This is a current list of where and when I am scheduled to speak: I’m speaking and signing books at the Chicago Public Library in Chicago, Illinois, USA, at 6:00 PM CT on February 5, 2026. Details to come. I’m…
Tag: EN
Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
As 2025 nears its close, the cybersecurity landscape shows no signs of slowing down. This week’s developments highlight how rapidly the threat environment continues to evolve with major zero-day vulnerabilities targeting Windows, Chrome, and Apple devices, each actively exploited in…
2025: The Year Cybersecurity Crossed the AI Rubicon
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why. The post 2025: The Year Cybersecurity Crossed the AI Rubicon appeared first…
Cybercriminals Exploit Law Enforcement Data Requests to Steal User Information
While most of the major data breaches occur as a result of software vulnerabilities, credit card information theft, or phishing attacks, increasingly, identity theft crimes are being enacted via an intermediary source that is not immediately apparent. Some of…
Holiday Scam Alerts Rise: How to Spot Fake Links and Stay Safe From Phishing Attacks
As the festive season rolls in with cozy drinks, twinkling lights and gift exchanges, it also brings a sharp spike in online scams. Cybercriminals are working overtime during the holidays, using increasingly advanced tactics to trick people into clicking…
FTC Refuses to Lift Ban on Stalkerware Company that Exposed Sensitive Data
The surveillance industry banned a stalkerware maker after a data breach leaked information of its customers and the people they were spying on. Consumer spyware company Support King can’t sell the surveillance software now, the US Federal Trade Commission (FTC)…
Security Affairs newsletter Round 554 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Experts…
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 75
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter UDPGangster Campaigns Target Multiple Countries Ransomware Trends in Bank Secrecy Act Data Between 2022 and 2024 Return of ClayRat:…
CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
A critical alert regarding an active zero-day vulnerability affecting the Microsoft Windows Cloud Files Mini Filter Driver. The vulnerability poses a significant risk to organizations running affected Windows systems and requires immediate remediation efforts. CISA reports that the vulnerability, tracked…
7 Best Security Awareness Training Platforms For MSPs in 2026
Managed service providers (MSPs) are increasingly popular cyberattack targets. These entities often have numerous endpoints and distributed networks that create many opportunities for adversaries seeking weaknesses to exploit. Security awareness training is just one aspect of defense efforts, but it…
CyberVolk Ransomware Fails to Gain Traction After Encryption Misstep
CyberVolk, a pro-Russian hacktivist collective, has intensified its campaign of ransomware-driven intimidation against entities perceived as hostile to Moscow in the past year, marking a notable change in both scale and presentation, marking a notable shift in its operations. …
Gartner Warns: Block AI Browsers to Avert Data Leaks and Security Risks
Analyst company Gartner has issued a recommendation to block AI-powered browsers to help organizations protect business data and cybersecurity. The company says most of these agentic browsers—browsers using autonomous AI models for interacting with web content and automating tasks…
Experts found an unsecured 16TB database containing 4.3B professional records
An open 16TB database exposed 4.3B professional records. It was unsecured and only closed after researchers alerted the owner. A 16TB unsecured MongoDB database exposed about 4.3 billion professional records, mainly LinkedIn-style data, enabling large-scale AI-driven social-engineering attacks. The researcher…
Week in review: 40 open-source tools securing the stack, invisible IT to be the next workplace priority
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 40 open-source tools redefining how security teams secure the stack Open source security software has become a key way for teams to get flexibility, transparency,…
2025 Cyber Attack Recap: The Year of AI-Augmented Threats and Supply Chain Havoc
The year 2025 marked a turning point in global cybersecurity. Cyber attacks escalated in scale, automation, and impact—affecting… The post 2025 Cyber Attack Recap: The Year of AI-Augmented Threats and Supply Chain Havoc appeared first on Hackers Online Club. This…
How does NHI support the implementation of least privilege?
What Are Non-Human Identities and Why Are They Essential for Cybersecurity? Have you ever pondered the complexity of cybersecurity beyond human interactions? Non-Human Identities (NHIs) are becoming a cornerstone in securing digital environments. With the guardians of machine identities, NHIs…
How are secrets scanning technologies getting better?
How Can Organizations Enhance Their Cloud Security Through Non-Human Identities? Have you ever wondered about the unseen challenges within your cybersecurity framework? Managing Non-Human Identities (NHIs) and their associated secrets has emerged as a vital component in establishing a robust…
Can Agentic AI provide solutions that make stakeholders feel assured?
How Are Non-Human Identities Transforming Cybersecurity Practices? Are you aware of the increasing importance of Non-Human Identities (NHIs)? Where organizations transition towards more automated and cloud-based environments, managing NHIs and secrets security becomes vital. These machine identities serve as the…
Why are companies free to choose their own AI-driven security solutions?
What Makes AI-Driven Security Solutions Crucial in Modern Cloud Environments? How can organizations navigate the complexities of cybersecurity to ensure robust protection, particularly when dealing with Non-Human Identities (NHIs) in cloud environments? The answer lies in leveraging AI-driven security solutions,…
ClickFix Attacks Still Using the Finger, (Sat, Dec 13th)
Introduction This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ClickFix Attacks Still Using the Finger, (Sat, Dec 13th)