Artificial intelligence ushers in a golden age of hacking, experts say

🔎 Cyber Watch

Cyberattack hits check-in systems at some of Europe’s busiest airports

A cyberattack targeting check-in and boarding systems disrupted operations at major European hubs including Heathrow, Brussels, and Berlin. The systems of a service provider, Collins Aerospace, were affected. Automated check-in and baggage drop were disabled; airlines shifted to manual operations.

Takeaway: Even if core aviation security is intact, failures in support systems (check-in, boarding) can still ripple out large disruptions. Attackers need not breach flight systems themselves to cause chaos.

🎙️ Tech Briefing On‑Air

Penetration Testing and Social Engineering

In this episode, Steve Stasiukonis, President of Secure Network Technologie, dives into the rise of social engineering, AI-driven attacks, and the growing sophistication of cybercriminals. He shares firsthand stories from the field, underscores the importance of continuous learning, and highlights why programmatic penetration testing is essential for safeguarding organizations.

What It Means

The episode reinforces that traditional defenses alone are no longer enough. Cybercriminals are blending social manipulation with AI-enabled techniques, which makes them harder to detect. Organizations should adopt programmatic penetration testing and ongoing security education to proactively uncover weaknesses before attackers exploit them.

🤝 Partner Intel

Logpoint is a Copenhagen-based cybersecurity platform. It offers SIEM (Security Information and Event Management), UEBA (User & Entity Behavior Analytics), SOAR (Security Orchestration, Automation, and Response), and SAP Security. Key strengths are real-time threat detection, behavioral analytics, automation of incident response, and compliance reporting. It supports hybrid or cloud deployment.

🤖 AI Runtime

Artificial intelligence ushers in a golden age of hacking, experts say

Hackers are using AI in new ways: to probe systems, replicate credentials, exploit large-scale vulnerabilities, and even abuse user trust. Some AI tools are manipulated to leak data or run malicious instructions hidden in seemingly harmless content (e.g. calendar invites, email summaries). Some attacks are supply-chain in nature, where malicious code is distributed through widely used tools.

📊 By the Numbers

$3 million

NIST has awarded over US$3 million through 17 cooperative agreements to expand cybersecurity workforce development in 13 states. The funding brings the total to 47 RAMPS communities established across 25 states.

 

🗳️ Your Monday Take

Cast your vote on our weekly poll.

What should organisations focus on most in 2026 to reduce cyberattack risk?

Login or Subscribe to participate in polls.

📩 We’ll share the results in the Friday issue.

🔗 Stay Connected

Until Wednesday’s edition - Let’s keep that zero-day count at zero!