The dark side of YouTube: Malicious links, phishing, and deepfakes
23
Apr
2025

The dark side of YouTube: Malicious links, phishing, and deepfakes

With billions of users, YouTube has become a tempting target for cybercriminals. They post malicious links in video descriptions and…

Does News Consumption Destroy Creativity?
23
Apr
2025

Does News Consumption Destroy Creativity?

I don’t know a single truly creative mind who is a news junkie – not a writer, not a composer,…

Phishing emails delivering infostealers surge 84%
23
Apr
2025

Phishing emails delivering infostealers surge 84%

Cybercriminals continued to shift to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to…

How Google Uses Reputation Data to Improve Security Across Its Properties
23
Apr
2025

How Google Uses Reputation Data to Improve Security Across Its Properties

Google researchers have combined a number of reputation techniques to create a system that is 99 percent successful in detecting…

Matt Kapko
23
Apr
2025

Verizon discovers spike in ransomware and exploited vulnerabilities

Cybercriminals and state-sponsored threat groups exploited vulnerabilities and initiated ransomware attacks with vigor last year, escalating the scope of their…

Insurance Companies Make U.S. Healthcare Expensive
23
Apr
2025

Insurance Companies Make U.S. Healthcare Expensive

Because insurers are paid a fixed percentage of the claims they administer, they have no incentive to hold down costs….

My Friend Writes Like This
23
Apr
2025

My Friend Writes Like This

A bird hit my windshield on the freeway, on the way home from work this morning. I pulled over on…

What This Site is About
23
Apr
2025

What This Site is About

And when I say “this site”, I’m really saying “me”. Existentialism: How to create our own meaning and our own…

ChatGPT Creates Working Exploit for CVE's Before Public PoCs Released
23
Apr
2025

ChatGPT Creates Working Exploit for CVE’s Before Public PoCs Released

In a development that could transform vulnerability research, security researcher Matt Keeley demonstrated how artificial intelligence can now create working…

Programming Atrophy
23
Apr
2025

Programming Atrophy

It’s stunning to me how stale one can become when they don’t code for a while. I just put together…

Cameron Camp
23
Apr
2025

Will super-smart AI be attacking us anytime soon?

What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better. 22 Apr 2025…

How to Secure the Extended Enterprise
23
Apr
2025

How to Secure the Extended Enterprise

Modern organizations rely on a sprawling network of third-party vendors, suppliers, and partners to drive innovation and operational efficiency. However,…