From Alcatraz to Zero Trust: A Journey to RSA 2025 in San Francisco
During the winter months, the fog hangs heavy over San Francisco, mirroring the shroud of uncertainty that often accompanies discussions around cybersecurity. As I prepare…
During the winter months, the fog hangs heavy over San Francisco, mirroring the shroud of uncertainty that often accompanies discussions around cybersecurity. As I prepare…
A pastor at a Pasco, Washington, church has been indicted on 26 counts of fraud for allegedly operating a cryptocurrency scam that defrauded investors of millions…
In 2024, phishing remains one of the most prevalent and dangerous cybersecurity threats. Despite advancements in technology and increased awareness, cybercriminals continue to exploit human…
In today’s digital landscape, the increasing reliance on Application Programming Interfaces (APIs) brings significant security challenges that organizations must address. The Salt Labs State of API…
How a researcher earned $100,000 hacking a Facebook server Pierluigi Paganini January 12, 2025 Facebook paid $100,000 to a researcher for discovering a bug that…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)Ivanti has fixed…
IBM disclosed a significant vulnerability in its watsonx.ai platform, potentially exposing users to cross-site scripting (XSS) attacks. The vulnerability, identified as CVE-2024-49785, affects both IBM…
DoJ charged three Russian citizens with operating crypto-mixing services Pierluigi Paganini January 11, 2025 The U.S. Department of Justice charged three Russian citizens with operating…
The IRS relaunched its Identity Protection Personal Identification Number (IP PIN) program this week and all US taxpayers are encouraged to enroll for added security against…
A deceptive proof-of-concept (PoC) exploit for CVE-2024-49113 (aka “LDAPNightmare”) on GitHub infects users with infostealer malware that exfiltrates sensitive data to an external FTP server.…
The surge in cyberattacks and the emerging role of Generative AI The importance of cyber security tools in protecting sensitive information, sustaining organization’s resilience and…
SUMMARY Phishing Scam Targets Job Seekers: Cybercriminals impersonate CrowdStrike recruiters to distribute cryptominer malware via fake job offers. Malware Delivery: Victims are tricked into downloading…