SEC should avoid ‘overly prescriptive’ AI rules, acting chair says
28
Mar
2025

SEC should avoid ‘overly prescriptive’ AI rules, acting chair says

Dive Brief: Acting Securities and Exchange Commission Chairman Mark Uyeda on Thursday called for a softer agency approach to artificial…

Outlook
28
Mar
2025

Microsoft fixes button that restores classic Outlook client

​Two weeks ago, Microsoft said it was investigating an issue causing the new Outlook email client to crash when users…

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands
28
Mar
2025

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS mail exchange (MX) records to…

My OpenAI Event Predictions (May 2024)
28
Mar
2025

My OpenAI Event Predictions (May 2024)

I don’t have any insider knowledge—unless you count the Information article that just leaked about a possible Her-like assistant—but I…

Cybersecurity firms brace for impact of potential Oracle Cloud breach
28
Mar
2025

Cybersecurity firms brace for impact of potential Oracle Cloud breach

Information security firms are taking measures to protect customers and their own networks as they wait for official guidance following…

Meerkat
28
Mar
2025

Phishing-as-a-service operation uses DNS-over-HTTPS for evasion

A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS over HTTPS (DoH) protocol to…

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries
28
Mar
2025

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries

A critical SQL injection vulnerability, tracked as CVE-2025-24799, has been identified in GLPI, a widely used open-source IT Service Management (ITSM) tool….

Countering nation-state cyber espionage: A CISO field guide
28
Mar
2025

Countering nation-state cyber espionage: A CISO field guide

Quorum Cyber’s recently released Global Cyber Risk Outlook Report 2025 outlines how nation-state cyber activities, particularly from China, are evolving….

One Apple Fanboy's White-hot Anger at the iPad Commercial
28
Mar
2025

One Apple Fanboy’s White-hot Anger at the iPad Commercial

Before I go into this, I want to articulate exactly how much of an Apple fanboy I am. I camped…

How regulatory standards and cyber insurance inform each other
28
Mar
2025

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some…

Ubuntu
28
Mar
2025

New Ubuntu Linux security bypasses require manual mitigations

Three security bypasses have been discovered in Ubuntu Linux’s unprivileged user namespace restrictions, which could be enable a local attacker…

A Framework for Detecting Backdoor Attacks in Deep Learning Models
28
Mar
2025

A Framework for Detecting Backdoor Attacks in Deep Learning Models

Deep learning models, increasingly integral to safety-critical systems like self-driving cars and medical devices, are vulnerable to stealthy backdoor attacks….