week in security
21
Apr
2025

A week in security (April 12 – April 18)

April 18, 2025 – Text scams come in many forms and are an ever increasing threat doing an awful lot…

Friends in Vegas | Daniel Miessler
21
Apr
2025

Friends in Vegas | Daniel Miessler

I already did a post on my recent Vegas trip, but there’s a piece of it that I didn’t mention….

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code
21
Apr
2025

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising…

Naveen Goud
21
Apr
2025

Chinese smartphones now stealing cryptocurrency from wallets

The next time you’re looking for a budget-friendly smartphone, particularly one from a Chinese brand, you might want to proceed…

Why CISOs are watching the GenAI supply chain shift closely
21
Apr
2025

Why CISOs are watching the GenAI supply chain shift closely

In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders…

Go Through Your Address Book and Contact Everyone You Care About
21
Apr
2025

Go Through Your Address Book and Contact Everyone You Care About

I’ll try to avoid cliché, but for this post it’ll be difficult. I have a friend named Brad. I met…

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security
21
Apr
2025

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

A sophisticated phishing attack exploiting a loophole in Google’s OAuth infrastructure has surfaced, raising significant concerns about the security of…

Naveen Goud
21
Apr
2025

How the China-US Trade Tariff War Is Increasing Cybersecurity Concerns

The ongoing trade dispute between China and the United States, commonly referred to as the “tariff war,” has created far-reaching…

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
21
Apr
2025

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line…

Yokogawa Recorder Vulnerability
21
Apr
2025

Yokogawa Recorders Found Vulnerable By Default

A high-severity vulnerability has been discovered in a range of industrial recorder and data acquisition systems produced by Yokogawa Electric…

The Answer to Terrorism is Resilience
21
Apr
2025

The Answer to Terrorism is Resilience

Here’s what we should be saying to people who attack us, and to those who panic when we are attacked….

Cybercriminals blend AI and social engineering to bypass detection
21
Apr
2025

Cybercriminals blend AI and social engineering to bypass detection

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also…