This week has been marked by global declines in essential services, new leaks linked to public and private entities, and disturbing advances in the offensive use of artificial intelligence. The incidents share a common pattern: the vulnerability of critical infrastructures and the increasing exposure generated by external vendors and interconnected systems.

The digital landscape is evolving rapidly and requires defenses to be reinforced at the same speed.

First cyberattack executed autonomously by artificial intelligence

Researchers report the first documented attack in which AI controlled the entire offensive cycle: reconnaissance, exploitation, lateral movement and exfiltration without human intervention. Anthropic researchers have revealed that the attack, allegedly linked to China, used Claude's AI to execute between 80% and 90% of the offensive process. A precedent that redefines risk and accelerates the digital arms race.

Data breach in Iberia: internal documents end up on the dark web after a possible cyberattack

Iberia's internal files were published in clandestine forums, including corporate documentation and operational content. The company is investigating whether it is a direct intrusion or a leak through a technological partner.

Cloudflare crash leaves X, ChatGPT, Discord, Twitch and more out of service

A global outage in Cloudflare's network caused critical services such as X, ChatGPT, Discord, Twitch, GitHub, Shopify, and multiple government and banking platforms to shut down simultaneously. The research points to a possible large scale DDoS attack, evidencing the global dependence on centralized web infrastructures and their systemic impact when they fail.

Data leak in the City Council of Béjar after access via a vulnerable external server

The ballistic actor claims to have accessed systems connected to the Béjar City Council thanks to a server managed by a third party and allegedly misconfigured. He alleges to have obtained internal administrative documents and temporary access to records related to police data. The case confirms a growing trend: malicious actors exploit breaches in providers with a lower level of security to compromise public entities.

Unauthorized access to corporate data: Salesforce investigates a breach linked to OAuth apps

Salesforce detected unauthorized access to internal customer data through compromised credentials related to third-party OAuth applications. The incident affected corporate information stored in environments linked to external APIs, although the company states that there are no indications of direct manipulation on its central servers. The affected applications have been revoked and the involved customers have been notified. The attack highlights the growing risk of indirect access through external integrations. Salesforce is continuing to investigate the final scope of the incident.

Strengthen your digital environment before the next threat

The combination of breaches, service interruptions and AI-enabled attacks paints a picture where defending yourself is no longer optional. Evaluating suppliers, applying segmentation, monitoring and planning contingencies are essential actions.
Act today so you don't pay the cost tomorrow.

Prev Post
Next Post

Any questions?
We're happy to help!