or 4% of the company's global annual turnover, whichever is greater. There is, however, a significant difference between Prospect and other unions, which are typically nonprofit organisations, and regulatory authorities may instead concentrate on remediation, accountability, and security governance reform. 

Industry Repercussions and Member Concerns 

Many members of both Bectu and Prospect have expressed concern about the incident, since they work in sectors already confronted with job insecurity and issues relating to data privacy. A number of people have expressed concerns about the misuse of financial information or the possibility of targeted phishing attacks following the breach. 

Bectu members, whose professional lives are often based on freelance or contractual work, should be aware that any compromise of personal or banking details could lead to serious consequences for them. According to the union, members should be vigilant, monitor their bank accounts regularly, and report suspicious activity to the financial institution as soon as possible. 

In the opinion of industry observers, the reputational impact could extend far beyond the unions themselves. Due to the waning confidence in digital record-keeping systems, organisations are being urged to invest in stronger encryption, zero-trust network frameworks, and regular security audits in order to avoid similar incidents from occurring again. 

A Wake-Up Call for the Sector

A breach like this serves as an important reminder for all professional organisations that handle large amounts of member or employee data regularly. In an increasingly digitalised world, in which sensitive information is exchanged and stored online, robust cybersecurity measures are no longer optional — they are essential to maintaining trust and operational integrity in the digital age. 

 There has been a clear commitment by Prospect and Bectu to assist affected members, strengthen their IT infrastructure, and prevent future breaches as investigations continue. The outcome of the ICO’s review, which is expected to be completed later this year, may serve as a guide for how similar incidents are handled across the UK's trade union landscape going forward.

Zimbra Zero-Day Exploit Used in ICS File Attacks to Steal Sensitive Data

 

Security researchers have discovered that hackers exploited a zero-day vulnerability in Zimbra Collaboration Suite (ZCS) earlier this year using malicious calendar attachments to steal sensitive data. The attackers embedded harmful JavaScript code inside .ICS files—typically used to schedule and share calendar events—to target vulnerable Zimbra systems and execute commands within user sessions. 

The flaw, identified as CVE-2025-27915, affected ZCS versions 9.0, 10.0, and 10.1. It stemmed from inadequate sanitization of HTML content in calendar files, allowing cybercriminals to inject arbitrary JavaScript code. Once executed, the code could redirect emails, steal credentials, and access confidential user information. Zimbra patched the issue on January 27 through updates (ZCS 9.0.0 P44, 10.0.13, and 10.1.5), but at that time, the company did not confirm any active attacks. 

StrikeReady, a cybersecurity firm specializing in AI-based threat management, detected the campaign while monitoring unusually large .ICS files containing embedded JavaScript. Their investigation revealed that the attacks began in early January, predating the official patch release. In one notable instance, the attackers impersonated the Libyan Navy’s Office of Protocol and sent a malicious email targeting a Brazilian military organization. The attached .ICS file included Base64-obfuscated JavaScript designed to compromise Zimbra Webmail and extract sensitive data. 

Analysis of the payload showed that it was programmed to operate stealthily and execute in asynchronous mode. It created hidden fields to capture usernames and passwords, tracked user actions, and automatically logged out inactive users to trigger data theft. The script exploited Zimbra’s SOAP API to search through emails and retrieve messages, which were then sent to the attacker every four hours. It also added a mail filter named “Correo” to forward communications to a ProtonMail address, gathered contacts and distribution lists, and even hid user interface elements to avoid detection. The malware delayed its execution by 60 seconds and only reactivated every three days to reduce suspicion. 

StrikeReady could not conclusively link the attack to any known hacking group but noted that similar tactics have been associated with a small number of advanced threat actors, including those linked to Russia and the Belarusian state-sponsored group UNC1151. The firm shared technical indicators and a deobfuscated version of the malicious code to aid other security teams in detection efforts. 

Zimbra later confirmed that while the exploit had been used, the scope of the attacks appeared limited. The company urged all users to apply the latest patches, review existing mail filters for unauthorized changes, inspect message stores for Base64-encoded .ICS entries, and monitor network activity for irregular connections. The incident highlights the growing sophistication of targeted attacks and the importance of timely patching and vigilant monitoring to prevent zero-day exploitation.

AI Tools Make Phishing Attacks Harder to Detect, Survey Warns


 

Despite the ever-evolving landscape of cyber threats, the phishing method remains the leading avenue for data breaches in the years to come. However, in 2025, the phishing method has undergone a dangerous transformation. 

What used to be a crude attempt to deceive has now evolved into an extremely sophisticated operation backed by artificial intelligence, transforming once into an espionage. Traditionally, malicious actors are using poorly worded, grammatically incorrect, and inaccurate messages to spread their malicious messages; now, however, they are deploying systems based on generative AI, such as GPT-4 and its successors, to craft emails that are eerily authentic, contextually aware, and meticulously tailored to each target.

Cybercriminals are increasingly using artificial intelligence to orchestrate highly targeted phishing campaigns, creating communications that look like legitimate correspondence with near-perfect precision, which has been sounded alarming by the U.S. Federal Bureau of Investigation. According to FBI Special Agent Robert Tripp, these tactics can result in a devastating financial loss, a damaged reputation, or even a compromise of sensitive data. 

By the end of 2024, the rise of artificial intelligence-driven phishing had become no longer just another subtle trend, but a real reality that no one could deny. According to cybersecurity analysts, phishing activity has increased by 1,265 percent over the last three years, as a direct result of the adoption of generative AI tools. In their view, traditional email filters and security protocols, which were once effective against conventional scams, are increasingly being outmanoeuvred by AI-enhanced deceptions. 

Artificial intelligence-generated phishing has been elevated to become the most dominant email-borne threat of 2025, eclipsing even ransomware and insider risks because of its sophistication and scale. There is no doubt that organisations throughout the world are facing a fundamental change in how digital defence works, which means that complacency is not an option. 

Artificial intelligence has fundamentally altered the anatomy of phishing, transforming it from a scattershot strategy to an alarmingly precise and comprehensive threat. According to experts, adversaries now exploit artificial intelligence to amplify their scale, sophistication, and success rates by utilising AI, rather than just automating attacks.

As AI has enabled criminals to create messages that mimic human tone, context, and intent, the line between legitimate communication and deception is increasingly blurred. The cybersecurity analyst emphasises that to survive in this evolving world, security teams and decision-makers need to maintain constant vigilance, urging them to include AI-awareness in workforce training and defensive strategies. This new threat is manifested in the increased frequency of polymorphic phishing attacks. It is becoming increasingly difficult for users to detect phishing emails due to their enhanced AI automation capabilities. 

By automating the process of creating phishing emails, attackers are able to generate thousands of variants, each with slight changes to the subject line, sender details, or message structure. In the year 2024, according to recent research, 76 per cent of phishing attacks had at least one polymorphic trait, and more than half of them originated from compromised accounts, and about a quarter relied on fraudulent domains. 

Acanto alters URLs in real time and resends modified messages in real time if initial attempts fail to stimulate engagement, making such attacks even more complicated. AI-enhanced schemes can be extremely adaptable, which makes traditional security filters and static defences insufficient when they are compared to these schemes. Thus, organisations must evolve their security countermeasures to keep up with this rapidly evolving threat landscape. 

An alarming reality has been revealed in a recent global survey: the majority of individuals are still having difficulty distinguishing between phishing attempts generated by artificial intelligence and genuine messages.

According to a study by the Centre for Human Development, only 46 per cent of respondents correctly recognised a simulated phishing email crafted by artificial intelligence. The remaining 54 per cent either assumed it was real or acknowledged uncertainty about it, emphasising the effectiveness of artificial intelligence in impersonating legitimate communications now. 

Several age groups showed relatively consistent levels of awareness, with Gen Z (45%), millennials (47%), Generation X (46%) and baby boomers (46%) performing almost identically. In this era of artificial intelligence (AI) enhanced social engineering, it is crucial to note that no generation is more susceptible to being deceived than the others. 

While most of the participants acknowledged that artificial intelligence has become a tool for deceiving users online, the study demonstrated that awareness is not enough to prevent compromise, since the study found that awareness alone cannot prevent compromise. The same group was presented with a legitimate, human-written corporate email, and only 30 per cent of them correctly identified it as authentic. This is a sign that digital trust is slipping and that people are relying on instinct rather than factual evidence. 

The study was conducted by Talker Research as part of the Global State of Authentication Survey for Yubico, conducted on behalf of Yubico. During Cybersecurity Awareness Month this October, Talker Research collected insights from users throughout the U.S., the U.K., Australia, India, Japan, Singapore, France, Germany, and Sweden in order to gather insights from users across those regions. 

As a result of the findings, it is clear that users are vulnerable to increasingly artificial intelligence-driven threats. A survey conducted by the National Institute for Health found that nearly four in ten people (44%) had interacted with phishing messages within the past year by clicking links or opening attachments, and 1 per cent had done so within the past week. 

The younger generations seem to be more susceptible to phishing content, with Gen Z (62%) and millennials (51%) reporting significantly higher levels of engagement than the Gen X generation (33%) or the baby boom generation (23%). It continues to be email that is the most prevalent attack vector, accounting for 51 per cent of incidents, followed by text messages (27%) and social media messages (20%). 

There was a lot of discussion as to why people fell victim to these messages, with many citing their convincing nature and their similarities to genuine corporate correspondence, demonstrating that even the most technologically advanced individuals struggle to keep up with the sophistication of artificial intelligence-driven deception.

Although AI-driven scams are becoming increasingly sophisticated, cybersecurity experts point out that families do not have to give up on protecting themselves. It is important to take some simple, proactive actions to prevent risk from occurring. Experts advise that if any unexpected or alarming messages are received, you should pause before responding and verify the source by calling back from a trusted number, rather than the number you receive in the communication. 

Family "safe words" can also help confirm authenticity during times of emergency and help prevent emotional manipulation when needed. In addition, individuals can be more aware of red flags, such as urgent demands for action, pressure to share personal information, or inconsistencies in tone and detail, in order to identify deception better. 

Additionally, businesses must be aware of emerging threats like deepfakes, which are often indicated by subtle signs like mismatched audio, unnatural facial movements, or inconsistent visual details. Technology can play a crucial role in ensuring that digital security is well-maintained as well as fortified. 

It is a fact that Bitdefender offers a comprehensive approach to family protection by detecting and blocking fraudulent content before it gets to users by using a multi-layered security suite. Through email scam detection, malicious link filtering, and artificial intelligence-driven tools like Bitdefender Scamio and Link Checker, the platform is able to protect users across a broad range of channels, all of which are used by scammers. 

It is for mobile users, especially users of Android phones, that Bitdefender has integrated a number of call-blocking features within its application. These capabilities provide an additional layer of defence against attacks such as robocalls and impersonation schemes, which are frequently used by fraudsters targeting American homes. 

In Bitdefender's family plans, users have the chance to secure all their devices under a unified umbrella, combining privacy, identity monitoring, and scam prevention into a seamless, easily manageable solution in a seamless manner. As people move into an era where digital deception has become increasingly human-like, effective security is about much more than just blocking malware. 

It's about preserving trust across all interactions, no matter what. In the future, as artificial intelligence continues to influence phishing, it will become increasingly difficult for people to distinguish between the deception of phishing and its own authenticity of the phishing, which will require a shift from reactive defence to proactive digital resilience. 

The experts stress that not only advanced technology, but also a culture of continuous awareness, is needed to fight AI-driven social engineering. Employees need to be educated regularly about security issues that mirror real-world situations, so they can become more aware of potential phishing attacks before they click on them. As well, individuals should utilise multi-factor authentication, password managers and verified communication channels to safeguard both personal and professional information. 

On a broader level, government, cybersecurity vendors, and digital platforms must collaborate in order to create a shared framework that allows them to identify and report AI-enhanced scams as soon as they occur in order to prevent them from spreading.

Even though AI has certainly enhanced the arsenal of cybercriminals, it has also demonstrated the ability of AI to strengthen defence systems—such as adaptive threat intelligence, behavioural analytics, and automated response systems—as well. People must remain vigilant, educated, and innovative in this new digital battleground. 

There is no doubt that the challenge people face is to seize the potential of AI not to deceive people, but to protect them instead-and to leverage the power of digital trust to make our security systems of tomorrow even more powerful.

AI Adoption Outpaces Cybersecurity Awareness as Users Share Sensitive Data with Chatbots

 

The global surge in the use of AI tools such as ChatGPT and Gemini is rapidly outpacing efforts to educate users about the cybersecurity risks these technologies pose, according to a new study. The research, conducted by the National Cybersecurity Alliance (NCA) in collaboration with cybersecurity firm CybNet, surveyed over 6,500 individuals across seven countries, including the United States. It found that 65% of respondents now use AI in their everyday lives—a 21% increase from last year—yet 58% said they had received no training from employers on the data privacy and security challenges associated with AI use. 

“People are embracing AI in their personal and professional lives faster than they are being educated on its risks,” said Lisa Plaggemier, Executive Director of the NCA. The study revealed that 43% of respondents admitted to sharing sensitive information, including company financial data and client records, with AI chatbots, often without realizing the potential consequences. The findings highlight a growing disconnect between AI adoption and cybersecurity preparedness, suggesting that many organizations are failing to educate employees on how to use these tools responsibly. 

The NCA-CybNet report aligns with previous warnings about the risks posed by AI systems. A survey by software company SailPoint earlier this year found that 96% of IT professionals believe AI agents pose a security risk, while 84% said their organizations had already begun deploying the technology. These AI agents—designed to automate tasks and improve efficiency—often require access to sensitive internal documents, databases, or systems, creating new vulnerabilities. When improperly secured, they can serve as entry points for hackers or even cause catastrophic internal errors, such as one case where an AI agent accidentally deleted an entire company database. 

Traditional chatbots also come with risks, particularly around data privacy. Despite assurances from companies, most chatbot interactions are stored and sometimes used for future model training, meaning they are not entirely private. This issue gained attention in 2023 when Samsung engineers accidentally leaked confidential data to ChatGPT, prompting the company to ban employee use of the chatbot. 

The integration of AI tools into mainstream software has only accelerated their ubiquity. Microsoft recently announced that AI agents will be embedded into Word, Excel, and PowerPoint, meaning millions of users may interact with AI daily—often without any specialized training in cybersecurity. As AI becomes an integral part of workplace tools, the potential for human error, unintentional data sharing, and exposure to security breaches increases. 

While the promise of AI continues to drive innovation, experts warn that its unchecked expansion poses significant security challenges. Without comprehensive training, clear policies, and safeguards in place, individuals and organizations risk turning powerful productivity tools into major sources of vulnerability. The race to integrate AI into every aspect of modern life is well underway—but for cybersecurity experts, the race to keep users informed and protected is still lagging far behind.

Moving Toward a Quantum-Safe Future with Urgency and Vision


It is no secret that the technology of quantum computing is undergoing a massive transformation - one which promises to redefine the very foundations of digital security worldwide. Quantum computing, once thought to be nothing more than a theoretical construct, is now beginning to gain practical application in the world of computing. 

A quantum computer, unlike classical computers that process information as binary bits of zeros or ones, is a device that enables calculations to be performed at a scale and speed previously deemed impossible by quantum mechanics, leveraging the complex principles of quantum mechanics. 

In spite of their immense capabilities, this same power poses an unprecedented threat to the digital safeguards underpinning today's connected world, since conventional systems would have to solve problems that would otherwise require centuries to solve. 

 The science of cryptography at the heart of this looming challenge is the science of protecting sensitive data through encryption and ensuring its confidentiality and integrity. Although cryptography remains resilient to today's cyber threats, experts believe that a sufficiently advanced quantum computer could render these defences obsolete. 

Governments around the world have begun taking decisive measures in recognition of the importance of this threat. In 2024, the U.S. National Institute of Standards and Technology (NIST) released three standards on postquantum cryptography (PQC) for protecting against quantum-enabled threats in establishing a critical benchmark for global security compliance. 

Currently, additional algorithms are being evaluated to enhance post-quantum encryption capabilities even further. In response to this lead, the National Cyber Security Centre of the United Kingdom has urged high-risk systems to adopt PQC by 2030, with full adoption by 2035, based on the current timeline. 

As a result, European governments are developing complementary national strategies that are aligned closely with NIST's framework, while nations in the Asia-Pacific region are putting together quantum-safe roadmaps of their own. Despite this, experts warn that these transitions will not happen as fast as they should. In the near future, quantum computers capable of compromising existing encryption may emerge years before most organisations have implemented quantum-resistant systems.

Consequently, the race to secure the digital future has already begun. The rise of quantum computing is a significant technological development that has far-reaching consequences that extend far beyond the realm of technological advancement. 

Although it has undeniable transformative potential - enabling breakthroughs in sectors such as healthcare, finance, logistics, and materials science - it has at the same time introduced one of the most challenging cybersecurity challenges of the modern era, a threat that is not easily ignored. Researchers warn that as quantum research continues to progress, the cryptographic systems safeguarding global digital infrastructure may become susceptible to attack. 

A quantum computer that has sufficient computational power may render public key cryptography ineffective, rendering secure online transactions, confidential communications, and data protection virtually obsolete. 

By having the capability to decrypt information that was once considered impenetrable, these hackers could undermine the trust and security frameworks that have shaped the digital economy so far. The magnitude of this threat has caused business leaders and information technology leaders to take action more urgently. 

Due to the accelerated pace of quantum advancement, organisations have an urgent need to reevaluate, redesign, and future-proof their cybersecurity strategies before the technology reaches critical maturity in the future. 

It is not just a matter of adopting new standards when trying to move towards quantum-safe encryption; it is also a matter of reimagining the entire architecture of data security in the long run. In addition to the promise of quantum computing to propel humanity into a new era of computational capability, it is also necessary to develop resilience and foresight in parallel.

There will be disruptions that are brought about by the digital age, not only going to redefine innovation, but they will also test the readiness of institutions across the globe to secure the next frontier of the digital age. The use of cryptography is a vital aspect of digital trust in modern companies. It secures communication across global networks, protects financial transactions, safeguards intellectual property, and secures all communications across global networks. 

Nevertheless, moving from existing cryptographic frameworks into quantum-resistant systems is much more than just an upgrade in technology; it means that a fundamental change has been made to the design of the digital trust landscape itself. With the advent of quantum computing, adversaries have already begun using "harvest now, decrypt later" tactics, a strategy which collects encrypted data now with the expectation that once quantum computing reaches maturity, they will be able to decrypt it. 

It has been shown that sensitive data with long retention periods, such as medical records, financial archives, or classified government information, can be particularly vulnerable to retrospective exposure as soon as quantum capabilities become feasible on a commercial scale. Waiting for a definitive quantum event to occur before taking action may prove to be perilous in a shifting environment. 

Taking proactive measures is crucial to ensuring operational resilience, regulatory compliance, as well as the protection of critical data assets over the long term. An important part of this preparedness is a concept known as crypto agility—the ability to move seamlessly between cryptographic algorithms without interrupting business operations. 

Crypto agility has become increasingly important for organisations operating within complex and interconnected digital ecosystems rather than merely an option for technical convenience. Using the platform, enterprises are able to keep their systems and vendors connected, maintain robust security in the face of evolving threats, respond to algorithmic vulnerabilities quickly, comply with global standards and remain interoperable despite diverse systems and vendors.

There is no doubt that crypto agility forms the foundation of a quantum-secure future—and is an essential attribute that all organisations must possess for them to navigate the coming era of quantum disruption confidently and safely. As a result of the transition from quantum cryptography to post-quantum cryptography (PQC), it is no longer merely a theoretical exercise, but now an operational necessity. 

Today, almost every digital system relies heavily on cryptographic mechanisms to ensure the security of software, protect sensitive data, and authenticate transactions in order to ensure that security is maintained. When quantum computing capabilities become available to malicious actors, these foundational security measures could become ineffective, resulting in the vulnerability of critical data around the world to attack and hacking. 

Whether or not quantum computing will occur is not the question, but when. As with most emerging technologies, quantum computing will probably begin as a highly specialised, expensive, and limited capability available to only a few researchers and advanced enterprises at first. Over the course of time, as innovation accelerates and competition increases, accessibility will grow, and costs will fall, which will enable a broader adoption of the technology, including by threat actors. 

A parallel can be drawn to the evolution of artificial intelligence. The majority of advanced AI systems were confined mainly to academic or industrial research environments before generative AI models like ChatGPT became widely available in recent years. Within a few years, however, the democratisation of these capabilities led to increased innovation, but it also increased the likelihood of malicious actors gaining access to powerful new tools that could be used against them. 

The same trajectory is forecast for quantum computing, except with stakes that are exponentially higher than before. The ability to break existing encryption protocols will no longer be limited to nation-states or elite research groups as a result of the commoditization process, but will likely become the property of cybercriminals and rogue actors around the globe as soon as it becomes commoditised. 

In today's fast-paced digital era, adapting to a secure quantum framework is not simply a question of technological evolution, but of long-term survival-especially in the face of catastrophic cyber threats that are convergent at an astonishing rate. A transition to post-quantum cryptography (PQC), or post-quantum encryption, is expected to be seamless through regular software updates for users whose digital infrastructure includes common browsers, applications, and operating systems. 

As a result, there should be no disruption or awareness on the part of users as far as they are concerned. The gradual process of integrating PQC algorithms has already started, as emerging algorithms are being integrated alongside traditional public key cryptography in order to ensure compatibility during this transition period. 

As a precautionary measure, system owners are advised to follow the National Cyber Security Centre's (NCSC's) guidelines to keep their devices and software updated, ensuring readiness once the full implementation of the PQC standards has taken place. While enterprise system operators ought to engage proactively with technology vendors to determine what their PQC adoption timelines are and how they intend to integrate it into their systems, it is important that they engage proactively. 

In organisations with tailored IT or operational technology systems, risk and system owners will need to decide which PQC algorithms best align with the unique architecture and security requirements of these systems. PQC upgrades must be planned now, ideally as part of a broader lifecycle management and infrastructure refresh effort. This shift has been marked by global initiatives, including the publication of ML-KEM, ML-DSA, and SLH-DSA algorithms by NIST in 2024. 

It marks the beginning of a critical shift in the development of quantum-resistant cryptographic systems that will define the next generation of cybersecurity. In the recent surge of scanning activity, it is yet another reminder that cyber threats are continually evolving, and that maintaining vigilance, visibility, and speed in the fight against them is essential. 

Eventually, as reconnaissance efforts become more sophisticated and automated, organisations will not only have to depend on vendor patches but also be proactive in integrating threat intelligence, continuously monitoring, and managing attack surfaces as a result of the technological advancements. 

The key to improving network resilience today is to take a layered approach, which includes hardening endpoints, setting up strict access controls, deploying timely updates, and utilising behaviour analytics-based intelligent anomaly detection to monitor the network infrastructure for anomalies from time to time. 

Further, security teams should take an active role in safeguarding the entire network against attacks that can interfere with any of the exposed interfaces by creating zero-trust architectures that verify every connection that is made to the network. Besides conducting regular penetration tests, active participation in information-sharing communities can help further detect early warning signs before adversaries gain traction.

Attackers are playing the long game, as shown by the numerous attacks on Palo Alto Networks and Cisco infrastructure that they are scanning, waiting, and striking when they become complacent. Consistency is the key to a defender's edge, so they need to make sure they know what is happening and keep themselves updated.