š Thehackernews
4 articles
See GitGuardian in action ā”ļø Interactive TourIn this self-guided tour, discover key features that security teams and IAM leaders love.
No summary available.
š Csoonline
3 articles
opinionWhere CISOs need to see Splunk go nextSplunkās latest .Conf focused on machine data, federation, resiliency, and easing the cybersecurity burden. Thatās a good start for the cyber giant, but from security leadersā perspective, work remains.By Jon OltsikSep 18, 20257 minsSecurity Information and Event Management SoftwareSecurity Operations CenterTechnology Industry
Splunkās latest .Conf focused on machine data, federation, resiliency, and easing the cybersecurity burden. Thatās a good start for the cyber giant, but from security leadersā perspective, work remain...
opinionWhere CISOs need to see Splunk go nextSplunkās latest .Conf focused on machine data, federation, resiliency, and easing the cybersecurity burden. Thatās a good start for the cyber giant, but from security leadersā perspective, work remains.By Jon OltsikSep 18, 20257 minsSecurity Information and Event Management SoftwareSecurity Operations CenterTechnology Industry
Splunkās latest .Conf focused on machine data, federation, resiliency, and easing the cybersecurity burden. Thatās a good start for the cyber giant, but from security leadersā perspective, work remain...
opinionWhere CISOs need to see Splunk go nextSplunkās latest .Conf focused on machine data, federation, resiliency, and easing the cybersecurity burden. Thatās a good start for the cyber giant, but from security leadersā perspective, work remains.By Jon OltsikSep 18, 20257 minsSecurity Information and Event Management SoftwareSecurity Operations CenterTechnology Industry
Splunkās latest .Conf focused on machine data, federation, resiliency, and easing the cybersecurity burden. Thatās a good start for the cyber giant, but from security leadersā perspective, work remain...
š Darkreading
0 articles
No articles found for this source.
š Securityweek
1 articles
Israeli Cyber Fund Glilot Capital Raises $500 Million
The top-performing venture fund heavily invests in startups building cybersecurity, AI, and enterprise software.
š Infosecurity-Magazine
5 articles
Why Shadow AI Is the Next Big Governance Challenge for CISOs
No summary available.
FileFix Campaign Using Steganography and Multistage Payloads
No summary available.
Critical CVEs in Chaos-Mesh Enable In-Cluster Code Execution
A trio of critical vulnerabilities in the Chaos-Mesh platform allow in-cluster attackers to run arbitrary code, even in default configuration
TaskUs Employees Behind Coinbase Breach, US Court Filing Alleges
No summary available.
Vibe Coding: Managing the Strategic Security Risks of AI-Accelerated Development
Murali Sastry says vibe coding is the future, but only for those prepared to manage its security risks
š Krebsonsecurity
5 articles
Self-Replicating Worm Hits 180+ Software Packages
At least 187 code packages made available through the JavaScript repositoryNPMhave been infected with a self-replicating worm that steals credentials from developers and publishes those secrets onGitH...
Bulletproof Host Stark Industries Evades EU Sanctions
In May 2025, the European Union levied financial sanctions on the owners ofStark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and...
Microsoft Patch Tuesday, September 2025 Edition
Microsoft Corp.today issued security updates to fix more than 80 vulnerabilities in itsWindowsoperating systems and software. There are no known āzero-dayā or actively exploited vulnerabilities in thi...
18 Popular Code Packages Hacked, Rigged to Steal Crypto
At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved i...
GOP Cries Censorship Over Spam Filters That Work
The chairman of theFederal Trade Commission(FTC) last week sent a letter to Googleās CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block simi...
š Threatpost
5 articles
Student Loan Breach Exposes 2.5M Records
2.5 million people were affected, in a breach that could spell more trouble down the line.
Watering Hole Attacks Push ScanBox Keylogger
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Tentacles of ā0ktapusā Threat Group Victimize 130 Firms
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Ransomware Attacks are on the Rise
Lockbit is by far this summerās most prolific ransomware group, trailed by two offshoots of the Conti group.
Inside the Hackersā Toolkit ā Podcast
No summary available.
š Bleepingcomputer
5 articles
Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service
No summary available.
SonicWall warns customers to reset credentials after breach
No summary available.
Microsoft: WMIC will be removed after Windows 11 25H2 upgrade
No summary available.
Google nukes 224 Android malware apps behind massive ad fraud campaign
No summary available.
Google patches sixth Chrome zero-day exploited in attacks this year
No summary available.
š Grahamcluley
5 articles
Varonis Connect!
No summary available.
Infosecurity Europe 2025
No summary available.
Infosecurity Europe 2025
No summary available.
Webinar: āCredential Security in the Age of AI: Insights for IT Leadersā
No summary available.
āAI hijacked this webinarā
No summary available.
š Securitytrails
0 articles
No articles found for this source.
š Nakedsecurity Sophos
5 articles
Update on Naked Security
No summary available.
Momās Meals issues āNotice of Data Eventā: What to know and what to do
No summary available.
S3 Ep149: How many cryptographers does it take to change a light bulb?
No summary available.
Using WinRAR? Be sure to patch against these code execution bugsā¦
No summary available.
Smart light bulbs could give away your password secrets
No summary available.
š Schneier
5 articles
Hacking Electronic Safes
Vulnerabilities inelectronic safesthat use Securam Prologic locks:
Microsoft Still Uses RC4
Senator Ron Wyden hasaskedthe Federal Trade Commission toinvestigateMicrosoft over its continued use of the RC4 encryption algorithm. The letter talks about a hacker technique calledKerberoasting, tha...
Lawsuit About WhatsApp Security
Attaullah Baig, WhatsAppās former head of security, has filed awhistleblowerlawsuit alleging that Facebook deliberately failed to fix a bunch of security flaws, in violation of its 2019 settlement agr...
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak:
Assessing the Quality of Dried Squid
Research:
š Tripwire
5 articles
Products & Services
No summary available.
Solutions
No summary available.
Resources
No summary available.
About
No summary available.
Contact Information
No summary available.
š Cyberscoop
5 articles
Attack on SonicWallās cloud portal exposes customersā firewall configurations
No summary available.
Microsoft seizes hundreds of phishing sites tied to massive credential theft operation
No summary available.
Senators, FBI Director Patel clash over cyber division personnel, arrests
No summary available.
BreachForums founder resentenced to three years in prison
No summary available.
Apple addresses dozens of vulnerabilities in latest software for iPhones, iPads and Macs
No summary available.
š Helpnetsecurity
1 articles
Newsletters
No summary available.