← Terug naar nieuwsbrief

AI & Security Nieuws – 29 Januari 2026

Nieuwsbrief

By Djimit* een overzicht voor AI cloud- en security professionals*

De dominante trend vandaag is de kloof tussen AI-capaciteit en daadwerkelijke adoptie: nieuwe onderzoeksdoorbraken en beleids-/strategie-updates draaien om het beter benutten van bestaande (en relatief lichte) modellen, het vergroten van AI‑vaardigheden en het verkleinen van capability overhang in economie en beleid.[1]

1. OpenAI lanceert EU Economic Blueprint 2.0

2. Onderzoek: “Zelfpratende” AI leert sneller en generaliseert beter

3. OpenAI for Europe: programma‑uitbreiding rond overheidspartnerschappen

4. EU‑data: ongelijk AI‑gebruik binnen en buiten Europa

5. SME AI Accelerator voor 20.000 Europese mkb’s

6. Youth Safety Grant Program: 500.000 euro voor jeugdbescherming

7. Active inference en inner speech als alternatief voor pure schaalvergroting

8. Nationale strategiediscussies en AI‑beleid (context, niet primair)

Insight of the Day

De meest strategische datapoint van vandaag is de constatering dat power users wereldwijd zeven keer zoveel “thinking capabilities” inzetten als gemiddelde gebruikers, terwijl koplopers onder de 70+ landen drie keer zoveel per persoon gebruiken als achterblijvers. Deze nieuwe metrieken maken capability overhang voor het eerst kwantitatief zichtbaar en dwingen beleidsmakers én ondernemingen om niet alleen naar modelcapaciteit, maar vooral naar diepte en kwaliteit van gebruik te sturen.

Bronnen[1] 40th Annual AAAI Conference on Artificial Intelligence https://aaai.org/conference/aaai/aaai-26/[2] International Conference on Machine Learning Models and … https://conferencenext.com/event/100095444[3] Artificial Intelligence Stocks To Follow Today – January 28th https://www.marketbeat.com/instant-alerts/artificial-intelligence-stocks-to-follow-today-january-28th-2026-01-28/[4] AI that talks to itself learns faster and smarter https://www.sciencedaily.com/releases/2026/01/260127112130.htm[5] International Conference on Machine Learning and Chat GPT https://www.conferencealert.com/eventdetail/1761398[6] AI News for Jan 28, 2026 https://www.youtube.com/watch?v=qcSTdcDPX-U[7] OpenAI finds AI ready for primetime—but many businesses aren’t https://fortune.com/2026/01/28/openai-digs-fundamental-disconnect-research-ai-ready-many-businesses-arent/[8] ICMBDC 2026 – International conference on Machine learning … https://www.conferencealert.com/eventdetail/1195159[9] AI Today in 5: January 28, 2026, The Humanity Needs to … https://www.jdsupra.com/legalnews/ai-today-in-5-january-28-2026-the-hum-88417/[10] January 28, 2026 https://ihsproject.org/january-28-2026/[11] Machine Learning https://arxiv.org/list/cs.LG/recent[12] AI Heavyweight Anthropic Closes Latest Funding Round … https://www.bctechnology.com/news/2026/1/28/AI-Heavyweight-Anthropic-Closes-Latest-Funding-Round-Above-US-10-Billion-(and-Could-Go-Higher)-at-350-Billion-Valuation-Sources-Say.cfm?j=0[13] News https://icesco.org/en/2026/01/28/icesco-calls-for-adoption-of-educational-plans-that-incorporate-artificial-intelligence-technologies-at-an-international-conference-in-riyadh/[14] International Conference On Machine Learning And Big … https://internationalconferencealerts.com/eventdetails.php?id=100064069[15] Market Outlook: Big tech earnings test AI confidence after … https://www.bnnbloomberg.ca/investing/market-outlook/2026/01/28/market-outlook-big-tech-earnings-test-ai-confidence-after-recent-pullbacks/[16] The Future of AI Is Small Language Models https://ca.investing.com/analysis/the-future-of-ai-is-small-language-models-200621164[17] Ensuring a National Policy Framework for Artificial Intelligence https://www.whitehouse.gov/presidential-actions/2025/12/eliminating-state-law-obstruction-of-national-artificial-intelligence-policy/[18] OpenAI Academy https://academy.openai.com[19] Researchers Are Making AI More Efficient at Complex Problems https://news.stonybrook.edu/university/stony-brook-researchers-working-to-make-ai-more-efficient-at-complex-problems/[20] by Alisar Mustafa – The AI Policy Newsletter 01.26.2026 https://alisarmustafa.substack.com/p/the-ai-policy-newsletter-01262026[21] Hot topics – OpenAI Developer Community https://community.openai.com/hot[22] AI System Architecture and Large Language Model Applications https://next.learn.mit.edu/c/topic/health-medicine?resource=16466[23] AI Policy in Practice: Shaping Baltimore’s Innovation Future https://gbc.org/event/ai-policy-in-practice-shaping-baltimores-innovation-future/[24] The next chapter for AI in the EU https://openai.com/index/the-next-chapter-for-ai-in-the-eu/[25] Anthropic CEO warns powerful AI with the brainpower of … https://fortune.com/2026/01/27/country-of-geniuses-anthropic-dario-amodei-50-million-nobel-prize-winners/[26] Under the Hood of AI Policymaking | Berkman Klein Center https://cyber.harvard.edu/events/under-hood-ai-policymaking[27] Managing projects and api keys does not seem to work https://community.openai.com/t/managing-projects-and-api-keys-does-not-seem-to-work/1372057[28] ‘Any Customs System Not Built On Large Language Model … https://www.eurasiareview.com/28012026-any-customs-system-not-built-on-large-language-model-will-disappear-warns-asycuda-founder-jean-gurunlian/[29] Will CT pass AI legislation this year? https://ctmirror.org/2026/01/28/artificial-intelligence-regulation-senate-lamont-ct/[30] Open ai charged me after deleting – API https://community.openai.com/t/open-ai-charged-me-after-deleting/1372036

CVE-2026-24858 is een kritieke zero-day authenticatie-bypass in FortiCloud SSO, actief geëxploiteerd in het wild, met een CVSS-score van 9.4 (CWE-288).[1][2]

Kwetsbaarheid Details

Attackers met een FortiCloud-account en geregistreerd device kunnen inloggen op devices van andere accounts indien FortiCloud SSO is ingeschakeld, zonder geldige authenticatie. Dit leidt tot lokale admin-accounts, config-wijzigingen (bijv. VPN-toegang), en data-exfiltratie. Getroffen producten: FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiWeb; niet Forti*-Cloud of third-party SAML SSO.[3][4][1]

Exploitatie en Impact

Ontdekt en geëxploiteerd door twee kwaadaardige FortiCloud-accounts (geblokkeerd op 22 januari 2026); Fortinet schakelde FortiCloud SSO tijdelijk uit op 26 januari. >9.000 systemen wereldwijd (200 in NL) zijn online blootgesteld. CISA voegde toe aan KEV-catalogus op 28 januari 2026.[2][4][5][6][1]

Patches en Mitigatie

Fortinet patches: FortiOS v7.6.6 en hoger (gerold out vanaf 27 januari 2026); check FG-IR-26-060 voor versies. Disable FortiCloud SSO tot gepatcht; gebruik custom IdP. Security.nl meldde dit op 27-28 januari.[5][7][8][3]

Bronnen[1] Fortinet Patches CVE-2026-24858 After Active FortiOS … https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html[2] CVE-2026-24858 Detail – NVD https://nvd.nist.gov/vuln/detail/CVE-2026-24858[3] Fortinet starts patching exploited FortiCloud SSO zero-day … https://www.helpnetsecurity.com/2026/01/28/fortinet-forticloud-sso-zero-day-vulnerability-cve-2026-24858/[4] CVE-2026-24858: The Fortinet Patch That Wasn’t https://blog.cyberdesserts.com/cve-2026-24858-fortinet-sso-bypass/[5] Administrative FortiCloud SSO authentication bypass https://www.fortiguard.com/psirt/FG-IR-26-060[6] ‘Ruim 9.000 Fortinet-systemen met FortiCloud SSO online … https://www.security.nl/posting/922536/’Ruim+9_000+Fortinet-systemen+met+FortiCloud+SSO+online+toegankelijk’[7] Fortinet waarschuwt voor actief aangevallen lek in FortiOS … https://www.security.nl/posting/922411/Fortinet+waarschuwt+voor+actief+aangevallen+lek+in+FortiOS+en+andere+producten[8] Actively exploited 0-day critical vulnerability in FortiOS … https://ccb.belgium.be/advisories/warning-actively-exploited-0-day-critical-vulnerability-fortios-fortimanager-and[9] CVE-2026-24858: FortiOS SSO Zero-Day Exploited in the … https://socprime.com/blog/cve-2026-24858-vulnerability/[10] NCSC NL | Kwetsbaarheden https://vulnerabilities.ncsc.nl/vulnerability.html?id=2026%2Fcve-2026-24858[11] Fortinet patches actively exploited FortiOS SSO auth … https://securityaffairs.com/187426/security/fortinet-patches-actively-exploited-fortios-sso-auth-bypass-cve-2026-24858.html[12] Fortinet Patches Exploited FortiCloud SSO Authentication … https://www.securityweek.com/fortinet-patches-exploited-forticloud-sso-authentication-bypass/amp/[13] CVE-2026-24858: FortiCloud SSO Authentication Bypass … https://arcticwolf.com/resources/blog/cve-2026-24858/[14] From SSO to SOS: How CVE-2026-24858 Gave Hackers … https://www.secpod.com/blog/from-sso-to-sos-how-cve-2026-24858-gave-hackers-the-keys-to-your-fortinet-gear/[15] Fortinet Patches Exploited FortiCloud SSO Authentication … https://www.securityweek.com/fortinet-patches-exploited-forticloud-sso-authentication-bypass/

Installeer de January 2026 Patch Tuesday-updates via Windows Update om Microsoft CVE-2026-20805 te patchen, een info-disclosure zero-day in Windows Desktop Window Manager (DWM).[1][2]

Kwetsbaarheid Overzicht

CVE-2026-20805 (CVSS 5.5, Important) lekt een memory-adres van een remote ALPC-port in user-mode, wat lokale aanvallers helpt bij escalatie of verdere exploits. Actief geëxploiteerd in het wild; CISA KEV-catalogus toegevoegd, deadline voor federale agencies: 3 februari 2026.[2][3][4][5][6]

Patch Instructies

Getroffen Systemen

Windows 10/11, Server-edities met DWM; prioriteer admin-workstations en jump servers. Geen bekende workarounds, patch ASAP.[4][5][6]

Bronnen[1] CVE-2026-20805 – Microsoft Security Update https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20805[2] CVE-2026-20805 Detail – NVD https://nvd.nist.gov/vuln/detail/CVE-2026-20805[3] Microsoft’s January 2026 Patch Tuesday Addresses 113 … https://www.tenable.com/blog/microsofts-january-2026-patch-tuesday-addresses-113-cves-cve-2026-20805[4] CVE-2026-20805 — Remote Code Execution in Windows https://dbugs.ptsecurity.com/vulnerability/CVE-2026-20805[5] CVE-2026-20805: Microsoft Fixes Actively Exploited … https://socprime.com/blog/cve-2026-20805-vulnerability/[6] Microsoft and Adobe Patch Tuesday, January 2026 … https://blog.qualys.com/vulnerabilities-threat-research/2026/01/13/microsoft-patch-tuesday-january-2026-security-update-review[7] Patch installed successfully, but rolled back on reboot. https://learn.microsoft.com/en-gb/answers/questions/5747827/patch-installed-successfully-but-rolled-back-on-re[8] Microsoft’s January Security Update of High-Risk … https://nsfocusglobal.com/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products/[9] WARNING: MICROSOFT PATCH TUESDAY JANUARY 2026 … https://ccb.belgium.be/advisories/warning-microsoft-patch-tuesday-january-2026-patches-113-vulnerabilities-8-critical-105[10] Office zero-day exploited, forces Microsoft OOB patch https://www.theregister.com/2026/01/27/office_zeroday_exploited_in_the/[11] Microsoft Patch Tuesday – January 2026 https://www.lansweeper.com/blog/patch-tuesday/microsoft-patch-tuesday-january-2026/[12] Windows info-disclosure 0-day bug gets a fix and CISA alert https://www.theregister.com/2026/01/14/patch_tuesday_january_2026/[13] January 2026 Patch Tuesday: Updates and Analysis https://www.crowdstrike.com/en-us/blog/patch-tuesday-analysis-january-2026/[14] Zero Day Initiative — The January 2026 Security Update Review https://www.thezdi.com/blog/2026/1/13/the-january-2026-security-update-review[15] Microsoft Monthly Security Update (January 2026) https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-january-2026

DjimIT Nieuwsbrief

AI updates, praktijkcases en tool reviews — tweewekelijks, direct in uw inbox.