Tomáš Foltýn
11
Apr
2025

Laurie Anderson: Building an ARK

The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on…

Google Introduces A2A Protocol, Empowering AI Agents to Team Up and Automate Workflows
11
Apr
2025

Google Introduces A2A Protocol, Empowering AI Agents to Team Up and Automate Workflows

Google Cloud announced the launch of a pioneering open protocol named Agent2Agent (A2A), aiming to revolutionize how AI agents interact…

npm Malware Targets Atomic and Exodus Wallets to Hijack Crypto Transfers
11
Apr
2025

npm Malware Targets Atomic and Exodus Wallets to Hijack Crypto Transfers

TL;DR – ReversingLabs has identified a malicious npm package, “pdf-to-office,” that targets Atomic and Exodus crypto wallet users by silently…

Western Sydney University SSO system breached
10
Apr
2025

Western Sydney University SSO system breached

Western Sydney University has experienced its fourth cyber incident in two years, this time affecting the data of 10,000 current…

Whole Foods Elitism | Daniel Miessler
10
Apr
2025

Whole Foods Elitism | Daniel Miessler

I like the way Whole Foods makes me feel, but I don’t like the fact that it makes me feel…

This month in security with Tony Anscombe – February 2025 edition
10
Apr
2025

This month in security with Tony Anscombe – February 2025 edition

Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it’s a wrap on…

RansomHub RaaS in Disarray After Affiliate Chat Access Suddenly Revoked
10
Apr
2025

RansomHub RaaS in Disarray After Affiliate Chat Access Suddenly Revoked

RansomHub, a leading Ransomware-as-a-Service (RaaS) group that emerged in early 2024, has found itself grappling with internal turmoil. The instability…

U.S. CISA adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog
10
Apr
2025

U.S. CISA adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Linux Kernel flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 10, 2025 U.S. Cybersecurity and Infrastructure…

A Crazy Idea Regarding the Obama Administration and Security
10
Apr
2025

A Crazy Idea Regarding the Obama Administration and Security

I have a wicked crazy idea. What if we in the information security community were to organize a campaign to…

Judges strike skeptical note of NSO Group’s argument to dismiss case from El Salvadoran journos
10
Apr
2025

Judges strike skeptical note of NSO Group’s argument to dismiss case from El Salvadoran journos

A panel of U.S. judges considering an appeal of a ruling that went against El Salvadoran journalists suing NSO Group…

Bernhard Schölkopf: Is AI intelligent?
10
Apr
2025

Bernhard Schölkopf: Is AI intelligent?

With AI’s pattern recognition capabilities well-established, Mr. Schölkopf’s talk shifts the focus to a pressing question: what will be the…

Hackers exploit WordPress plugin auth bypass hours after disclosure
10
Apr
2025

Hackers exploit WordPress plugin auth bypass hours after disclosure

Hackers started exploiting a high-severity flaw that allows bypassing authentication in the OttoKit (formerly SureTriggers) plugin for WordPress just hours after…