The Art Quality Tier List (AQTL)
28
Aug
2025

The Art Quality Tier List (AQTL)

I think I finally figured out what art is. Took me decades. Here’s my definition, which has two primary components:…

Farmers Insurance Cyber Attack - 1.1 Million Customers Data Exposed in Salesforce Attack
28
Aug
2025

Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack

Farmers Insurance Exchange and its subsidiaries recently disclosed a significant security incident that compromised personal information of approximately 1.1 million…

Innovator Spotlight: ManageEngine
28
Aug
2025

Innovator Spotlight: ManageEngine – Cyber Defense Magazine

 Unifying IT Management and Security with ManageEngine In today’s digital landscape, IT can feel like juggling flaming torches, one wrong…

™
28
Aug
2025

Check Point Named Leader in Gartner 2025 Magic Quadrant for Hybrid Mesh Firewalls

Check Point Software has been recognized as a Leader in the 2025 Gartner® Magic Quadrant for Hybrid Mesh Firewalls, with…

SquareX Discloses Major Passkey Vulnerability at DEF CON 33
28
Aug
2025

SquareX Discloses Major Passkey Vulnerability at DEF CON 33

It is no secret that passwords are highly susceptible to phishing and brute force attacks. This led to the mass…

Policy, SOPs, and AI Are All You Need
28
Aug
2025

Policy, SOPs, and AI Are All You Need

I think InfoSec—and in fact business management in general—is evolving into the combination of four things: Policy (entity identity/goals) State…

Salesloft Drift compromised en masse, impacting all third-party integrations
28
Aug
2025

Salesloft Drift compromised en masse, impacting all third-party integrations

Salesloft Drift customers are compromised in a much more expansive downstream attack spree than previously thought, potentially ensnaring any user…

South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
28
Aug
2025

South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims

South Korean authorities have successfully extradited a Chinese national suspected of orchestrating one of the most sophisticated hacking operations targeting…

Anthropic Blocks Hackers Attempting to Exploit Claude AI for Cyber Attacks
28
Aug
2025

Anthropic Blocks Hackers Attempting to Exploit Claude AI for Cyber Attacks

Anthropic, a leading AI research company, has successfully disrupted multiple attempts by cybercriminals to misuse its Claude AI model for…

CISA Adds Citrix and Git Flaws to KEV Catalogue Amid Active Exploitation
28
Aug
2025

CISA Adds Citrix and Git Flaws to KEV Catalogue Amid Active Exploitation

CISA has added three actively exploited vulnerabilities in Citrix and Git to its KEV Catalogue. Federal agencies must patch the…

How My Projects Fit Together
28
Aug
2025

How My Projects Fit Together

When people look at the various projects I’ve put out over the last year, they often ask which is the…

ChromeOS
28
Aug
2025

Google shares workarounds for auth failures on ChromeOS devices

Google is working to resolve authentication issues affecting some ChromeOS devices, which are preventing affected users from signing into their Clever…