Category: EN

How Biometric Data Collection Affects Workers

  Modern workplaces are beginning to track more than just employee hours or tasks. Today, many employers are collecting very personal information about workers’ bodies and behaviors. This includes data like fingerprints, eye scans, heart rates, sleeping patterns, and even…

Attackers exploit Fortinet flaws to deploy Qilin ransomware

Qilin ransomware now exploits Fortinet vulnerabilities to achieve remote code execution on impacted devices. Threat intelligence firm PRODAFT warned that Qilin ransomware (aka Phantom Mantis) group targeted multiple organizations between May and June 2025 by exploiting multiple FortiGate vulnerabilities, including…

Victory! Austin Organizers Cancel City’s Flock ALPR Contract

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Austin organizers turned out to rebuke the city’s misguided contract with Flock Safety— and won. This successful pushback from the community means at the end of the…

LLM04: Data & Model Poisoning – FireTail Blog

Jun 06, 2025 – Lina Romero – LLM04: Data & Model Poisoning Excerpt: In this blog series, we’re breaking down the OWASP Top 10 risks for LLMs and explaining how each one manifests and can be mitigated. Today’s risk is…

Unleashing Powerful Cloud-Native Security Techniques

Is Managing Non-Human Identities the Key to Achieving Robust Cloud-Native Security? Where humans and machines square off, intent on breaching each other’s defenses. However, an important facet often goes unnoticed – Non-Human Identities (NHIs). NHIs are machine identities, especially in…

Why Securing NHIs Reduces Your Cyber Risk

Why is NHI Security Critical in Risk Management? Have you ever considered the potential security risk lurking? The reality is that the growing complexity of IT infrastructures, particularly in the cloud, presents new challenges for risk management and cyber protection.…

Are Your Cloud NHIs Truly Protected?

Are You Doing Enough to Secure Your Cloud NHIs? Is your organization’s cloud security robust enough to protect your non-human identities (NHIs)? This is a question that has been increasingly haunting CISOs, cybersecurity professionals, and businesses thriving in the cloud.…

Ensuring Certainty in NHIs Lifecycle Management

What Role does Certainty Play in the Management of NHIs Lifecycle? Where data breaches and cyber-threats pose significant risks, any security professional worth their salt knows the importance of having robust and efficient management practices. NHIs lifecycle management serves as…

EFF to Department Homeland Security: No Social Media Surveillance of Immigrants

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> EFF submitted comments to the Department of Homeland Security (DHS) and its subcomponent U.S. Citizenship and Immigration Services (USCIS), urging them to abandon a proposal to collect…