27
Aug
2025

The Two Primary Limitations to Our Creativity

Two types of creative barriers that limit our potential I think there are two primary ways we limit our own…

Citrix offices, California
27
Aug
2025

Citrix NetScaler customers hit by third actively exploited zero-day vulnerability since June

Citrix and cybersecurity researchers warn a critical, zero-day vulnerability affecting multiple versions of Citrix NetScaler products is under active exploitation….

Citrix
27
Aug
2025

Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks

Citrix fixed three NetScaler ADC and NetScaler Gateway flaws today, including a critical remote code execution flaw tracked as CVE-2025-7775 that…

APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
27
Aug
2025

APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files

Researchers have unveiled ONEFLIP, a novel inference-time backdoor attack that compromises full-precision deep neural networks (DNNs) by flipping just one…

Coles eyes AI to keep shelves stocked in next viral recipe trend
27
Aug
2025

Coles eyes AI to keep shelves stocked in next viral recipe trend

Coles Group is hoping AI can play a role in better preparing the retailer and its value chain for the…

27
Aug
2025

Who’s Not Getting Laid Off?

Who’s not being laid off? That’s my question. I’m thinking about all these layoffs and trying to figure out if…

ConnectWise warns of threat activity linked to suspected nation-state hackers
27
Aug
2025

Hackers steal data from Salesforce instances in widespread campaign

Hackers stole user credentials from Salesforce customers in a widespread campaign earlier this month, according to researchers at Google Threat…

Researchers flag code that uses AI systems to carry out ransomware attacks
27
Aug
2025

Researchers flag code that uses AI systems to carry out ransomware attacks

Researchers at cybersecurity firm ESET claim to have identified the first piece of AI-powered ransomware in the wild. The malware,…

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks
27
Aug
2025

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks

Cybersecurity landscapes are undergoing a paradigm shift as threat actors increasingly deploy agentic AI systems to orchestrate sophisticated social engineering…

Circles.Life fined over identity checking failures during mobile porting
26
Aug
2025

Exetel fined $694k over system ‘vulnerability’ in mobile number porting

Exetel has been penalised $694,000 after scammers were able to port mobile numbers to the telco and use them to…

26
Aug
2025

The Third Limitation to Creativity

I just wrote a new piece about the two primary limitations to creativity. You should check it out. But after…

Matt Kapko
26
Aug
2025

Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent

Google Threat Intelligence Group warned about a “widespread data theft campaign” that compromised hundreds of Salesforce customers over a 10-day…