The Download: AI’s retracted papers problem

The Download: AI’s retracted papers problem Summary Recent investigations show that large language models and chatbots can draw on retracted scientific papers when answering questions — sometimes without flagging that the source was withdrawn. In one study, researchers quizzed ChatGPT using information from 21 retracted medical-imaging papers: the model referenced retracted work in five answers […]

Read More →

Iran-Linked Hackers Target Europe With New Malware

Iran-Linked Hackers Target Europe With New Malware Summary Check Point Software warns that an Iran-linked cyber-espionage group tracked as “Nimbus Manticore” (overlapping with UNC1549/Smoke Sandstorm) has broadened operations into Western Europe. The campaign targets defence manufacturing, telecommunications and aviation firms in Denmark, Portugal and Sweden using updated implants — MiniJunk (a persistent, obfuscated backdoor) and […]

Read More →

2025 Proxy Season Review: Compensation-Related Matters

2025 Proxy Season Review: Compensation-Related Matters Summary The 2025 U.S. annual meeting proxy season (meetings through 30 June 2025) showed continued strong shareholder support for executive pay and equity plan proposals, with average say-on-pay support at c.90% (S&P 500) and 91% (Russell 3000). Failed say-on-pay votes remained rare (5 S&P 500; 27 Russell 3000) and […]

Read More →

‘ShadowLeak’ ChatGPT Attack Allows Hackers to Invisibly Steal Emails

‘ShadowLeak’ ChatGPT Attack Allows Hackers to Invisibly Steal Emails Summary Researchers at Radware discovered a technique called “ShadowLeak” that lets attackers hide HTML-based instructions inside emails so that when a user asks ChatGPT (or a similar agent) to process or summarise their inbox, the cloud-based AI follows the hidden instructions and exfiltrates data to an […]

Read More →

M-PESA is upgrading its platform on Sept. 22; here’s what customers can expect after

M-PESA is upgrading its platform on Sept. 22; here’s what customers can expect after Summary Safaricom will perform a major migration of M-PESA to a new core called Fintech 2.0 on 22 September. The telco plans a three-hour overnight window during which M-PESA services (payments, airtime purchases and related functions) will be offline while customer […]

Read More →

Critical Azure Entra ID Flaw Highlights Microsoft IAM Issues

Critical Azure Entra ID Flaw Highlights Microsoft IAM Issues Summary A critical elevation-of-privilege vulnerability (CVE-2025-55241) in Microsoft’s Azure AD Graph API could have allowed attackers to impersonate users — including global administrators — across tenants. Discovered by Dirk-jan Mollema, the flaw leverages an authentication failure in the legacy Azure AD Graph API together with undocumented, […]

Read More →

7 Lessons for Securing AI Transformation From Former CIA Digital Guru

7 Lessons for Securing AI Transformation From Former CIA Digital Guru Summary Jennifer Ewbank, former deputy director for Digital Innovation at the CIA, describes seven practical lessons from leading the agency’s AI-driven transformation. Faced with massive data deluge and high-risk missions, the CIA reorganised its digital leadership, embedded cybersecurity into development, emphasised cross-domain education, and […]

Read More →

Iranian State APT Blitzes Telcos & Satellite Companies

Iranian State APT Blitzes Telcos & Satellite Companies Summary Researchers report that an Iran-linked APT cluster — Subtle Snail (aka UNC1549), associated with Charming Kitten — has recently stolen sensitive data from 11 global telecommunications firms, satellite operators and aerospace suppliers. The group has been active for several years across the Middle East, Europe and […]

Read More →