The Area Under the Curve: How AI Expands Human Work Capacity
The overwhelming volume of work that needs to be done (click for full size) Every minute, millions of security events flow through corporate networks. Thousands…
The overwhelming volume of work that needs to be done (click for full size) Every minute, millions of security events flow through corporate networks. Thousands…
This is a very old post that I no longer agree with, but it’s still worth reading. One thing that interests me about politics is…
I’ve been thinking a lot about the future lately. A couple days ago I started fantisizing about what nanotechnology > could mean to the medical…
I’ve been thinking a lot about the future lately. A couple days ago I started fantisizing about what nanotechnology > could mean to the medical…
A PoisonSeed phishing campaign is bypassing FIDO2 security key protections by abusing the cross-device sign-in feature in WebAuthn to trick users into approving login authentication requests…
Fortinet FortiWeb flaw CVE-2025-25257 exploited hours after PoC release Pierluigi Paganini July 19, 2025 Hackers exploited a Fortinet FortiWeb flaw the same day a PoC…
When, one year ago today, a buggy update to software sold by the cybersecurity firm CrowdStrike took down millions of computers around the world and…
I’ve been saying for years that the time of the mediocre security professional is nearly up. We in information security are a bunch of maggots…
I’ve been saying for years that the time of the mediocre security professional is nearly up. We in information security are a bunch of maggots…
The way most of us take in daily news is horribly inefficient. The problem isn’t how fast we read, or even what sites we go…
The way most of us take in daily news is horribly inefficient. The problem isn’t how fast we read, or even what sites we go…
Popular JavaScript libraries were hijacked this week and turned into malware droppers, in a supply chain attack achieved via targeted phishing and credential theft. The npm…