Editorial | Concerted effort will be required to fight scamming scourge in Hong Kong
22
Apr
2025

Editorial | Concerted effort will be required to fight scamming scourge in Hong Kong

The prevalence, scale and complexity of scams targeting Hong Kong people have become an epidemic requiring concerted action on all…

Cybersecurity Metrics That Matter for Board-Level Reporting
22
Apr
2025

Cybersecurity Metrics That Matter for Board-Level Reporting

In today’s digital-first business environment, cyber threats are not just an IT problem they’re a core business risk. Board members…

Sushi Sushi makes progress with digital transformation
22
Apr
2025

Sushi Sushi makes progress with digital transformation

Sushi Sushi, an Australian chain with 170 locations, is expecting to make “good headway” with a digital transformation that has…

A Proposed Foundation for Human Government
22
Apr
2025

A Proposed Foundation for Human Government

I have an idea for a potentially universal guideline for maturing as a civilization: Humans should use a combination of…

Protecting Against Insider Threats - Strategies for CISOs
22
Apr
2025

Protecting Against Insider Threats – Strategies for CISOs

In the modern enterprise, cybersecurity is no longer just a technical concern it is a boardroom priority. The frequency and…

My Current Thoughts on Israel
22
Apr
2025

My Current Thoughts on Israel

My thinking on Israel has changed a lot over the years. I’ve spent a few weeks there while in my…

Zscaler Identifies New Mustang Panda Cyber Activity
22
Apr
2025

Zscaler Identifies New Mustang Panda Cyber Activity

Following a recent US-led court-authorised operation that removed malware from over 4,200 infected networks, new activity has emerged from the…

New Phishing Attack Appending Weaponized HTML Files Inside SVG Files
22
Apr
2025

New Phishing Attack Appending Weaponized HTML Files Inside SVG Files

Cybersecurity experts have identified a sophisticated new phishing technique that exploits the SVG (Scalable Vector Graphics) file format to deliver…

The Principle of Many Truths
22
Apr
2025

The Principle of Many Truths

I’ve been thinking recently about a concept I call “The Principle of Many Truths”. It’s a way of explaining why…

North Korean IT Workers Using Real-time Deepfake to Infiltrate Organizations via Remote Job
22
Apr
2025

North Korean IT Workers Using Real-time Deepfake to Infiltrate Organizations via Remote Job

In a concerning evolution of cyber infiltration tactics, North Korean IT workers have begun deploying sophisticated real-time deepfake technology during…

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models
22
Apr
2025

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to…

Using jk vs. jj for ESC Remapping in Vim by Steve Losh
22
Apr
2025

Using jk vs. jj for ESC Remapping in Vim by Steve Losh

Some people prefer using jj instead of jk, but I prefer jk for two reasons: jk is typed with two…