AI Cybersecurity

How are AI and robots reshaping jobs?

The Future Jobs: Robots, Artificial Intelligence, and Digital Platforms in East Asia and Pacific by the World Bank explores how new technologies are reshaping jobs. Robots and automation increase productivity but can replace some routine manual jobs. AI can both replace and assist workers depending on the tasks involved. Dgital platforms are creating new flexible […]

AI Malware Vulnerability

OpenClaw AI security flaws expose systems to data theft

China’s National Computer Network Emergency Response Technical Team warned that the open-source AI agent OpenClaw has weak default security settings that attackers could exploit to gain system control. Attackers can use prompt injection, embedding malicious instructions in web pages to trick the AI into leaking sensitive data. Researchers showed that features like link previews in […]

Hack

Leaked iPhone Spy Toolkit now used by Russian hackers

Security researchers uncovered “Coruna,” a powerful iPhone exploit toolkit containing 23 exploits and five attack chains that can compromise devices. The toolkit can infect iPhones simply by visiting a malicious website, requiring little or no user interaction. Evidence suggests it was originally built for U.S. intelligence contractors, but the tools were leaked. After the leak, […]

AI Privacy

Global privacy alarm raised for AI without consent

On 23 February 2026, a coalition led by the Global Privacy Assembly warned about AI systems generating realistic images and videos of individuals without consent. They highlighted rising harms such as non-consensual intimate imagery, defamation, cyberbullying, and risks to children. Organizations are urged to follow privacy laws, build strong safeguards, ensure transparency, and provide fast […]

EIDAS

The future of legally binding digital signing in Europe

The EU Digital Identity Wallet (EUDI Wallet) will allow citizens to create Electronic Signatures legally equivalent to handwritten signatures across the EU. Users can sign contracts directly in their wallet or via certified trust providers, using PIN or biometrics for strong authentication. Such services enable secure online processes like employment contracts, bank onboarding, tax declarations, […]

AI Privacy

When Palantir-AI becomes a sovereignty risk

Switzerland rejected Palantir after a technical review found data leakage cannot be reliably prevented—an architectural, not legal, flaw. The concern isn’t analytics power, but loss of control over data flows, updates, access, and revocation. Germany faces a contradiction: promoting digital sovereignty while using Palantir in several federal states. Bavaria’s Palantir-based VeRA system triggered legal challenges, […]

AI EIDAS

The Wallet that ends the weakest “password” link

Europe’s EUDI Wallet can technically replace passwords today with cryptographic, verifiable, privacy-preserving login. Passwords persist only because institutions keep them as legacy fallback options. Public-sector mandates for wallet-based login will spark mass adoption and force IAM vendors to follow. Enterprises and AI-agents will accelerate the shift, as both require verifiable credentials and cannot rely on […]

Data Breach Hack Ransomware

Zero-Day breach hits Logitech with data stolen across multiple groups

Logitech reports attackers stole data likely belonging to customers, employees, and suppliers. The breach stemmed from a zero-day flaw in a third-party software platform that has since been patched. Logitech has not disclosed which data types or which platform were affected. The Cl0p ransomware group claims it exploited an Oracle E-Business Suite vulnerability to access […]

AI

Trust is on the line in America through disinformation

One in five top public concerns in the U.S. now involves information manipulation. About 70% of Americans see misinformation/disinformation as major problems, back to 2021 levels. Two-thirds support combating disinformation via education, social media labels, and tougher laws 8 in 10 want schools to teach media literacy and critical evaluation skills. Disinformation ranks alongside illegal […]