❌

Normal view

Received yesterday β€” 13 February 2026

The Law of Cyberwar is Pretty Discombobulated

13 February 2026 at 05:24
cyberwar, cyber, SLA, cyberattack, retailers, Ai, applications, sysdig, attack, cisco, AI, AI-powered, attacks, attackers, security, BreachRx, Cisco, Nexus, security, challenges, attacks, cybersecurity, risks, industry, Cisco Talos hackers legitimate tools used in cyberattacks

This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and highlights the potential risks associated with the misuse of emerging technologies in conflicts.

The post The Law of Cyberwar is Pretty Discombobulated appeared first on Security Boulevard.

Received before yesterday

Poland Calls for EU Investigation of TikTok Over AI-Generated Disinformation Campaign

31 December 2025 at 02:40

Digital Services Act, TikTok, Disinformation, Disinformation Campaign, Poland, EU Commission

Poland's Ministry of Digital Affairs submitted a formal request to the European Commission, this week, demanding investigation of TikTok for allegedly failing to moderate a large-scale disinformation campaign run using AI-generated content that urged Poland to exit the European Union.Β The authorities claimed the platform violated obligations as a Very Large Online Platform under the Digital Services Act.

Secretary of State Dariusz Standerski warned the synthetic audiovisual materials pose threats to public order, information security, and the integrity of democratic processes in Poland and across the European Union.

Some of the videos observed contain young women advocating for "Polexit" likely targeted at the younger audiences. European analytics collective Res Futura found one such TikTok account "Prawilne Polki," which published content showing women dressed in T-shirts bearing Polish flags and patriotic symbols. [caption id="attachment_108182" align="aligncenter" width="400"]Digital Services Act, TikTok, Disinformation, Disinformation Campaign, Poland, EU Commission AI-generated "Polexit" videos (Source: Res Futura X account)[/caption] The video character said: "I want Polexit because I want freedom of choice, even if it will be more expensive. I don't remember Poland before the European Union, but I feel it was more Polish then." (machine translated)

The disclosed content published in the Polish-language segment of TikTok exhibits characteristics of a "coordinated disinformation campaign," with the nature of narratives, distribution methods, and use of synthetic materials indicating TikTok failed to implement adequate mechanisms for moderating AI-generated content or ensure effective transparency measures regarding material origins, Standerski said.

Four-Point Action Request

Poland's formal request to Executive Vice President for Tech Sovereignty, Security and Democracy Henna Virkkunen proposes the European Commission initiate investigative proceedings concerning suspected breaches of Digital Services Act provisions relating to systemic risk management and content moderation.

The ministry demands TikTok submit a detailed report on the scale and nature of disclosed content, its reach, and actions taken to remove it and prevent further dissemination. Poland also requests the Commission consider applying interim measures aimed at limiting continued spread of AI-generated content encouraging Polish EU withdrawal.

The fourth request asks for coordination with Poland's Digital Services Coordinator UKE and notification of relevant national authorities regarding proceedings outcomes.

[caption id="attachment_108177" align="aligncenter" width="400"]Digital Services Act, TikTok, Disinformation, Disinformation Campaign, Poland, EU Commission Letter sent by Secretary of State Dariusz Standerski to the EU Commission. (Source: X)[/caption]

Systemic Risk Management Failures

Available information suggests TikTok has not implemented adequate mechanisms for moderating AI-generated content, Standerski said. The platform's alleged failure to ensure effective transparency measures regarding synthetic material origins undermines Digital Services Act objectives concerning disinformation prevention and user protection.

The scale of this phenomenon, its potential consequences for political stability, and the use of generative technologies to undermine democratic foundations require immediate response from European Union institutions, the letter stressed.

As a Very Large Online Platform under DSA regulations, TikTok faces enhanced obligations including systemic risk assessments, independent audits, and transparency reporting. The platform must identify and mitigate risks relating to dissemination of illegal content and negative effects on civic discourse and electoral processes.

Growing Concerns Over AI-Generated Disinformation

The Polish complaint represents one of the first formal DSA enforcement requests specifically targeting AI-generated disinformation campaigns on major social media platforms. The case highlights growing concerns among EU member states about synthetic media being weaponized to manipulate public opinion and undermine democratic institutions.

The Digital Services Act, which came into full effect in February 2024, grants the European Commission powers to investigate very large platforms and impose fines up to 6% of global annual revenue for violations. The law requires platforms to assess and mitigate systemic risks including manipulation of services affecting democratic processes and public security.

TikTok has already been under the scanner from the EU Commission for violations under the Digital Services Act. February, last year, the Commission opened a formal investigation against the social media giant for DSA violation in areas linked to the protection of minors, advertising transparency, data access for researchers, and risk management of addictive design and harmful content.
Also read: U.S. Government Sues TikTok for COPPA Violations, Exposing Millions of Children’s Data

Cyberattacks Against the US Intensify as Russian Groups Target Engineering Firm

28 November 2025 at 03:53

Cyberattacks Against the US Linked to Russia

A new round of cyberattacks against the US has raised concerns about hidden attempts to access urban infrastructure systems, according to an update from the Center for Countering Disinformation. Investigators found that the attackers relied on SocGholish and RomCom, two tools widely used in cybercrime. While these tools are not new, their deployment in this case suggests a deliberate effort to imitate criminal activity and make attribution significantly harder. Security analysts say this approach has become more common in cyberattacks against the US, where Russian special services attempt to blur the line between criminal campaigns and state-backed operations. By doing so, they complicate forensic analysis and slow the response of US intelligence agencies, buying themselves more time inside targeted networks.

Cyberattacks Against the US Engineering Firm

The breached engineering company works closely with contractors that operate water supply networks, transportation systems, and emergency response services. During the intrusion, hackers reportedly accessed information about internal workflows and critical access points linked to these sectors. This type of information is valuable for anyone looking to understand how US infrastructure is managed, maintained, and defended. Even without causing immediate disruption, gaining insight into these processes can help adversaries identify weak spots or plan future interference. The breach also shows how third-party contractors continue to be an attractive entry point for attackers studying the broader ecosystem of American infrastructure.

Use of SocGholish–RomCom Chain Raises Attribution Concerns

The use of the SocGholish–RomCom chain is notable because it is frequently associated with financially motivated cybercrime. In this case, however, analysts say its deployment looks more like a cover than a coincidence. By leaning on familiar criminal tools, Russian-linked groups can:
  • Disguise the true nature of the operation
  • Blend in with regular cybercrime traffic
  • Delay the time it takes to trace the activity
  • Force investigators to sift through layers of misleading indicators
This tactic has effectively created a β€œfog” around cyberattacks against the US, making it harder to quickly determine whether an incident is routine criminal activity or something more coordinated.

Possible Motives

Targeting an engineering firm suggests the attackers were not simply looking for data to sell. Analysts believe the motive was reconnaissance, specifically, understanding how infrastructure systems are structured and how contractors manage their access privileges. Such information could be used in the future to exploit vulnerabilities or carry out sabotage. Experts also point out that even an incomplete attack offers useful insights into how American cybersecurity teams respond, how fast they contain threats, and what defensive tools they rely on. The report also comes as international partners continue stepping up their own cybersecurity efforts. The Netherlands recently committed €10 million to join the UK’s cyber program supporting Ukraine, citing growing digital threats. Canada, meanwhile, expanded its sanctions to include more than 100 vessels from Russia’s β€œshadow fleet” and several organizations connected to the country’s cyber infrastructure. The move is part of a wider effort to limit the networks and resources that support Russian cyber operations.
❌