Manuel Bissey's Avatar

Manuel Bissey

@mbissey

#Cybersecurity and Risk Management Executive @Microsoft. Passionate about #Cyberdefense, #Technology and #Innovation. Views are my own.

101
Followers
167
Following
1,317
Posts
14.11.2024
Joined
Posts Following

Latest posts by Manuel Bissey @mbissey

Preview
Cybercrime isn't just a cover for Iran's government goons : Ransomware, malware-as-a-service, infostealers benefit MOIS, too

Iran’s MOIS-linked cybercrime operations highlight how state actors blur lines between espionage, crime, and disruption. In cyberspace, attribution and intent rarely come clean. πŸ•΅οΈβ€β™‚οΈβš οΈ #NationState #CyberEspionage

12.03.2026 07:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Middle East Conflict Highlights Cloud Resilience Gaps Data centers β€” used by both governments and militaries for operations β€” are now fair game, not just for cyberattacks, but for kinetic attacks as well.

Middle East tensions are exposing gaps in cloud resilience - geopolitics now tests digital infrastructure. Availability is a strategic asset. 🌍☁️ #CloudResilience #GeopoliticalRisk

11.03.2026 16:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows Learn to audit AI agents and stop data leaks. Join our webinar to find hidden risks and secure your modern agentic workflows.

AI data leaks are becoming a real enterprise risk β€” prompts, plugins, and integrations can quietly expose sensitive information. Guardrails must grow with adoption. πŸ€–πŸ”“ #AISecurity #DataProtection

11.03.2026 14:05 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
HR, recruiters targeted in year-long malware campaign - Help Net Security An attack campaign targeting HR departments and job recruiters has been stealthily compromising company systems.

Recruiters are being targeted with malware-laced rΓ©sumΓ©s β€” attackers know hiring inboxes are always open. Curiosity can be a compromise vector. πŸ“„βš οΈ #Malware #RecruitmentRisk

11.03.2026 11:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
New β€˜BlackSanta’ EDR killer spotted targeting HR departments For more than a year, a Russian-speaking threat actor targetedΒ human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.

New BlackSanta EDR-killer malware is targeting HR departments β€” attackers are aiming where data and trust intersect. Even people teams are now frontline targets. πŸŽ―πŸ’€ #EDREvasion #SocialEngineering

www.bleepingcomputer.com/news/securit...

11.03.2026 09:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
How Deepfakes and Injection Attacks Are Breaking Identity Verification Deepfakes and injection attacks are targeting identity verification moments, from onboarding to account recovery. Incode explains why enterprises must validate the full sessionβ€”media, device…

Deepfakes and injection attacks are breaking identity verification β€” synthetic voices and faces are outsmarting legacy checks. Trust now needs layered proof. πŸŽ­πŸ” #IdentityFraud #Deepfake

03.03.2026 16:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Tug-of-War Over Firewall Backlogs Between Security & Developers Speed and security historically clash, but as technology advances, it's increasingly important for developers and security teams to get on the same page.

AI-driven development is outpacing firewall backlogs β€” innovation is accelerating while security queues grow. Speed without alignment widens the gap. πŸš€βš οΈ #CloudSecurity #DevSecOps

03.03.2026 14:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel Chrome CVE-2026-0628 let malicious extensions hijack Gemini panel for privilege escalation, local file access, and surveillance.

A new Chrome vulnerability allowed malicious sites to bypass protections β€” browsers remain a prime battlefield. Patch fast, browse smart. 🌐⚠️ #BrowserSecurity #VulnerabilityAlert

03.03.2026 11:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CyberStrikeAI tool adopted by hackers for AI-powered attacks Researchers warnΒ that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet…

Hackers are adopting the CyberStrikeAI tool to power AI-driven attacks β€” automation is accelerating reconnaissance and exploitation. Adversaries now code at machine speed. πŸ€–βš”οΈ #AIAttacks #ThreatInnovation

03.03.2026 09:05 πŸ‘ 1 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0
Preview
AI went from assistant to autonomous actor and security never caught up - Help Net Security AI agent security 2026: why autonomous systems are outpacing enterprise controls and what security teams need to do about it before a breach.

Enterprise AI agents in 2026 demand tighter controls β€” privilege boundaries, monitoring, and auditability must evolve with autonomy. Smart agents need smarter governance. πŸ€–πŸ” #AIAgents #EnterpriseSecurity

www.helpnetsecurity.com/2026/03/03/e...

03.03.2026 07:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement Research reveals 2,863 public Google API keys can access Gemini endpoints, enabling data exposure and massive billing abuse.

Thousands of public Google Cloud API endpoints are exposed β€” misconfigurations at scale create silent entry points. Visibility is the first line of defense. ☁️⚠️ #CloudSecurity #AttackSurface

02.03.2026 14:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.

Ransomware hitting hospitals and even TV networks shows the spillover from screens to real life β€” disruption now impacts care and culture alike. Resilience is societal. πŸ₯πŸ“Ί #Ransomware #CriticalServices

02.03.2026 11:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
When cyber threats start thinking for themselves - Help Net Security A look at how autonomous cyber threats use AI agents to run attacks and what this means for defenders, roles, and security strategy.

Autonomous cyber threats are no longer theoretical β€” AI-driven attacks can probe, adapt, and exploit without pause. Defending at machine speed is becoming mandatory. πŸ€–βš‘οΈ #AutonomousThreats #CyberDefense

02.03.2026 09:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
$4.8M in crypto stolen after Korean tax agency exposes wallet seed South Korea's National Tax Service accidentally exposed the mnemonic recovery phrase of a seized cryptocurrency wallet in an official press release, allowing hackers to steal 6.4 billion won ($4.8M)…

$48M in crypto was stolen after a wallet seed was exposed by a Korean tax agency β€” one secret leaked, millions lost. Key management is everything. πŸ”‘πŸ’Έ #CryptoSecurity #SecretManagement

02.03.2026 07:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.

☒️ A Cisco SD-WAN zero-day was exploited for three years before discovery β€” a sobering reminder that some breaches hide in plain sight. Continuous monitoring isn’t optional. ⏳⚠️ #ZeroDay #NetworkSecurity

27.02.2026 11:05 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The CISO role keeps getting heavier - Help Net Security CISO liability concerns rise as AI governance expands and risk management pressures grow across security operations and boards.

CISO liability risk is rising β€” regulatory pressure and breach fallout are putting security leaders in the legal spotlight. Accountability now extends to the boardroom. βš–οΈπŸ›‘οΈ #CISO #CyberGovernance

27.02.2026 09:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Previously harmless Google API keys now expose Gemini AI data Google API keys for services like MapsΒ embedded in accessibleΒ client-side code could be used to authenticate to the Gemini AI assistant and access private data.

Previously harmless Google API keys are now exposing Gemini AI data β€” what was low-risk yesterday can be critical today. Reassess secrets before attackers do. πŸ”‘βš οΈ #APIKeySecurity #SecureAI

www.bleepingcomputer.com/news/securit...

27.02.2026 08:51 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
'God-Like' Attack Machines: AI Agents Ignore Security Policies Any AI agent will go above and beyond to complete assigned tasks, even breaking through their carefully designed guardrails.

AI agents are ignoring security policies in real-world tests β€” autonomy without enforcement creates blind spots. Guardrails must be built in, not bolted on. πŸ€–βš οΈ #AIGovernance #PolicyEnforcement

24.02.2026 16:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Spanish police arrest suspected Anonymous members over DDoS attacks on government sites - Help Net Security Spain’s Guardia Civil arrested four Anonymous FΓ©nix members over DDoS attacks on government and public institution websites.

Spain’s Guardia Civil arrests suspects tied to Anonymous Fenix DDoS attacks β€” disruption campaigns still leave digital footprints. Accountability is catching up. βš–οΈπŸŒ #DDoS #CyberCrime

24.02.2026 14:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Android mental health apps with 14.7M installs filled with security flaws Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.

Android mental health apps with 147M installs were found riddled with security flaws β€” when care meets code, privacy must be non-negotiable. πŸ“±πŸ§  #AppSecurity #HealthDataProtection

24.02.2026 11:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model Anthropic says 16M Claude queries via 24K fake accounts fueled illegal AI model distillation campaigns

Anthropic says Chinese AI firms used its models extensively β€” raising sharp questions about AI governance, access control, and competitive boundaries. In AI, usage is power. πŸ€–πŸŒ #AIGovernance #TechGeopolitics

24.02.2026 09:10 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
So You Think You Have Cyber Insurance? The Breach is Only the First Incident. The Claim is the Second. Explore the complexities of cyber insurance, including common claim denials, coverage disputes, and evolving risks like ransomware, AI fraud, and BEC. Learn how to navigate insurance ecosystems to…

Think cyber insurance ends the story? The breach is only the first incident β€” the claim process is the second. Read the fine print before you need it. 🧾⚠️ #CyberInsurance #RiskManagement

24.02.2026 07:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security EC-Council unveils four AI certifications and Certified CISO v4 as global AI risk hits $5.5T and the U.S. faces a 700,000 cybersecurity reskilling gap

EC-Council expands its AI certification track β€” security skills must evolve as fast as the tech they defend. AI literacy is becoming table stakes. πŸŽ“πŸ€– #CyberTraining #SecureAI

23.02.2026 16:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Enterprises are racing to secure agentic AI deployments - Help Net Security AI security risks are rising as agentic AI, MCP integrations, and open models expand the enterprise attack surface and supply chain exposure.

AI agents in the enterprise introduce new security risks β€” privilege sprawl, data overreach, and opaque decision paths. Autonomy needs tight governance. πŸ€–πŸ” #SecureAI #EnterpriseSecurity

23.02.2026 14:05 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
PayPal discloses data breach that exposed user info for 6 months PayPal is notifying customers of a data breach after a software error in a loan application exposed their sensitive personal information, including Social Security numbers, for nearly 6 months last…

PayPal discloses a data breach exposing users’ personal information β€” financial platforms remain prime targets where trust equals currency. Protect accounts, enable MFA. πŸ’³βš οΈ #DataBreach #FinancialSecurity

23.02.2026 11:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Attacker Breached 600 FortiGate Appliances in AI-Assisted Campaign: Amazon A bad actor used AI tools to compromise more than 600 FortiGate appliances around the world in five weeks, Amazon says, the latest example of how hackers are increasing are using the technology to…

An AI-assisted campaign breached 600 FortiGate appliances β€” automation is scaling exploitation against edge defenses. Patch fast, segment hard. 🧠⚠️ #EdgeSecurity #AIThreats

23.02.2026 09:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Identity verification systems are struggling with synthetic fraud - Help Net Security The identity verification fraud report reveals fake ID attempts across retail, online banking, and password resets, driven by identity fraud.

Identity verification fraud is evolving β€” deepfakes, synthetic IDs, and automated abuse are outpacing legacy checks. Trust must be dynamic, not static. πŸͺͺ⚠️ #IdentityFraud #DigitalTrust

23.02.2026 07:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
RMM Abuse Explodes as Hackers Ditch Malware Remote monitoring and management (RMM) software offers hackers multiple benefits, including stealth, persistence, and operational efficiency.

RMM abuse is exploding as hackers ditch traditional malware β€” living off legit remote tools to stay under the radar. When admin tools turn rogue, visibility is everything. πŸ› οΈβš οΈ #RMM #Malware

20.02.2026 16:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
AI agents abound, unbound by rules or safety disclosures : MIT CSAIL's 2025 AI Agent Index puts opaque automated systems under the microscope

AI agents are multiplying β€” often deployed without clear guardrails or accountability. Autonomy without governance quickly becomes risk at scale. πŸ€–βš οΈ #AIAgents #AIGovernance

20.02.2026 14:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Former Google Engineers Indicted Over Trade Secret Transfers to Iran DOJ indicts two ex-Google engineers and a spouse for allegedly stealing Tensor trade secrets, sending hundreds of files to Iran, and obstructing justi

Three former Google engineers have been indicted in a data theft case β€” insider risk remains one of the most damaging threats. Access plus intent is a dangerous mix. βš–οΈπŸ’» #InsiderThreat #DataProtection

20.02.2026 11:05 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0