The Connected Web: Why It’s Time For Strong Authentication
It’s getting exciting in the world of cross-network authentication. Let’s review. I can now: sign into Digg > using Facebook > sign into DISQUS >…
It’s getting exciting in the world of cross-network authentication. Let’s review. I can now: sign into Digg > using Facebook > sign into DISQUS >…
A sophisticated new phishing campaign has emerged, delivering the DeerStealer malware through weaponized .LNK shortcut files that exploit legitimate Windows binaries in a technique known…
A sophisticated supply chain attack has compromised several widely-used npm packages, including eslint-config-prettier and eslint-plugin-prettier, after threat actors successfully stole maintainer authentication tokens through a…
A sophisticated phishing campaign has emerged targeting Node.js developers through a meticulously crafted attack that impersonates the official npm package registry. The malicious operation utilizes…
In the spirit of improving my debating skills (both written and oral) I’m setting out on a short project to learn, re-familiarize, and remind myself…
In the spirit of improving my debating skills (both written and oral) I’m setting out on a short project to learn, re-familiarize, and remind myself…
Check Point Software has appointed Jonathan Zanger as its new Chief Technology Officer, tasking the former Trigo executive with driving the company’s global cybersecurity and…
A targeted attack against a U.S.-based certified public accounting firm was discovered in May 2025 by cybersecurity experts, according to a recent study described in…
The Clear Linux OS team has announced the shutdown of the project, marking the end of its 10-year existence in the open-source ecosystem. Clear Linux…
A new wave of cyber-attacks has emerged, exploiting Windows shortcut files (.LNK) combined with legitimate system utilities collectively known as Living-off-the-Land Binaries and Scripts (LOLBin/S)…
The government may be seeking to pull back from a diplomatic row with the US over UK demands to require Apple to give the UK…
A phishing campaign is bypassing FIDO key authentication by exploiting cross-device sign-in features, a managed detection and response (MDR) provider has discovered. The attack campaign,…