The Identity Renaissance: Redefining Digital Trust for a New Era
Cybersecurity has made remarkable strides over the past decade. We have seen the rise of AI-driven threat detection, cloud-native architecture, […]
The Ghost in the Machine: How Ai Turned Voice into the Ultimate Cyber Weapon
For years, vishing (voice phishing) was the clumsy cousin of cybercrime, relying on crude robocalls and easily detectable scripts. That […]
Stop Reacting, Start Strategizing: A New Era for Cybersecurity and DR
People making cybersecurity and disaster recovery (DR) decisions today often operate as if they’re in a vacuum. Their company has […]
Rethinking Cybersecurity in the Age of AI: Risk, Resilience, and Our New Cyber Reality
The AI revolution is entering a critical new phase. It’s not just about the promise of AI anymore, but also […]
Government considered destroying its data hub after decade-long intrusion
A Chinese-sponsored cyber attack was so damaging that it was briefly proposed that an entire data hub be destroyed, according […]
North Korean threat actors turn blockchains into malware delivery servers
Nation-state threat actors and cybercriminals are increasingly abusing cryptocurrency blockchains to host malicious payloads with a technique known as “EtherHiding,” […]
Friday Squid Blogging: Squid Inks Philippines Fisherman
Good video. As usual, you can also use this squid post to talk about the security stories in the news […]
Q3 Ransomware Attacks Increase 36% YoY, BlackFog Report Reveals
“From grounded aircraft and stranded passengers to manufacturers forced to halt production, the disruption has been significant.” The post Q3 […]
From AI to Generative AI: The Evolution of Cloud Security Operations
Cloud Security plays a crucial role in the field of information security operations, handling much of the heavy lifting needed […]
Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe
Dutch prosecutors suspect three teens of aiding a foreign power, with one allegedly linked to a Russian-affiliated hacker group Read […]
North Korean Hackers Use EtherHiding to Steal Crypto
Google reveals North Korean hackers are using EtherHiding, a blockchain-based technique, to deliver malware and steal cryptocurrency Read More
Powering AI at the Tactical Edge
As the U.S. Department of Defense (DoD) continues to make artificial intelligence (AI) a key segment of national security, turning […]
The AI revolution has transformed how organizations operate, yet beneath the excitement of chatbots and autonomous agents lies a security […]
New Rootkit Campaign Exploits Cisco SNMP Flaw to Gain Persistence
Trend Micro have reported a campaign exploiting a flaw in Cisco SNMP to install Linux rootkits on devices Read More
F5 Hit by ‘Nation-State’ Cyberattack
The intrusion affected F5’s BIG-IP product development environment and engineering knowledge management platforms. The post F5 Hit by ‘Nation-State’ Cyberattack […]
AI Attacks Surge as Microsoft Process 100 Trillion Signals Daily
Microsoft systems analyze over 100 trillion daily signals, suggesting dramatically increasing AI-driven cyber-threats Read More
Ethical Hacking in the Gaming Industry: How Penetration Testing Enhances Security
Imagine this: millions of players logged in, trading gear, leveling up, and trusting your platform with not just their credit […]
MCPTotal Launches to Power Secure Enterprise MCP Workflows
MCPTotal, a comprehensive secure Model Context Protocol (MCP) platform, today announced its flagship platform to help businesses adopt and secure […]
Flaw in Slider Revolution Plugin Exposed 4m WordPress Sites
A flaw in the Slider Revolution plugin has exposed millions of WordPress sites to unauthorized file access Read More
The Growing Threat of Ignoring Personal Cybersecurity
Today, in the age of digitization, cybersecurity is no longer a luxury; quite the contrary, it is both a necessity […]
Whisper 2FA Behind One Million Phishing Attempts Since July
Whisper 2FA is now one of the most active PhaaS tools alongside Tycoon and EvilProxy, responsible for one million attacks […]
Human Risk Report Reveals Overconfidence in Phishing Defenses
Arctic Wolf’s annual Human Risk Behavior Snapshot surveyed more than 1,700 IT leaders and end users worldwide. The post Human […]
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I and Nathan E. Sanders will […]
Legacy Windows Protocols Still Expose Networks to Credential Theft
Legacy Windows protocols are still exposing organizations to credential theft, Resecurity found Read More
CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft
A GitHub Copilot Chat bug let attackers steal private code via prompt injection. Learn how CamoLeak worked and how to […]
Sweatpants & Cyberthreats: Managing Remote Employee Risk
The remote work revolution did not just change where we work, it redefined how we secure our workplaces. The shift, […]
Hacker Group TA585 Emerges With Advanced Attack Infrastructure
A newly identified cybercrime group TA585 is running an advanced cyber operation distributing MonsterV2 malware Read More
Gladinet file sharing zero-day brings patched flaw back from the dead
Criminals have been spotted exploiting a new zero-day vulnerability in Gladinet CentreStack and Triofox file sharing servers that could allow […]
Rewiring Democracy is Coming Soon
My latest book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship, will be published in just over […]
Hackers Target ScreenConnect Features For Network Intrusions
A rise in attacks exploiting RMM tools like ScreenConnect enables system control via phishing tactics Read More
AI vs AI: The Future of Cybersecurity Is Machine vs. Machine. Is the human factor still relevant?
How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager – Illumio I recently […]
Your Alerts Are Increasing Your Cybersecurity Risk
At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack […]
Is CMMC 3.0 on the Horizon? How Defense Contractors Can Prepare Now
The Department of Defense recently sent defense contractors a clear signal: an update to the recently finalized CMMC 2.0 is […]
The word “bot” doesn’t have the best reputation right now. You hear it and think of election manipulation, fake social […]
Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM)
In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses increasingly […]
Astaroth: Banking Trojan Abusing GitHub for Resilience
by Harshil Patel and Prabudh Chakravorty *EDITOR’S NOTE: Special thank you to the GitHub team for working with us on […]
Astaroth: Banking Trojan Abusing GitHub for Resilience
by Harshil Patel and Prabudh Chakravorty *EDITOR’S NOTE: Special thank you to the GitHub team for working with us on […]
SonicWall data breach affects all cloud backup customers
On Sept. 17, security vendor SonicWall announced that cybercriminals had stolen backup files configured for cloud backup. At the time, the […]
How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics
Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better resourced and […]
Datenleck bei SonicWall betrifft alle Cloud-Backup-Kunden
Der Sicherheitsvorfall bei SonicWall ist umfangreicher als bisher angenommen. Tada Images – shutterstock.com Am 17. September gab der Security-Anbieter SonicWall […]
Open-source DFIR Velociraptor was abused in expanding ransomware efforts
Velociraptor, the open-source DFIR tool meant to hunt intruders, has itself gone rogue – being picked up by threat actors […]
Google Launches AI Bug Bounty with $30,000 Top Reward
Google has introduced a new AI Vulnerability Reward Program offering up to $30,000 for bug discoveries in its AI products […]
Rethinking DDoS Defense: Why Scale Isn’t the Only Metric That Matters
In recent months, headlines have drawn attention to record-breaking DDoS attacks, often measured in terabits per second (Tbps) and accompanied […]
Researchers Warn of Security Gaps in AI Browsers
A new report from SquareX Labs highlights security weaknesses in AI browsers like Comet, revealing new cyber-risks Read More
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Three of the most notorious ransomware-as-a-service operations have formed a criminal cartel aimed at coordinating attacks and sharing resources in […]
Lücke in Hotelsoftware legt Kundendaten offen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?quality=50&strip=all 5472w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=640%2C360&quality=50&strip=all 640w, […]
ClayRat spyware turns phones into distribution hubs via SMS and Telegram
A fast-evolving Android spyware campaign known as “ClayRat,” initially targeting Russian users but now spreading far beyond, has produced more […]
High-end computer mice can be used to eavesdrop on the voice conversations of nearby PC users, researchers from the University […]
Flok License Plate Surveillance
The company Flok is surveilling us as we drive: A retired veteran named Lee Schmidt wanted to know how often […]
Nezha Tool Used in New Cyber Campaign Targeting Web Applications
A cyber campaign using Nezha has been identified, targeting vulnerable web apps with PHP web shells and Ghost RAT Read […]
Open-source monitor turns into an off-the-shelf attack beacon
China-affiliated hackers have quietly turned a once-benign open-source network monitoring tool into a remote access beacon. According to new findings […]
Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue
According to TransUnion, digital fraud has cost companies $534bn in losses globally with US business hit hardest Read More
Qilin Ransomware Gang Claims Asahi Cyber-Attack
The Qilin group claims to have stolen sensitive personal and proprietary data from the Brewer Read More
Another Critical RCE Discovered in a Popular MCP Server
Artificial Intelligence development is moving faster than secure coding practices, and attackers are taking notice. Imperva Threat Research recently uncovered […]
Critical Flaw Exposes 60,000 Redis Servers to Remote Exploitation
A critical Redis flaw, dubbed “RediShell,” has exposed 60,000 unprotected servers to exploitation Read More
Qilin Claims Ransomware Attack on Mecklenburg Schools
The Qilin ransomware gang has claimed attacks at Mecklenburg County Public Schools, stealing financial records and childrens’ medical files Read […]
it-sa 2025: Fast 1.000 Security-Anbieter am Start
Weggefährten der it-sa auf der ersten Pressekonferenz (von links): Claudia Plattner, BSI-Präsidentin, Ralf Wintergerst, Präsident des Bitkom, Prof. Norbert Pohlmann, Vorsitzender […]
It’s the bad news that many customers of Oracle E-Business Suite (EBS) have been dreading: reports of ransomware attacks targeting […]
Cl0p nutzt Schwachstelle bei Oracle aus
Die Cl0p-Bande nutzt Zero-Day-Schwachstelle bei Oracle für Cyberattacken aus. Dragos Asaftei / Shutterstock Oracle hat ein Notfall-Update veröffentlicht, um eine […]
Europol Calls for Stronger Data Laws to Combat Cybercrime
Europol’s Cybercrime Conference has warned that cybercriminals are exploiting new technologies faster than law enforcement can adapt Read More
Ransomware Group “Trinity of Chaos” Launches Data Leak Site
A new TOR data leak site published by the Trinity of Chaos ransomware group unveils 39 firms’ data and threatens […]
Gemini Trifecta: AI autonomy without guardrails opens new attack surface
Security researchers at Tenable revealed three distinct vulnerabilities across Gemini’s cloud assist, search optimization, and browsing components. If exploited, these […]
The Scattered Lapsus$ Hunters gang, which says it has stolen data from the Salesforce instances of dozens of international companies […]
Friday Squid Blogging: Squid Overfishing in the Southwest Atlantic
Article. Report. Read More
The World Economic Forum and Accenture offer a practical roadmap for organizations to leverage responsible AI into a competitive advantage. […]
Newly-discovered threat group hijacking IIS servers for SEO fraud, warns Cisco Talos
A Chinese-speaking cybercrime group is aggressively targeting vulnerable Internet Information Server (IIS) web servers for use in search engine optimization […]
Innovator Spotlight: Singulr AI
The AI Governance Tightrope: Enabling Innovation Without Compromising Security Cybersecurity leaders are facing a critical inflection point. The rapid emergence […]
AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense
Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real time response, and […]
Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud
Cisco Talos has identified a Chinese-speaking cybercrime group that targets high-value Internet Information Services (IIS) for SEO fraud Read More
Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing
In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these relationships bring […]
Hackers Target Unpatched Flaws in Oracle E-Business Suite
Patches for the targeted vulnerabilities were released in Oracle’s July 2025 security update Read More
Red Hat has updated its OpenShift AI Service after discovering a vulnerability with a CVSS rating of 9.9 that would […]
Daniel Miessler on the AI Attack/Defense Balance
His conclusion: Context wins Basically whoever can see the most about the target, and can hold that picture in their […]
US Government Shutdown to Slash Federal Cybersecurity Staff
The US government shutdown is estimated to result in around 65% of CISA staff being furloughed, with fears that threat […]
In February 2024, several British universities were hit by a major DDoS attack. In the past, a disruption to connectivity would […]
Extortion Emails Sent to Executives by Self-Proclaimed Clop Gang Member
The initial investigation shows early signs of links with the FIN11 and Clop cyber extortion groups Read More
Microsoft plots new path for Sentinel, adding agentic AI features
Microsoft has announced a raft of new AI features for Sentinel SIEM and Security Copilot as part of its push […]
Broadcom Issues Patches for VMware NSX and vCenter Security Flaws
Broadcom has released security patches for critical flaws affecting several VMware products Read More
Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimization
In the dynamic landscape of modern cybersecurity, Chief Information Security Officers (CISOs) often face a paradoxical challenge: the proliferation of […]
Shortcut-based Credential Lures Deliver DLL Implants
A new campaign has been observed using malicious Windows shortcuts in credential-themed ZIP files to deploy PowerShell script Read More
Navigating Holiday Threats: Strengthening PC Resilience with Desktops as a Service (DaaS)
The holiday season, often seen as a time for joy and celebration, has transformed into a crucial period for organizational […]
Smishing Campaigns Exploit Cellular Routers to Target Belgium
New smishing attacks exploit Milesight routers to send phishing texts targeting Belgian users Read More
Achieving Crypto Agility Through eFPGA: A Prerequisite for Secure ASIC and SoC Designs
In an era where digital threats evolve daily and quantum computing looms on the horizon, the need for true crypto […]
New Android RAT Klopatra Targets Financial Data
New Android RAT Klopatra is targeting financial institutions using advanced evasion techniques Read More
US Cuts Federal Funding for MS-ISAC Cybersecurity Program
The Trump administration wants CISA to transition to a “new model” for supporting local government agencies’ cyber strategy Read More
Datenleck bei Kido-Kindergärten
Eine Ransomware-Bande hat die Daten von mehr als 8.000 Kindern der Kido-Kindergärten gestohlen. New Africa – shutterstock.com Die Ransomware-Bande Randiant […]
Dutch Authorities Arrest Teens in Foreign Interference Case
While the exact suspicion was yet to be revealed it is linked to “foreign interference” Read More
AI-Generated Code Used in Phishing Campaign Blocked by Microsoft
Microsoft Threat Intelligence stopped an AI-driven credential phishing campaign using SVG files disguised as PDFs Read More
Understanding the OWASP AI Maturity Assessment
Today, almost all organizations use AI in some way. But while it creates invaluable opportunities for innovation and efficiency, it […]
Inside the Mind of a Threat Actor: What CISOs Must Learn Before the Next Breach
Cybersecurity isn’t a game of defense—it’s a game of anticipation. Yet too many CISOs and security leaders still think in […]
National Cyber Authorities Launch OT Security Guidance
The Five Eyes countries, Germany and the Netherlands are launching a standard for managing OT security Read More
Prompt Injection and Model Poisoning: The New Plagues of AI Security
You wake up. Your AI wakes up. Somewhere, a stranger types a sentence, and your AI listens. This is not […]
AsyncRAT Malware Campaign Found Targeting South American Hotels
A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the attention of […]
The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI
In today’s enterprise world, AI no longer just answers questions or writes emails, but it takes action. From copilots booking […]
Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance Plan
Generative AI (Gen AI) has emerged as a transformative force. From streamlining operations to enhancing customer experiences, AI-powered solutions offer […]
Meet LockBit 5.0: Faster ESXi drive encryption, better at evading detection
The LockBit gang has released a new version of its ransomware with improved ESXi drive encryption speed. However, a security […]
Friday Squid Blogging: Jigging for Squid
A nice story. Read More
Executive Order Brings US TikTok $14B Deal One Step Closer to Finalizing
Oracle’s oversight of an American version of TikTok will allow the app to comply with a 2024 act. The post […]
Securing the Journey: Cybersecurity Challenges in the Tourism Industry
This weekend is World Tourism Day, a celebration of the global travel industry and the cultural, economic, and social connections […]
Apple’s Feedback to EU Commission: Repeal Digital Markets Act
The EU will have to wait to get Live Translation and other features as Apple works on complying with the […]