Vitaly Zdorovetskiy has apologized after he wrongfully accused a man of being a child predator on a livestream sting.

On Monday night, the streamer posted a statement online that he and his team “mistakenly portrayed Akash Singhania as a child predator in his live series, Catching Child Predators. This was a mistake that I deeply regret,” Vitaly wrote. “He never intended to meet a minor and has been cleared of all wrongdoing.”

Vitaly also apologized to Singhania and encouraged his followers to stop contacting him.

“To be clear, the work we do to expose predatory behavior is of the utmost importance, but in doing so, we cannot lose sight of the truth,” he wrote. “I have removed the video from all my accounts, and I ask that anyone who has saved it please do the same.”

COMPLEX SHOP: Shop the brands you love, anytime and anywhere. Uncover what’s next. Buy. Collect. Obsess.

“Though I never encourage anyone to attempt to contact any person in my videos, I ask that anyone who is attempting to contact Mr. Singhania cease at once,” Vitaly said. “This was a learning experience for my team and me, and we will ensure that we remain committed to the truth.”

Singhania responded to Vitaly’s apology, saying that the false accusation had severely affected his life.

“My world was turned upside down this weekend,” he wrote on X. “I was wrongfully portrayed as someone attempting to engage in inappropriate conduct. This accusation is completely false.”

“I have experienced harassment, judgment, and damage to my personal and professional relationships based on something that has now been proven false,” he added.

A clip from Catching Child Predators shows Vitaly and his team attempting to trap Singhania after he shows up in person to connect with a girl he met online, whom he thought was over 18. The trick, supposedly, is that the girl is supposed to tell him she’s actually a minor right before they meet, but it seems, in this case, that she never did that.

The video shows Singhania trying to prove that the girl never said she was a minor. It also appears that Vitaly’s Kick channel has been suspended following the incident.

Vitaly via Kick

Related News

Jarvis Butts

Michigan Man Dies by Suicide Following 35 to 60-Year Prison Sentence for Murder, Assault

Emergency services at the scene in the Leysdown-on-Sea resort on the Isle of Sheppey, where a man in his 40s died after being attacked during an altercation.

Teens Convicted After Luring Suspected Pedophile to Beach and Killing Him

Kid Rock wearing a cowboy hat and a brown vest speaks at a microphone during a formal event.

Kid Rock’s Lyric About Loving ‘Underage’ Girls Under Renewed Scrutiny Ahead of MAGA Super Bowl Show

Related News

DDG Follows IShowSpeed to Ethiopia With Viral MemeHouse Stream

Selena Gomez Calls Herself ‘Mrs. Blanco’ in New Intimate Photos

COMPLEX SHOP: Shop the brands you love, anytime and anywhere. Uncover what’s next. Buy. Collect. Obsess.

Making Culture Pop. Find the latest entertainment news and the best in music, pop culture, sneakers, style and original shows.



Source link

——————————————————–


Click Here For The Original Source.


The Hyderabad police busted a massive cybercrime network operating across several states in the country. Over 52 accused, including several bankers, were arrested during search operations held in nine states under Operation Octopus-2.0.

Police said that the Operation was executed targeting the bankers who assisted the cyber criminals. The arrested were involved in investment frauds, and digital arrests. They threatened the gullible and extorted money in huge amounts from the victims.

Of those arrested, 32 were bank officials, 15 mule customers, five mediators. Police found that the bankers played a major role in the crimes by opening accounts for criminals.

Nearly 16 special teams were formed to investigate into the scam. Without the bank accounts, cyber crime cannot be committed which shows that bankers are hand in glove with the criminals.

Police found that the scamsters used 350 bank accounts to divert the money extorted from the victims. The accounts were found to have links with over 850 cyber cases registered across the country and frauds amounting to Rs 150 crore were identified to have been transacted through them.



Click Here For The Original Source.

——————————————————–

..........

.

.


The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.

About the Author

‌Rezaul Karim, a member of Compliance Week’s Advisory Board, is a seasoned financial crime compliance expert from Bangladesh with over a decade of experience in the field. He held multiple compliance AVP roles at HSBC and is a published author, speaker, and anti-financial crime thought leader shaping the best practices in the field.

 But the dark web is more than just horror stories. Today, the technology synonymous with crimes is a tool for journalists, activities, hacktivists, and whistleblower to share secrets while gaining their anonymity.

Surface web, deep web, and dark web

The publicly indexed part of the web, known as the surface web, consists of approximately 4-5 percent of the internet. These are websites such as newspapers, blogs, Wikipedia, etc., that can be accessed through traditional search engines and don’t require any special efforts or credentials to access.

The deep web contents aren’t indexed by search engines and encapsulates 90-96 percent of the internet. It includes private or password-protected sites which are hidden for security concerns but are accessible with the appropriate credentials. Example include bank account information, insurance records, or subscription-based content.

The dark web is a subset of the deep web that is estimated to make up from 0.01 percent to 5 percent. Content of the dark web are intentionally concealed and designed for anonymous communication. The data in this part of the internet using encrypted networks and non-traditional URLs requiring special software and thus not indexed by search engines.

Origin of the dark web

On March, 20, 2000, a peer-to-peer, decentralized network known as Freenet was released and marked the first recorded instance of the dark web, which was commonly referred to as the darknet. Computer scientist Ian Clarke developed the project, allowing for people to visit the internet anonymously without fears of being tracked by authorities or governments. He described it in his thesis for Edinburgh University called “Distributed, Decentralized Information Storage and Retrieval System,” as a network to allow people to communicate freely without being tracked.

A popular tool for accessing the dark web is TOR (The Onion Router) network, developed by on September 20, 2002, but scientists Roger Dingledine and Nick Mathewson. Through TOR browser, users can navigate the dark web’s contents and reach hidden websites. Funded by the U.S. Naval Research Laboratory as a way to communicate with intelligence sources around the world without getting tracked, the tool anonymizes online activities and protect online privacy. The TOR project released publicly in 2004 and is the most popular publicly available dark web access forward.

Dark web and crimes

Because the dark web isn’t cataloged by search engines and requires special software to access websites hosted on the network, it’s become the perfect environment where criminals can thrive.

One of the cases that brought dark web activities to public attention involved Ross Ulbricht, who in 2013 was arrested by the FBI. In 2010, Ulbricht started developing an online marketplace hosted on the dark web called Silk Road where users could buy and sell drugs, other illegal products and services anonymously, and hosted it on the dark web from 2011 to his arrest. Reuters reported that drug dealers and others made over $200 million dollars in illegal trades on the marketplace using bitcoin.

In his 2013 indictment, Ulbricht, who ran the site using the pseudonym “Dread Pirate Roberts” after a character from The Princess Bride, was found to have committed seven crimes using the dark web, including; conspiracy to launder money, conspiracy to commit computer hacking, conspiracy to traffic narcotics by means of the internet, and continuing a criminal enterprise. He would later be found guilty and sentenced to life in prison with no possibility of parole. His case also marked the first highly publicized case involving the dark web to commit crimes. President Donald Trump pardoned Ulbricht in January, saying his sentence was too harsh.

Today many crimes can be committed using the dark web including illicit trades like drug sales. Moreover, there are money laundering services on the dark web where criminals pay for online services to have their ill-gotten money cleaned.

Most ransomware gangs have a presence in the dark web today, where they announce their attacks. The ransomware as a service business mode has contributed to the recent spike in ransomware attacks.

On the contrary, the dark web is also used for legitimate purposes, with journalists, whistleblowers, and social or human right activists often using it to communicate securely. Specially, in countries with strict censorship laws or suppression of free speech, the dark web serves as platform where people can communicate freely, expose corruption, or share intelligence with each other.

Dark web financial risks

The dark web has made it easier for criminals to get away with financial crimes, including cyberattacks on financial institutions, money laundering, credit card numbers selling, identity theft, extortions, blackmail, ransoms, and ransomware attacks on individuals and companies by cybercriminals looking to make money off these attacks.

In the past few years, cases of financial fraud have also spiked, partly fueled by the dark web, where criminals are able to interact and share techniques and targets of their next victims. According to Cybernews, financial fraud-related listings comprise a significant portion of dark web activities, accounting for over 34 percent of total listings.

Take credit cards and identity theft, for instance. Users of the dark web can easily purchase our credit card numbers, log into legitimate shopping sites like Amazon and make a purchase using your credit card while masquerading as you–all without being detected. Today, there are hundreds of thousands of credit cards for sale on the dark web, and chances are you might be one of the victims whose credit card number is stolen. Unfortunately, you will never know until it’s too late and these criminals have used all your hard-earned money.

 Ratcheting up cyber defense

The dark web is a precautionary tale of how powerful technology can become a force of evil by bad actors. Chances of falling victim to these criminals are also very high, and as you go through your normal life, you have to consider the possibility that there is someone on the dark web with your credit card number, social security number, your name, address, and they don’t mean good for you. A recent complaint filed in the U.S. District Court for the Southern District of Florida revealed that a cybercriminal group posted “National Public Data” on a dark web forum for sale at a price of $3.5 million. This is considered as one of the largest data breaches in history and a serious concern for all.

Your business’s next cyberattack may also be from the dark web, and the method of ransom payment you will be required to use is on the dark web. Therefore, the dark web issue is a public issue that needs to be taken seriously. Ignorance about such a platform is a huge gamble and may have serious consequence. In 2023, businesses experienced 70 percent more ransomware attacks compared to 2022. Though the ransomware payments slightly dropped in the following years, but we should remain vigilant about such attacks as they might resurge at double intensity in the future. Thus, businesses should develop a response plan, data backups, layered security measures, and educate staff on the cybersecurity best practices.



Source link


The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.

About the Author

Karim headshot web small

‌Rezaul Karim, a member of Compliance Week’s Advisory Board, is a seasoned financial crime compliance expert from Bangladesh with over a decade of experience in the field. He held multiple compliance AVP roles at HSBC and is a published author, speaker, and anti-financial crime thought leader shaping the best practices in the field.

 But the dark web is more than just horror stories. Today, the technology synonymous with crimes is a tool for journalists, activities, hacktivists, and whistleblower to share secrets while gaining their anonymity.

Surface web, deep web, and dark web

The publicly indexed part of the web, known as the surface web, consists of approximately 4-5 percent of the internet. These are websites such as newspapers, blogs, Wikipedia, etc., that can be accessed through traditional search engines and don’t require any special efforts or credentials to access.

The deep web contents aren’t indexed by search engines and encapsulates 90-96 percent of the internet. It includes private or password-protected sites which are hidden for security concerns but are accessible with the appropriate credentials. Example include bank account information, insurance records, or subscription-based content.

The dark web is a subset of the deep web that is estimated to make up from 0.01 percent to 5 percent. Content of the dark web are intentionally concealed and designed for anonymous communication. The data in this part of the internet using encrypted networks and non-traditional URLs requiring special software and thus not indexed by search engines.

Origin of the dark web

On March, 20, 2000, a peer-to-peer, decentralized network known as Freenet was released and marked the first recorded instance of the dark web, which was commonly referred to as the darknet. Computer scientist Ian Clarke developed the project, allowing for people to visit the internet anonymously without fears of being tracked by authorities or governments. He described it in his thesis for Edinburgh University called “Distributed, Decentralized Information Storage and Retrieval System,” as a network to allow people to communicate freely without being tracked.

A popular tool for accessing the dark web is TOR (The Onion Router) network, developed by on September 20, 2002, but scientists Roger Dingledine and Nick Mathewson. Through TOR browser, users can navigate the dark web’s contents and reach hidden websites. Funded by the U.S. Naval Research Laboratory as a way to communicate with intelligence sources around the world without getting tracked, the tool anonymizes online activities and protect online privacy. The TOR project released publicly in 2004 and is the most popular publicly available dark web access forward.

Dark web and crimes

Because the dark web isn’t cataloged by search engines and requires special software to access websites hosted on the network, it’s become the perfect environment where criminals can thrive.

One of the cases that brought dark web activities to public attention involved Ross Ulbricht, who in 2013 was arrested by the FBI. In 2010, Ulbricht started developing an online marketplace hosted on the dark web called Silk Road where users could buy and sell drugs, other illegal products and services anonymously, and hosted it on the dark web from 2011 to his arrest. Reuters reported that drug dealers and others made over $200 million dollars in illegal trades on the marketplace using bitcoin.

In his 2013 indictment, Ulbricht, who ran the site using the pseudonym “Dread Pirate Roberts” after a character from The Princess Bride, was found to have committed seven crimes using the dark web, including; conspiracy to launder money, conspiracy to commit computer hacking, conspiracy to traffic narcotics by means of the internet, and continuing a criminal enterprise. He would later be found guilty and sentenced to life in prison with no possibility of parole. His case also marked the first highly publicized case involving the dark web to commit crimes. President Donald Trump pardoned Ulbricht in January, saying his sentence was too harsh.

Today many crimes can be committed using the dark web including illicit trades like drug sales. Moreover, there are money laundering services on the dark web where criminals pay for online services to have their ill-gotten money cleaned.

Most ransomware gangs have a presence in the dark web today, where they announce their attacks. The ransomware as a service business mode has contributed to the recent spike in ransomware attacks.

On the contrary, the dark web is also used for legitimate purposes, with journalists, whistleblowers, and social or human right activists often using it to communicate securely. Specially, in countries with strict censorship laws or suppression of free speech, the dark web serves as platform where people can communicate freely, expose corruption, or share intelligence with each other.

Dark web financial risks

The dark web has made it easier for criminals to get away with financial crimes, including cyberattacks on financial institutions, money laundering, credit card numbers selling, identity theft, extortions, blackmail, ransoms, and ransomware attacks on individuals and companies by cybercriminals looking to make money off these attacks.

In the past few years, cases of financial fraud have also spiked, partly fueled by the dark web, where criminals are able to interact and share techniques and targets of their next victims. According to Cybernews, financial fraud-related listings comprise a significant portion of dark web activities, accounting for over 34 percent of total listings.

Take credit cards and identity theft, for instance. Users of the dark web can easily purchase our credit card numbers, log into legitimate shopping sites like Amazon and make a purchase using your credit card while masquerading as you–all without being detected. Today, there are hundreds of thousands of credit cards for sale on the dark web, and chances are you might be one of the victims whose credit card number is stolen. Unfortunately, you will never know until it’s too late and these criminals have used all your hard-earned money.

 Ratcheting up cyber defense

The dark web is a precautionary tale of how powerful technology can become a force of evil by bad actors. Chances of falling victim to these criminals are also very high, and as you go through your normal life, you have to consider the possibility that there is someone on the dark web with your credit card number, social security number, your name, address, and they don’t mean good for you. A recent complaint filed in the U.S. District Court for the Southern District of Florida revealed that a cybercriminal group posted “National Public Data” on a dark web forum for sale at a price of $3.5 million. This is considered as one of the largest data breaches in history and a serious concern for all.

Your business’s next cyberattack may also be from the dark web, and the method of ransom payment you will be required to use is on the dark web. Therefore, the dark web issue is a public issue that needs to be taken seriously. Ignorance about such a platform is a huge gamble and may have serious consequence. In 2023, businesses experienced 70 percent more ransomware attacks compared to 2022. Though the ransomware payments slightly dropped in the following years, but we should remain vigilant about such attacks as they might resurge at double intensity in the future. Thus, businesses should develop a response plan, data backups, layered security measures, and educate staff on the cybersecurity best practices.



Source link

——————————————————–


Click Here For The Original Source.

..........

.

.


Cloud development platform Vercel has disclosed a security incident after threat actors claimed to have breached its systems and are attempting to sell stolen data.

Vercel is a cloud platform that provides hosting and deployment infrastructure for developers, with a strong focus on JavaScript frameworks.

The company is known for developing Next.js, a widely used React framework, and for offering services such as serverless functions, edge computing, and CI/CD pipelines that enable developers to build, preview, and deploy applications.

Wiz

In a security bulletin published today, the company said a limited subset of customers was affected by a security breach.

“We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems,” warns Vercel.

“We are actively investigating, and we have engaged incident response experts to help investigate and remediate. We have notified law enforcement and will update this page as the investigation progresses.”

The company says its services have not been impacted and that it is working with impacted customers.

Vercel says it is taking steps to protect its customers, advising them to review environment variables, use its sensitive environment variable feature, and to rotate secrets if needed.

Hacker claims to be selling stolen Vercel data

The disclosure comes after a threat actor claiming to be “ShinyHunters” posted on a hacking forum that they had breached Vercel and were selling access to company data.

It should be noted that while the hacker claims to be part of the ShinyHunters group, threat actors linked to recent attacks attributed to the ShinyHunters extortion gang have denied to BleepingComputer that they are involved in this incident.

In the forum post, the hacker claimed to be selling access keys, source code, and database data allegedly stolen from Vercel, along with access to internal deployments and API keys.

“This is just from Linear as proof, but the access I’m about to give you includes multiple employee accounts with access to several internal deployments, API keys (including some NPM tokens and some GitHub tokens),” reads the forum post.

A screenshot of a forum post shared by the threat actor on Telegram
A screenshot of a forum post shared by the threat actor on Telegram

The attacker also shared a text file containing Vercel employee information, which consists of 580 data records containing names, Vercel email addresses, account status, and activity timestamps. They also shared a screenshot of what appears to be an internal Vercel Enterprise dashboard.

BleepingComputer has not been able to independently confirm if the data or screenshot is authentic.

In messages shared on Telegram, the threat actor also claimed they were in contact with Vercel regarding the incident and that they discussed an alleged ransom demand of $2 million.

BleepingComputer contacted Vercel with additional questions about the breach, including whether any sensitive data or credentials were exposed and if they are negotiating with the attackers, and will update this story if we receive a response.

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.



Click Here For The Original Source.

——————————————————–

..........

.

.


Just a few months ago, teenagers in Australia became the first in the world to face a sweeping ban on social media use—an ambitious move that sparked frustration among young users and echoed debates now emerging in Greece. Yet, barely four months on, the policy appears to be losing momentum, as minors have already found ways to maintain an active presence on their favorite platforms.

The restriction, which prohibits social media use for those under 16, was introduced as one of the strictest child-protection measures globally. However, recent data suggests that more than six in ten minors continue to access social networks despite the ban. Specifically, 53% of underage users remain active on TikTok, another 53% on YouTube, and 52% on Instagram.

Source: Reuters

In the early stages of enforcement, authorities oversaw the mass deletion of accounts, with millions removed. Meta alone reported blocking 550,000 accounts, while acknowledging ongoing challenges in reliably verifying users’ ages. Despite this initial “clean-up,” the effect proved short-lived. Users quickly returned, creating new profiles and resuming their activity with minimal disruption.

NEWSLETTER TABLE TALK

Never miss a story.
Subscribe now.

The most important news & topics every week in your inbox.

A key factor behind this resilience is the ease with which restrictions can be bypassed. Many minors simply provide false ages during registration, use tools such as VPNs to appear as users from other countries, or open new accounts as soon as previous ones are deleted. These methods are widely known and remarkably easy to use—even for younger users.

In some cases, the circumvention goes further, involving the tacit or even active participation of parents. Some allow their children to use their own accounts or provide personal identification details during registration, effectively undermining the ban’s enforcement.

Although there were some signs of migration toward alternative platforms, these shifts were limited. Most users chose to remain on familiar networks, albeit through unofficial means. This underscores the powerful social dimension of these platforms—one that appears difficult to regulate through administrative measures alone.

Australia Social Media Falters

At the same time, questions are mounting over the responsibility of technology companies. Despite stricter age-verification requirements, enforcement remains weak, with many accounts slipping through or quickly reappearing—underscoring the limits of digital oversight.

Some experts warn the ban may even backfire, pushing minors toward less regulated platforms or more hidden forms of use, where monitoring is harder. For many young users, online behavior has not changed—it has simply moved beyond formal controls.

The case of Australia highlights a broader challenge: in a fast-evolving digital landscape, outright bans are difficult to enforce. This raises a key question for policymakers, including in Greece, where similar measures are under discussion—can such restrictions truly work, or is a different approach needed?

Many argue that strengthening digital literacy, holding platforms more accountable, and encouraging greater family involvement may prove more effective than blanket bans. For now, Australia’s experience sends a clear message: teenagers have not left social media—they have simply learned to navigate around the rules.



Source link

——————————————————–


Click Here For The Original Source.


Nokia Oyj (HLSE:NOKIA) has drawn fresh attention after announcing a partnership with Cinia on a new managed DDoS protection service for critical infrastructure, adding a cybersecurity angle to its telecom focused investment story.

See our latest analysis for Nokia Oyj.

The recent security partnership with Cinia comes on top of fresh AI RAN work with Orange, network API recognition, and leadership changes, during a period where Nokia’s share price return has been strong over both shorter and longer timeframes. The company has reported a 30 day share price return of 25.01% and a 1 year total shareholder return of 97.26%, which hints at rising optimism around its telecom and cybersecurity positioning.

If this kind of telecom and AI theme interests you, it could be worth scanning beyond Nokia and seeing which other names stand out in 38 AI infrastructure stocks.

With Nokia’s share price already up strongly and the stock trading at about a 22% premium to one intrinsic value estimate and roughly 20% above the average analyst target, is there still a buying opportunity here, or is the market already pricing in future growth?

Most Popular Narrative: 39.3% Overvalued

With Nokia trading at €8.65 versus a most followed fair value estimate of €6.21, the prevailing narrative sees the current price ahead of its fundamentals, and leans heavily on detailed growth and margin assumptions to explain that gap.

Scalable operational improvements, ongoing cost discipline, and rapid integration of recent acquisitions (e.g., Infinera) are positioned to enhance operating leverage and expand net margins over time as revenue mix shifts towards higher margin portfolios.

Read the complete narrative.

Want to see what sits behind that confidence in higher margins and operating leverage? The narrative blends measured revenue growth, rising earnings power, and a richer future earnings multiple into one valuation story.

Result: Fair Value of €6.21 (OVERVALUED)

Have a read of the narrative in full and understand what’s behind the forecasts.

However, this hinges on execution, with pressure in Mobile Networks and currency or tariff headwinds, both of which are capable of challenging the margin and earnings story that investors are leaning on.

Find out about the key risks to this Nokia Oyj narrative.

Next Steps

Concerned about how confident or cautious this all sounds? Look at the numbers yourself, weigh both sides, and see what you make of the 1 key reward and 4 important warning signs.

Looking for more investment ideas?

If you stop at one stock, you could miss other opportunities that fit your style, so use the tools at hand and keep your watchlist evolving.

This article by Simply Wall St is general in nature. We provide commentary based on historical data
and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice.
It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your
financial situation. We aim to bring you long-term focused analysis driven by fundamental data.
Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material.
Simply Wall St has no position in any stocks mentioned.

Valuation is complex, but we’re here to simplify it.

Discover if Nokia Oyj might be undervalued or overvalued with our detailed analysis, featuring fair value estimates, potential risks, dividends, insider trades, and its financial condition.

Access Free Analysis

Have feedback on this article? Concerned about the content? Get in touch with us directly. Alternatively, email editorial-team@simplywallst.com



Click Here For The Original Source.

——————————————————–

..........

.

.


Industrial cybersecurity did not change overnight. There was no single incident that forced a reset, no moment where the industry collectively shifted direction. What has happened instead is slower and more consequential. Over several years, the nature of the problem has evolved, and the way organizations make decisions is beginning to change with it.

This is the eighth edition of the guide. The industry it describes is in transition.

The Industrial Cybersecurity Buyers’ Guide 2026 reflects that shift. It is based on sustained research and direct engagement with operators across manufacturing, energy, transportation, pharmaceuticals, and other critical sectors. The objective has remained consistent. It is not to describe the market as it presents itself, but to reflect how decisions are actually made inside operational environments.

Cybersecurity in these environments is moving away from the edge of operations. It is becoming a core input into how organizations think about production continuity, safety, and enterprise risk. That shift is not complete, but it is now visible.

What Has Changed, and What Has Not

Each edition of the guide begins with the same exercise. Strip away the noise and identify what still matters. The answer in 2026 is not a reinvention of the category structure. Most of the core areas remain intact, and that continuity is deliberate.

Asset visibility, network monitoring, endpoint security, segmentation, secure remote access, and backup and restore capabilities are still foundational.

They have not been solved, and they are not being replaced. What is changing is how they are evaluated. Organizations are moving beyond asking whether these capabilities exist. They are beginning to assess whether they support operational outcomes under real conditions.

The most visible addition this year is the formal inclusion of AI, LLM, and agentic security in OT environments. This reflects current deployments, not future speculation. AI systems are already interacting with operational data, influencing engineering workflows, and in some cases contributing to decisions that have real-world consequences. These systems introduce a different class of risk. They are not simply another component to secure. They have the potential to shape outcomes in ways that are not yet fully understood, let alone governed.

Alongside this, the guide places greater emphasis on areas that have often been underrepresented. Cyber-physical integrity at the process layer. Engineering workstations as control points. Detection validation rather than passive monitoring. Governance structures that define who has authority when incidents intersect with production and safety.

These are not new ideas. What is changing is the degree to which they are being treated as essential rather than optional.

Three Patterns Shaping the Market

1.      Adversaries are Staying, Not Striking

Threat activity has shifted from disruption to persistence. The dominant model is no longer intrusion followed by immediate disruption. It is intrusion followed by long-term access. Adversaries are maintaining footholds, mapping dependencies, and positioning for future impact.

The absence of disruption was never a reliable signal of resilience. It was an assumption, not evidence.

Security programs built around alerts and response are not sufficient when activity remains below traditional thresholds. Organizations need to understand behavior over time, not just events.

This is why the guide emphasizes detection validation, adversary simulation, and recovery as an operational capability. Controls must be tested under realistic conditions.

AI adds another dimension to this challenge. Adoption in OT environments is already meaningful, embedded in maintenance, diagnostics, and operational workflows, and growing quickly. The trajectory is clear, but so is the risk. Organizations are integrating AI into their industrial environments faster than they are building the governance, data foundations, and resilience needed to govern it. That gap is itself a source of exposure. 

While adoption is already meaningful and targeted in OT environments, AI is also increasingly integrated into operational processes, including within maintenance, diagnostics, and operational workflows. While the trajectory is clear, so is the risk. Organizations are integrating AI into their industrial environments faster than they are building the governance, data foundations, and resilience needed to control it.

2.      The IT and OT Boundary is Losing Operational Meaning

The distinction remains useful for architecture, but it does not reflect how incidents unfold. Credentials move across domains. Engineering systems introduce risk into production environments. Remote access pathways span both sides.

What is emerging is a need for shared decision-making. Security, engineering, and operations can no longer operate independently. The challenge is defining authority and accountability when decisions must be made under pressure.

3.      Cyber Risk is Being Translated into Operational Language

The language of cybersecurity is changing at the executive level. Organizations are moving away from abstract metrics and toward operational measures such as downtime exposure, recovery timelines, financial impact, and safety implications.

This shift is accelerating. It is changing how investments are justified and how programs are evaluated. Boards are asking more specific questions, and answers based on compliance are no longer sufficient.

The Takepoint Perspective

Much of the industrial cybersecurity market is designed for organizations that do not exist. Traditional frameworks assume dedicated teams, multi-year transformation programs, and centralized governance. These assumptions do not hold for a large portion of industrial operators.

Takepoint Research starts from a different position. What can be done in real environments, under real constraints.

The focus is on practical implementation. Incremental improvements that deliver measurable impact. Decisions that can be explained, justified, and adapted.

The objective is not to prescribe a single approach. It is to enable defensible decisions grounded in operational reality.

Market Trends Shaping the Year Ahead

Organizations are consolidating capabilities where possible. Managing large portfolios of specialized tools is not feasible in many environments. Vendors are expanding offerings to provide broader coverage under a single operational model.

Services are becoming central. Managed detection and response for OT, incident response, and governance advisory services are becoming core components of security programs.

Recovery is being treated as an operational capability. The ability to restore operations quickly has direct impact on financial exposure and safety.

AI risk is already present. Capabilities are being deployed faster than governance structures can adapt. The gap between deployment and accountability is itself a source of risk.

Why This Guide Exists

Many industrial organizations cannot support dedicated security teams or multi-year transformation programs. Traditional analyst frameworks often assume conditions that do not reflect operational reality.

The Industrial Cybersecurity Buyers’ Guide provides a structured way to evaluate what matters. It creates a common language for security teams, engineering, and executive leadership.

The goal is not completeness. It is clarity.

The Direction of the Industry

Industrial cybersecurity is moving toward full integration into operational decision-making and enterprise risk management. Not as a separate function, but as an embedded capability.

Regulatory expectations will continue to rise. Insurance scrutiny will increase. Board-level questions will become more specific and harder to answer with abstract metrics.

The 2026 Industrial Cybersecurity Buyers’ Guide reflects a market in transition. It is a practical reference for those responsible for securing and operating industrial environments.

Read it as a lens, not a checklist.

This year’s Buyers’ Guide is written for those on the front lines of protecting critical infrastructure and manufacturing operations, and the systems they depend on. It is relevant for organizations at different stages of maturity, with different constraints, but facing the same operational stakes and the same need to act.

——————————————————-


Click Here For The Original Source.


Editor’s note: This column includes mention of potentially triggering situations, including exploitation of minors. Resources are available here. All opinions, columns and letters reflect the views of the individual writer and not necessarily those of the IDS or its staffers.

A sticky-fingered child with an iPad, coming soon to a location near you!  

We’ve all seen it, the tablet screen, also known as the 21st century’s answer to the pacifier. When children are constantly given a source of stimulation to soothe their boredom — cue the “CoComelon” — they lose out on the ability to sit with their own thoughts and self-reflect in an essential way during their formative years. Lonesome has now become a problem to be solved, and our phones provide just enough connection to satisfy the mind. The addictive nature of such devices and the social media they present is correlated with depression, anxiety and other mental health issues among adolescents. But tech companies aren’t alone to blame.  

In a landmark case this March, technology conglomerates Meta and Google were found liable for negligence by a California jury, citing carelessness over harmful design features. A user alleged the companies’ addictive formatting led to their mental health challenges and sued the companies. Now the companies owe the plaintiff a combination of $6 million in compensation. And yes, platforms like Instagram, Facebook and YouTube all operate on an endless-scroll system, strategically designed to addict users. For that, they should be held accountable. 

But despite the many petitions from teens, parents and schools against social media outlets, they aren’t going anywhere. The everlasting algorithms are still generating stacks of cash, and in the United States, current laws do little to regulate social media companies. Under Section 230 of the Communications Act of 1934, media providers and users cannot be held liable for information distributed by another person on the same platform, which means companies generally cannot be sued over content. The media will not reform over a lawsuit, especially when the legal action one can take against it is limited.  

Simply, you cannot realistically expect tech companies to safeguard your children. However, you can educate yourself on the workings of social media and teach your kids how to use it responsibly. It’s essential to know the risks.  

Of course, there’s the danger of the content itself. According to a 2023 American Academy of Pediatrics survey, around 15% of children reported seeing sexually explicit content online under the age of 11.   

The problem extends beyond what material your children can access. On the internet, users become accessible, too. In 2024, an estimate of 300 million children globally were subjected to online solicitation, offences ranging from unwanted messages to image-based sexual abuse. One in nine men — around 10.9% — in the U.S. admit to committing an online sexual offence toward a child at some point. 

Sexual exploitation ties into a larger phenomenon of cyberbullying. Nearly half — 46% — of teens aged 13 to 17 face it in some form. Children aged 10 to 16 years who have accessed or shared sexually explicit, violent or hateful content are reported to have a 50% higher risk of suicidal ideation.   

Unfortunately, a lack of awareness about these risks heightens them. What more danger could a tiny screen pose than the outside world? Because phones and other tech can be used within the safe walls of home, many parents are unsuspecting of the dangers that internet exposure poses.  

A 2025 IPSOS survey showed two in three kids aged 5 to 16 have access to the internet inside their bedroom. Meanwhile, about one in seven parents said they are not confident they know what their child views online.  

The downsides of the internet expand beyond those initial threats to safety. When kids grow up with this technology during their formative years, it changes how they develop social skills. Digital messaging gives us connection at our fingertips. Want to chat? Shoot off a text. But the downside is that with easy connection, we aren’t being as authentic as we could be.  

Because computer mediated communication allows us to edit how we present ourselves to others, we only get the most polished versions of our correspondents. The result is the instant gratification of companionship, without the challenges that could ultimately build a fruitful relationship. There you have a “just right” middle ground between being social but not exerting oneself too much. Sherry Turkle, a social psychologist at the Massachusetts Institute of Technology, refers to this as the “Goldilocks Effect.” 

When kids experiencing the awkward stages of adolescence crave social connection, the accessibility of technology is all the more enticing. 

“Tech appeals to us most when we’re most vulnerable,” Turkle said in a TED Talk.  

We all know kids are about the most vulnerable people on the planet. Not only are they legally dependent on adults for support, they are still developing as people. Middle school, for example, is about the most raw, unfiltered epoch of embarrassment in the human experience. As kids and teens build relationships while they try to make sense of the world, tech preys upon them by providing an easier option. By having comfortable control over how they present themselves online, they can’t develop critical social skills they’ll need in adulthood.  

When even toddlers get non-stop stimulation from tablets and games, boredom becomes practically unbearable. Being alone becomes a problem when we are granted access to so many people through social media. Take a road trip for instance. Time once taken to gaze out the window in a daydream is now spent hunched over a tiny screen. By not learning the art of entertaining oneself, kids are not thinking in ways that are essential to personal growth.  

“What am I going to eat for lunch?” could, with time, become, “What is the meaning of life?” Thinking, no matter how simplistic, is a must. Let those babies ponder! 

So, yes, technology and the internet pose many risks, especially for children and adolescents. Yet, it would be naive to assume that social media and tech companies will work toward improvement over a lawsuit. Especially considering how difficult it is for such a case to make it to court. I, as much as anyone, would love to see someone like Mark Zuckerberg pay the piper. I just wouldn’t bet on it.  

Alternatively, parents can be the safety net for their own children. In a perfect world, I could easily say throw away the screens and it will be sunshine from there on out. But given how widespread that tech is, being used from the classroom to the workforce, it’s essential that they are given the tools to use it responsibly.  

Have an honest conversation with your children about cyberbullying, graphic content and internet safety. Since you know the risks, they should too. Monitor their screen time and make sure you have a firm understanding of what media they are interacting with. Simply handing them an iPad and relying on a largely unregulated system to keep them safe and well-rounded is not enough.  

Be in the know, keep them in the know and restrict where you can.  

Emma Howard (she/her) is a sophomore studying journalism.   





Source link

——————————————————–


Click Here For The Original Source.


There’s a setting you can activate on your iPhone that will make it virtually impossible to hack. By flipping a switch, your iPhone will become so secure that Apple says no phone using Lockdown Mode has ever been hacked.

Sure sounds great. Surprise — here’s why you don’t want to use it.

Lockdown Mode: Apple’s most powerful iPhone security tool

The web seems like a dangerous place, where a single visit to a compromised website can expose hidden vulnerabilities in the browser and open the door wide to hackers.

And the threat seems even worse after all the recent headlines about DarkSword, a highly advanced cyberattack that targets smartphones, including iPhones, in ways that are largely invisible to the user. Unlike typical scams that rely on tricking someone into clicking a bad link, DarkSword exploits hidden flaws in software that can be exploited by visiting a compromised web site.

With all that scary news, you might be thrilled to learn (or be reminded of) Lockdown Mode. It offers a powerful layer of protection against highly sophisticated cyber threats. It turns the iPhone into a far more hardened target, effectively shutting down many of the hidden pathways used by advanced spyware and zero-click exploits.

And it’s not backed up with vague promises. Apple flat out says it works.

“We are not aware of any successful mercenary spyware attacks against a Lockdown Mode-enabled Apple device,” an Apple spokesperson recently told TechCrunch.

Sounds brilliant. You don’t want to use it. Here’s why.

Apple’s most powerful iPhone security tool is more trouble than it’s worth

Lockdown Mode is like wrapping your iPhone in chains. Secure, but hard to use.
AI image: Gemini/Cult of Mac

While Apple’s iPhone Lockdown Mode delivers exceptional security, it does so by significantly limiting or outright disabling features you use every day.

In Messages, most attachment types are blocked. Only basic images are allowed. This eliminates a common hack in which malicious files or previews run hidden code.

In Apple’s Safari, Lockdown Mode takes a particularly aggressive approach by disabling many of the advanced web technologies that modern sites rely on. This includes restrictions on just-in-time (JIT) JavaScript compilation, which improves performance but can also open the door to sophisticated code execution attacks. Some web APIs and dynamic features are also limited, especially when you go to sites you haven’t been to before.

Plus there are additional limitations. Incoming FaceTime calls from unknown contacts are always blocked, for example. Wired connections to computers are restricted unless the phone is unlocked. And this isn’t a complete list of everything.

In short, Lockdown Mode hobbles texting and severely restricts web access. I can’t imagine using my iPhone that way on a regular basis — you probably agree. And there’s good news! We don’t need to. Here’s why.

Easier ways to protect your iPhone from hackers

I’m not being cruel by talking up the advantages of Lockdown Mode before pointing out what a huge hassle it is. Because it would be a vast overkill for your security needs.

For the vast majority of iPhone users, the odds of being “hacked” in the cinematic sense — through sophisticated, invisible attacks — are extremely low. Apple’s tightly controlled ecosystem, regular security updates and hardware-level protections make widespread, untargeted intrusions rare.

To put it another way, hacking someone’s iPhone is a lot of work. And for most of us, it’s simply not worth the hacker’s time. Sending a phishing scam email to a few million email addresses is much easier.  

Security experts generally agree that all you really need to do to protect your device is keep it updated to the most recent iOS version, use strong passwords and enable features like two-factor authentication. So do that, and don’t worry about Lockdown Mode.

So who is Lockdown Mode for?

Some iPhone users face much higher risks of surveillance. Journalists, political figures, government officials, corporate executives handling sensitive information and activists might be hacked — not by criminals but by well-funded organizations, hostile nations or even their own governments.

It’s these people that led to the development of Lockdown Mode, one of the most aggressive consumer security features ever deployed. It’s not for average users.

But if you feel you absolutely must use it, or are just curious, enabling Lockdown Mode on your iPhone is easy. Open the Settings app, then scroll down and tap Privacy & Security. From there, scroll to the bottom and select Lockdown Mode. Tap Turn On Lockdown Mode, then confirm your choice by tapping Turn On & Restart.





Click Here For The Original Source.

——————————————————–

..........

.

.


Leading healthcare organizations share a common mindset: progress and protection move together. Security has become a strategic enabler, one that supports responsible AI adoption, safeguards sensitive data, and helps organizations operate with confidence in a highly regulated, data-intensive environment.

This evolution reflects a broader shift in how healthcare approaches security. Rather than responding to risk after the fact, organizations are embedding security across identity, data, infrastructure, and applications—building resilience as a foundational capability that supports innovation at scale.

For some organizations, AI is being adopted faster than traditional governance structures can keep pace. According to Microsoft’s 2026 Data Security Index, only 47% of organizations across industries report implementing specific generative AI security controls, underscoring a need for clearer security visibility to support safe AI adoption. A multinational survey of more than 1,700 data security professionals commissioned by Microsoft from Hypothesis Group found that 29% of employees have already turned to unsanctioned AI agents for work tasks.1 

Together, these trends are creating new challenges around data handling, security visibility, and compliance, especially as AI tools interact with sensitive or unstructured data. As AI moves into autonomous agents embedded in workflows, these gaps in governance and visibility become exponentially harder to manage.

At the same time, healthcare leaders are responding. Healthcare organizations are accelerating investment in technical and operational safeguards and implementing more specialized controls to govern AI responsibly. The message is clear: governance and security foundations play an important role in responsible AI adoption.

Operating security at a global scale gives Microsoft a unique perspective on how threats evolve and how defenses must adapt. Microsoft processes more than 100 trillion security signals every day,2 applying insights from a global network of security engineers and partners to develop protections that support the unique regulatory requirements of environments like healthcare.

What real-world impact looks like in healthcare security

Across healthcare, organizations are facing expanding digital environments, rising threat volumes, and teams under constant pressure to protect patient data. The following examples illustrate how some organizations are approaching these challenges as they modernize their security operations.

St. Luke’s University Health Network: Scaling security operations without slowing care delivery

With 15 campuses, 300 outpatient sites, and more than 2.5 petabytes of data in motion, St. Luke’s University Health Network manages a highly complex digital environment. Protecting that environment while maintaining operational continuity requires security operations that can scale efficiently and respond quickly to potential threats.

Like many large health systems, St. Luke’s faced fragmented visibility across multiple security platforms. Analysts were overwhelmed by user‑reported suspicious emails and false positives, slowing response times and increasing the risk that real threats could be missed.

To modernize its Security Operations Center, St. Luke’s adopted Microsoft Security Copilot, giving analysts unified, real‑time visibility and AI‑assisted investigation. By consolidating information across security tools and using AI‑assisted analysis, the organization reduced manual effort for analysts and improved consistency in how potential threats are reviewed and prioritized.

The impact:

  • Nearly 200 hours saved per month.
  • Thousands of false positives automatically resolved.
  • Faster, more consistent threat response at scale.

Providence Care: Unifying security to improve visibility and response

Serving more than 15,000 patients across over 14 sites, Providence Care faced a challenge around complexity. A patchwork of disconnected security tools created visibility gaps and operational strain for a small IT team responsible for thousands of users and devices.

This fragmented approach made it harder to detect issues early and respond quickly, keeping the team stuck in reactive mode. Providence Care needed to simplify its environment while strengthening protection across identities, devices, and data.

By consolidating on Microsoft 365 E5 and unified Microsoft security capabilities, including Microsoft Defender and Microsoft Purview, Providence Care established a modern, cloud‑native security foundation. Consolidation reduced complexity and gave the IT team time back to focus on higher‑value work.

The impact:

  • Reduced tool sprawl and improved visibility.
  • Faster detection and response.
  • IT teams shifted from reactive work to analytics, automation, and AI readiness.

Mitsubishi Tanabe Pharma: Modernizing security to scale innovation

As life sciences organizations expand digital transformation efforts, the volume and value of sensitive research and clinical data continue to grow, along with the cyber threats targeting it. Advancing its long‑term vision for data‑driven innovation and precision medicine, Mitsubishi Tanabe Pharma faced increasing security alert volumes across cloud environments and rising pressure on specialized teams responsible for protecting critical systems and data.

Fragmented security visibility limited context for rapid analysis, slowing response times and making it harder to securely scale digital initiatives across the organization. To address these challenges, Mitsubishi Tanabe Pharma modernized its security operations by unifying cloud visibility and security monitoring, strengthening threat detection and incident analysis, and improving security literacy across teams. This approach established a more resilient, cloud‑ready security foundation aligned to its broader digital strategy.

The impact:

  • Reduced manual effort through automation and consolidation.
  • Improved focus for security and IT teams.
  • A shift from reactive investigation to proactive risk management.

Across providers and life sciences, the same fundamentals show up again and again: simplify, unify visibility, and reduce the noise that slows response. AI-powered, end-to-end security helps healthcare organizations run security operations across complex IT environments.

Building secure AI foundations with a phased approach

Strengthening healthcare security is a journey. A phased approach helps organizations address the most critical risks first while building long-term resilience. Microsoft’s Cloud Adoption Framework outlines three phases: Govern AI, Manage AI, and Secure AI. This approach helps healthcare organizations establish responsible AI practices and reduce risk as innovations like AI agents reshape how data is accessed and used. Grounding this work in Zero Trust principles, “never trust, always verify,” helps ensure interactions are authenticated, authorized, and continuously monitored as part of a broader security strategy.

Healthcare leaders are navigating AI adoption in one of the most regulated and trust‑sensitive industries in the world. Microsoft brings a distinct advantage to this moment: decades of experience supporting healthcare organizations, combined with security operations at global scale.

Through its Secure Future Initiative, Microsoft applies lessons learned from operating one of the world’s largest security platforms and translates them into practical patterns and practices designed for highly regulated environments like healthcare. When security is embedded as a foundation, not an afterthought, organizations are better positioned to govern AI responsibly, protect patient trust, and move forward with confidence.

From real‑world impact to practical next steps

Across these examples, the common thread is not technology alone, but disciplined progress, building security foundations that can support increasingly autonomous AI scenarios over time. For healthcare leaders navigating similar pressures, progress often starts with a phased, intentional approach rather than a single, all-at-once transformation.

As healthcare organizations introduce new AI innovations like agents, establishing a strong security foundation rooted in Zero Trust principles helps leaders move forward with confidence and control. While achieving Zero Trust takes time, adopting a phased strategy allows for steady progress and builds confidence in securely integrating AI. 

Extending the conversation

Security is a shared responsibility, and progress depends on collaboration across the healthcare ecosystem—including customers, technologists, and partners. Through open dialogue and shared learning, healthcare leaders can continue strengthening resilience as technologies and threats evolve.

Explore guidance on building a more resilient healthcare security posture, covering cloud security, compliance, and governance in an AI‑enabled world.


1 July 2025 multi-national survey of more than 1,700 data security professionals commissioned by Microsoft from Hypothesis Group.

2 Microsoft Digital Defense Report 2025: Safeguarding Trust in the AI Era, Microsoft Security, 2025.



Click Here For The Original Source.

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW