Aug 23, 2023THNEncryption / Privacy Meta has once again reaffirmed its plans to roll out support for end-to-end encryption (E2EE)…
It’s been eight and half years since I first wrote about the need for security leadership representation in the boardroom….
Aug 23, 2023THNCryptocurrency / Cyber Attack The U.S. Federal Bureau of Investigation (FBI) on Tuesday warned that threat actors affiliated…
VMware has expanded its strategic partnership with Nvidia to enable private cloud infrastructure for the era of generative artificial intelligence…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
A new macOS-specific variant of the well known XLoader malware is being delivered disguised as the “OfficeNote” app. “Multiple submissions…
St Helens Borough Council in Merseyside has fallen victim to a suspected ransomware attack, by an as-yet undisclosed threat actor,…
America’s cyber defense agency Cybersecurity & Infrastructure Security Agency (CISA) published four advisories detailing threats to four Industrial Control Systems…
Download my transcription of Bill Evans’ piano solo in I’ve Got You Under My Skin below. The solo starts around…
If you give a kid a smartphone, they’re going to want a social media account. That’s not the start of…
In an era where digital transformation accelerates and cyber threats proliferate rapidly, the role of effective threat modeling in software…
Identity theft can have great financial impact on the victims, but the experienced emotional, physical and psychological impact can be…