Our team stumbled upon a disturbing array of SpyNote spyware samples lurking in open directories across the internet. These misconfigured…
Cybercriminals are finding clever new ways to trick people, even on the official websites of major companies. Malwarebytes Senior Director…
The Verizon Data Breach Investigations Report (DBIR) is one of cybersecurity’s most authoritative annual reports. The 2025 DBIR highlights critical…
Krispy Kreme Doughnut Corporation has confirmed a significant data breach that exposed the personal information of over 160,000 individuals following…
Toy company Mattel has announced a deal with OpenAI to create AI-powered toys, but digital rights advocates have urged caution….
In a twist of bureaucratic brilliance that Yes, Minister fans will appreciate, the civil service is rolling out a suite…
4 ways Google uses AI for security, catalog of AWS threat actor techniques, training a custom small language model to…
The U.S. Department of Justice has seized more than $225 million in cryptocurrency linked to investment fraud and money laundering…
Security researchers from the Trellix Advanced Research Centre have uncovered a sophisticated malware campaign exploiting the widely trusted jQuery Migrate…
When organizations, good or bad, start hoarding collections of login credentials the numbers quickly add up. Take the 184 million…
Among the questions a head of technology may ponder are, what does it mean to be innovative, and perhaps, what…
Microsoft has announced new Windows 365 security defaults starting in the second half of 2025 and affecting newly provisioned and…






![[tl;dr sec] #284 – Google Cloud CISO Interview, AWS Threat Technique Catalog, Finding Secrets with AI [tl;dr sec] #284 - Google Cloud CISO Interview, AWS Threat Technique Catalog, Finding Secrets with AI](https://image.cybernoz.com/wp-content/uploads/2025/06/tldr-sec-284-Google-Cloud-CISO-Interview-AWS-Threat.png)




