Archive tools

Search cybersecurity, privacy, and AI risk briefings

Find briefings by keyword, reporting lane, or recurring tag. Search stays local to the static archive and is designed for quick scanning rather than full-text clutter.

1 min read

73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

Attackers can compromise systems in minutes while patching and response still take hours or days. Picus Security breaks down why autonomous validation is becoming critical for modern defense strategies. Anthropic released its newest fron…

  • ai-risk
  • cloud
  • vulnerabilities
  • threat-intelligence

1 min read

OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities

The UK’s AI Security Institute evaluated GPT-5.5’s ability to find security vulnerabilities, and found that it is comparable to Claude Mythos. Note that the OpenAI model is generally available. Here is the Institute’s evaluation of Mytho…

  • ai-risk
  • vulnerabilities

1 min read

Patch Tuesday, May 2026 Edition

New security development detected from Krebs on Security. Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in hum…

  • ai-risk
  • cloud
  • vulnerabilities
  • regulation

1 min read

Hackers abuse Google ads, Claude.ai chats to push Mac

Attackers are abusing Google Ads and legitimate Claude.ai shared chats in an active malvertising campaign. Users searching for "Claude mac download" may come across sponsored search results that list claude.ai as the target website, but…

  • ai-risk
  • threat-intelligence

1 min read

Why Changing Passwords Doesn’t End an Active Directory Breach

Resetting a password doesn't always remove attackers from Active Directory. Specops Software explains how cached credentials and Kerberos tickets can keep attackers authenticated after a reset. Password resets are often the first respons…

  • security

1 min read

JDownloader site hacked to replace installers with Python RAT

The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows and Linux installers, with the Windows payload found deploying a Python-based remote access trojan.

  • security
  • threat-intelligence

1 min read

Insider Betting on Polymarket

Insider trading is rife on Polymarket: Analysis by the Anti-Corruption Data Collective, a non-profit research and advocacy group, found that long-shot bets—­defined as wagers of $2,500 or more at odds of 35 percent or less—­on the platfo…

  • security
  • enforcement

1 min read

Canvas Breach Disrupts Schools & Colleges Nationwide

New security development detected from Krebs on Security. An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the Un…

  • security
  • data-security
  • network-edge
  • public-sector

1 min read

Trellix source code breach claimed by RansomHouse hackers

The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion.

  • security
  • vulnerabilities
  • regulation
  • threat-intelligence

1 min read

Why More Analysts Won’t Solve Your SOC’s Alert Problem

Attackers move faster than overwhelmed SOC teams can realistically investigate alerts. Prophet Security breaks down how AI can help analysts investigate alerts faster and focus on real threats. Your security spend has roughly doubled in…

  • ai-risk
  • data-security
  • enforcement

1 min read

Hackers abuse Google ads for GoDaddy ManageWP login phishing

A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing fleets of WordPress websites. A phishing campaign delivered through Google sponsored search resu…

  • security
  • threat-intelligence

1 min read

Smart Glasses for the Authorities

ICE is developing its own version of smart glasses, with facial recognition tied to various databases.

  • security
  • data-security

1 min read

Europe Day 2026: let’s celebrate together

New governance development detected from EDPB News. Brussels, 5 May – On 9 May each year, Europeans celebrate the anniversary of the Schuman Declaration, the key moment which led to the creation of the EU as we know it today.

  • privacy
  • network-edge

1 min read

New CVE Numbering Authorities Under ENISA Root

ENISA is the EU agency dedicated to enhancing cybersecurity in Europe. They offer guidance, tools, and resources to safeguard citizens and businesses from cyber threats. Today, four organisations have newly joined the Common Vulnerabilit…

  • ai-risk
  • vulnerabilities
  • regulation
  • public-sector

1 min read

Rowhammer Attack Against NVIDIA Chips

A new rowhammer attack gives complete control of NVIDIA CPUs. On Thursday, two research teams, working independently of each other, demonstrated attacks against two cards from Nvidia’s Ampere generation that take GPU rowhammering into ne…

  • security
  • vulnerabilities

1 min read

Why ransomware attacks succeed even when backups exist

Backups don't fail because they're missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup systems before encryption, leaving no path to recovery. Written by Subramani Raom Senior Manager,…

  • security
  • devops
  • threat-intelligence

1 min read

Backdoored PyTorch Lightning package drops credential stealer

A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a credential-stealing payload targeting browsers, environment files, and cloud services.

  • ai-risk
  • cloud
  • regulation
  • threat-intelligence

1 min read

Telegram Mini Apps abused for crypto scams, Android malware delivery

Cybersecurity researchers have uncovered a large-scale fraud operation that uses Telegram's Mini App feature to run crypto scams, impersonate well-known brands, and distribute Android malware. Cybersecurity researchers have uncovered a l…

  • ai-risk
  • crypto
  • threat-intelligence

1 min read

They don’t hack, they borrow: How fraudsters target credit unions

Fraudsters aren't hacking credit unions, they are exploiting normal business processes. Flare reveals how structured loan fraud methods use stolen identities to pass verification and secure funds. Threat actors across underground forums…

  • security
  • vulnerabilities
  • network-edge
  • threat-intelligence

1 min read

15-year-old detained over French govt agency data breach

French authorities have detained a 15-year-old suspected of selling data stolen in a cyberattack on France Titres (ANTS), the country's agency for issuing and managing administrative documents. French authorities have detained a 15-year-…

  • security
  • data-security
  • public-sector
  • enforcement

1 min read

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

New security development detected from Krebs on Security. A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of…

  • security
  • network-edge
  • threat-intelligence

1 min read

Official SAP npm packages compromised to steal credentials

Multiple official SAP npm packages were compromised in what is believed to be a TeamPCP supply-chain attack to steal credentials and authentication tokens from developers' systems.

  • ai-risk
  • cloud
  • devops
  • threat-intelligence

1 min read

Popular WordPress redirect plugin hid dormant backdoor for years

The Quick Page/Post Redirect plugin, installed on more than 70,000 WordPress sites, had a backdoor added five years ago that allows injecting arbitrary code into users' sites. The Quick Page/Post Redirect plugin, installed on more than 7…

  • security
  • threat-intelligence

1 min read

Stakeholder event on competition and data protection

New governance development detected from EDPB News. Brussels, 23 April – The EDPB is organising a remote stakeholder event in the context of its joint work with the European Commission on upcoming guidelines on the interplay between comp…

  • privacy
  • regulation
  • public-sector

1 min read

Broken VECT 2.0 ransomware acts as a data wiper for large files

Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them.

  • security
  • vulnerabilities
  • public-sector
  • threat-intelligence

1 min read

CISA orders feds to patch Windows flaw exploited as zero-day

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability exploited in zero-day attacks.

  • security
  • data-security
  • vulnerabilities
  • regulation

1 min read

Claude Mythos Has Found 271 Zero-Days in Firefox

That’s a lot. No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser. We wrote previously about our col…

  • ai-risk
  • vulnerabilities

1 min read

Learning from the Vercel breach: Shadow AI & OAuth sprawl

A single third-party OAuth integration can become a direct path into your environment. Push explains how the Vercel breach shows a compromised OAuth app can lead to widespread impact across downstream customers. Most organizations are ri…

  • ai-risk
  • cloud
  • data-security

1 min read

What Anthropic’s Mythos Means for the Future of

Two weeks ago, Anthropic announced that its new model, Claude Mythos Preview, can autonomously find and weaponize software vulnerabilities, turning them into working exploits without expert guidance. These were vulnerabilities in key sof…

  • ai-risk
  • cloud
  • vulnerabilities
  • regulation

1 min read

Video service Vimeo confirms Anodot breach exposed user data

Vimeo has disclosed that data belonging to some of its customers and users has been accessed without authorization following the recent breach at the Anodot data anomaly detection company.

  • security
  • data-security
  • threat-intelligence

1 min read

Home security giant ADT data breach affects 5.5 million people

The ShinyHunters extortion group stole the personal information of 5.5 million individuals after breaching the systems of home security giant ADT earlier this month, according to data breach notification service Have I Been Pwned.

  • security
  • data-security
  • threat-intelligence
  • enforcement

1 min read

Robinhood account creation flaw abused to send phishing emails

Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate emails, tricking users into believing their accounts had suspicious activity.

  • security
  • vulnerabilities
  • regulation
  • threat-intelligence

1 min read

American utility firm Itron discloses breach of internal IT network

Itron, Inc. has disclosed, via an 8-K filing with the U.S. Securities and Exchange Commission (SEC), a cybersecurity incident in which an unauthorized third party accessed certain internal systems. Utility technology company Itron, Inc.

  • security
  • regulation
  • public-sector
  • enforcement

1 min read

Medieval Encrypted Letter Decoded

Sent by a Spanish diplomat. Apparently people have been working on it since it was rediscovered in 1860.

  • security

1 min read

Medtronic confirms breach after hackers claim 9 million records theft

Medical device giant Medtronic disclosed last week that hackers breached its network and accessed data in "certain corporate IT systems." Medical device giant Medtronic disclosed last week that hackers breached its network and accessed d…

  • security
  • data-security
  • threat-intelligence

1 min read

Threat actor uses Microsoft Teams to deploy new “Snow”

A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named 'Snow' which includes a browser extension, a tunneler, and a backdoor. A threat group tracked as UNC6692 uses social engineering to dep…

  • security
  • data-security
  • vulnerabilities
  • network-edge

1 min read

CISA Adds Four Known Exploited Vulnerabilities to Catalog

New security development detected from CISA Cybersecurity Advisories. CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • privacy
  • vulnerabilities
  • kev
  • regulation

1 min read

Friday Squid Blogging: How Squid Survived Extinction Events

Science news: Scientists have finally cracked a long-standing mystery about squid and cuttlefish evolution by analyzing newly sequenced genomes alongside global datasets. The research reveals that these bizarre, intelligent creatures lik…

  • security

1 min read

Hiding Bluetooth Trackers in Mail

It was used to track a Dutch naval ship: Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker ins…

  • security
  • public-sector

1 min read

Apple fixes iOS bug that retained deleted notification data

Apple has released out-of-band security updates for iPhone and iPad devices to fix a Notification Services flaw that could allow notifications marked for deletion to remain stored on the device.

  • security
  • vulnerabilities
  • regulation

1 min read

CISA orders feds to patch BlueHammer flaw exploited as zero-day

CISA has ordered U.S. federal agencies to patch a Microsoft Defender privilege escalation flaw (dubbed BlueHammer) that has been exploited in zero-day attacks. CISA has given U.S.

  • security
  • vulnerabilities
  • regulation
  • public-sector

1 min read

FBI Extracts Deleted Signal Messages from iPhone Notification Database

404 Media reports (alternate site): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push noti…

  • security
  • data-security

1 min read

Stakeholder event on competition and data protection: save the date

New governance development detected from EDPB News. Brussels, 23 April – The EDPB is organising a remote stakeholder event in the context of its joint work with the European Commission on upcoming guidelines on the interplay between comp…

  • privacy
  • regulation
  • public-sector

1 min read

French govt agency confirms breach as hacker offers to sell data

France Titres, the government agency in France for issuing and managince administrative documents has disclosed a data breach after a threat actor claimed the attack and stealing citizen data.

  • security
  • data-security
  • public-sector
  • threat-intelligence

1 min read

ICE Uses Graphite Spyware

ICE has admitted that it uses spyware from the Israeli company Graphite.

  • security

1 min read

New npm supply-chain attack self-spreads to steal auth tokens

A new supply chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts.

  • ai-risk
  • cloud
  • data-security
  • devops

1 min read

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

New security development detected from Krebs on Security. A 24-year-old British national and senior member of the cybercrime group “Scattered Spider” has pleaded guilty to wire fraud conspiracy and aggravated identity theft.

  • security
  • crypto
  • children
  • threat-intelligence

1 min read

Actively exploited Apache ActiveMQ flaw impacts 6,400 servers

Nonprofit security organization Shadowserver found that over 6,400 Apache ActiveMQ servers exposed online are vulnerable to ongoing attacks exploiting a high-severity code injection vulnerability.

  • ai-risk
  • vulnerabilities
  • regulation
  • public-sector

1 min read

CISA Adds Eight Known Exploited Vulnerabilities to Catalog

New security development detected from CISA Cybersecurity Advisories. CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • privacy
  • vulnerabilities
  • kev
  • regulation

1 min read

CISA flags new SD-WAN flaw as actively exploited in attacks

​CISA has given U.S. government agencies four days to secure their systems against another Catalyst SD-WAN Manager vulnerability it flagged as actively exploited in attacks. The U.S.

  • security
  • cloud
  • vulnerabilities
  • kev

1 min read

​​Supply Chain Compromise Impacts Axios Node Package Manager​

New security development detected from CISA Cybersecurity Advisories. On March 31, 2026, two npm packages for versions axios@1.14.1 and axios@0.30.4 of Axios npm injected the malicious dependency plain-crypto-js@4.2.1 that downloads mult…

  • privacy
  • crypto
  • regulation
  • threat-intelligence

1 min read

The Gentlemen ransomware now uses SystemBC for bot-powered attacks

A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate.

  • security
  • threat-intelligence
  • enforcement

1 min read

Apple account change alerts abused to send phishing emails

Apple account change notifications are being abused to send fake iPhone purchase phishing scams within legitimate emails sent from Apple's servers, increasing legitimacy and potentially allowing them to bypass spam filters.

  • security

1 min read

Is “Satoshi Nakamoto” Really Adam Back?

The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk Adam Back. I don’t know. The article is convincing, but it’s written to be conv…

  • security
  • regulation

1 min read

Vercel confirms breach as hackers claim to be selling stolen data

Cloud development platform Vercel has disclosed a security incident after threat actors claimed to have breached its systems and are attempting to sell stolen data. Update 4/19/26: Added additional information from Vercel that was disclo…

  • security
  • cloud
  • devops
  • network-edge

1 min read

Critical flaw in Protobuf library enables JavaScript code execution

Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used JavaScript implementation of Google's Protocol Buffers. The tool is highly popular in the Node Package Manager (npm)…

  • security
  • cloud
  • data-security
  • vulnerabilities

1 min read

Friday Squid Blogging: New Giant Squid Video

Pretty fantastic video from Japan of a giant squid eating another squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

  • security
  • regulation

1 min read

Operation PowerOFF identifies 75k DDoS users, takes down 53 domains

The latest wave of "Operation PowerOFF," on April 13, 2026, targeted the distributed denial-of-service (DDoS) ecosystem and its users across 21 countries. More than 75,000 individuals using distributed denial-of-service (DDoS) platforms…

  • security
  • network-edge
  • regulation
  • enforcement

1 min read

Recently leaked Windows zero-days now exploited in attacks

Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissions.

  • security
  • cloud
  • vulnerabilities
  • network-edge

1 min read

Human Trust of AI Agents

Interesting research: “Humans expect rationality and cooperation from LLM opponents in strategic games.” Abstract: As Large Language Models (LLMs) integrate into our social and economic interactions, we need to deepen our understanding o…

  • ai-risk

1 min read

New AgingFly malware used in attacks on Ukraine govt, hospitals

A new malware family named 'AgingFly' has been identified in attacks against local governments and hospitals that steal authentication data from Chromium-based browsers and WhatsApp messenger. A new malware family named ‘AgingFly’ has be…

  • ai-risk
  • vulnerabilities
  • public-sector
  • threat-intelligence

1 min read

CISA Adds Two Known Exploited Vulnerabilities to Catalog

New security development detected from CISA Cybersecurity Advisories. CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • privacy
  • vulnerabilities
  • kev
  • regulation

1 min read

Defense in Depth, Medieval Style

This article on the walls of Constantinople is fascinating. The system comprised four defensive lines arranged in formidable layers: The brick-lined ditch, divided by bulkheads and often flooded, 15­20 meters wide and up to 7 meters deep…

  • security

1 min read

Patch Tuesday, April 2026 Edition

New security development detected from Krebs on Security. Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-…

  • security
  • vulnerabilities
  • regulation
  • threat-intelligence

1 min read

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

New security development detected from CISA Cybersecurity Advisories. CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • privacy
  • vulnerabilities
  • kev
  • regulation

1 min read

Enhancing compliance and consistency: EDPB adopts DPIA template

New governance development detected from EDPB News. Brussels, 14 April - In line with the EDPB’s Helsinki Statement to make GDPR compliance easier and strengthen consistency across Europe, the EDPB has adopted a template for Data Protect…

  • privacy
  • network-edge
  • compliance
  • enforcement

1 min read

How Hackers Are Thinking About AI

Interesting paper: “What hackers talk about when they talk about AI: Early-stage diffusion of a cybercrime innovation.” Abstract: The rapid expansion of artificial intelligence (AI) is raising concerns about its potential to transform cy…

  • ai-risk
  • vulnerabilities
  • regulation
  • espionage

1 min read

On Anthropic’s Mythos Preview and Project Glasswing

The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not releasing it to the general public because of its cyberattack capabilities, and ha…

  • ai-risk
  • vulnerabilities

1 min read

AI Chatbots and Trust

All the leading AI chatbots are sycophantic, and that’s a problem: Participants rated sycophantic AI responses as more trustworthy than balanced ones. They also said they were more likely to come back to the flattering AI for future advi…

  • ai-risk
  • regulation

1 min read

Critical Marimo pre-auth RCE flaw now under active exploitation

A critical pre-authentication remote code execution (RCE) vulnerability in Marimo is now under active exploitation, leveraged for credential theft. Hackers started exploiting a critical vulnerability in the Marimo open-source reactive Py…

  • ai-risk
  • cloud
  • data-security
  • vulnerabilities

1 min read

Friday Squid Blogging: Squid Overfishing in the South Pacific

Regulation is hard: The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 million square miles) of the South Pacific high seas, trying to impose order on a…

  • security
  • network-edge
  • regulation

1 min read

New VENOM phishing attacks steal senior executives' Microsoft logins

Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials of C-suite executives across multiple industries. Threat actors using a previously undocumented phishing-as-a-s…

  • security
  • threat-intelligence

1 min read

13-year-old bug in ActiveMQ lets hackers remotely execute commands

Security researchers discovered a remote code execution (RCE) vulnerability in Apache ActiveMQ Classic that has gone undetected for 13 years and could be exploited to execute arbitrary commands.

  • ai-risk
  • vulnerabilities
  • regulation
  • public-sector

1 min read

Eurail says December data breach impacts 300,000 individuals

Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach.

  • security
  • data-security
  • threat-intelligence

1 min read

Cybersecurity in the Age of Instant Software

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI…

  • ai-risk
  • vulnerabilities
  • devops
  • public-sector

1 min read

Is a $30,000 GPU Good at Password Cracking?

A $30,000 AI GPU doesn't outperform consumer GPUs at password cracking. Specops explains why attackers don't need exotic hardware to break weak passwords. Compute power is growing at an extraordinary pace.

  • ai-risk

1 min read

Russia Hacked Routers to Steal Microsoft Office Tokens

New security development detected from Krebs on Security. Hackers linked to Russia’s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security…

  • security
  • cloud
  • vulnerabilities
  • network-edge

1 min read

Healthcare cybersecurity: Diagnosing risks, prescribing solutions

Cyber-attacks can severely impact personal lives and put patients at risk of harm. That’s why cybersecurity is vital for healthcare organizations to protect patient wellbeing and privacy at all times. Cybersecurity has become increasingl…

  • privacy
  • data-security
  • vulnerabilities
  • compliance

1 min read

Hong Kong Police Can Force You to Reveal Your Encryption Keys

the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are just transiting the airport. In a security alert dated March 26, the U.S. Consulate General said that,…

  • security
  • regulation
  • enforcement

1 min read

Smart city mobility: Transforming the future of urban transportation

What if cities could move smarter? What if technology could transform how we travel, making urban environments cleaner, more efficient and connected? Across the globe, smart city mobility initiatives are turning these possibilities into…

  • governance

1 min read

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

New security development detected from Krebs on Security. An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face.

  • security
  • crypto
  • public-sector
  • threat-intelligence

1 min read

Google Wants to Transition to Post-Quantum Cryptography by 2029

Google says that it will fully transition to post-quantum cryptography by 2029. I think this is a good move, not because I think we will have a useful quantum computer anywhere near that year, but because crypto-agility is always a good…

  • security
  • crypto

1 min read

Traffic violation scams switch to QR codes in new phishing texts

Scammers are sending fake "Notice of Default" traffic violation text messages impersonating state courts across the U.S., pressuring recipients to scan a QR code that leads to a phishing site demanding a $6.99 payment while stealing pers…

  • security
  • threat-intelligence
  • enforcement

1 min read

Axios npm hack used fake Teams error fix to hijack maintainer account

The maintainers of the popular Axios HTTP client have published a detailed post-mortem describing how one of its developers was targeted by a social engineering campaign believed to have been conducted by North Korean threat actors. The…

  • security
  • crypto
  • threat-intelligence
  • espionage

1 min read

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps exfiltrated files encrypted and useless to attackers. the University of Mississippi Medical Cent…

  • ai-risk
  • data-security
  • threat-intelligence

1 min read

Friday Squid Blogging: Jurassic Fish Chokes on Squid

Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Original paper. As usual, you can also use this squid post to talk about the security…

  • security
  • regulation

1 min read

Company that Secretly Records and Publishes Zoom Meetings

WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesn’t use the Zoom record feature, so Zoom can’t do anything about it.

  • security
  • data-security

1 min read

ENISA advances the certification of EU Digital Wallets

ENISA is the EU agency dedicated to enhancing cybersecurity in Europe. They offer guidance, tools, and resources to safeguard citizens and businesses from cyber threats. ENISA launches a public consultation on the draft candidate EU Digi…

  • security
  • crypto
  • regulation
  • public-sector

1 min read

US Bans All Foreign-Made Consumer Routers

This is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical in…

  • security
  • vulnerabilities
  • network-edge
  • public-sector

1 min read

Is “Hackback” Official US Cybersecurity Strategy?

The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone. But one sentence stood out: “We will unleash the private sector by creating…

  • security
  • public-sector

1 min read

Possible US Government iPhone Hacking Tool Leaked

Wired writes (alternate source): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated iPhone hacking toolkit that includes five complete hacking techniques capable o…

  • security
  • vulnerabilities
  • crypto
  • network-edge

1 min read

A Taxonomy of Cognitive Security

Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here, but—even better—Menton has a long essay laying out the basic concepts and ideas…

  • security
  • vulnerabilities

1 min read

Inventors of Quantum Cryptography Win Turing Award

Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this recognition. I have always thought the technology to be fantastic, even though I think it…

  • security
  • crypto

1 min read

Apple’s Camera Indicator Lights

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptitiously start recording. The reason it’s tempting to think that a dedicated camer…

  • security
  • threat-intelligence

1 min read

Why resilient infrastructure can no longer be optional

In my three decades of responding to catastrophic events around the world, I have often observed a curious human tendency to overlook the invisible foundations of our safety. We are meticulous about the visible – the aesthetic finish, co…

  • governance
  • regulation

1 min read

Building a net-zero metals future with harmonized standards

The path to a net-zero future depends on every industry doing its part, and few are more pivotal than the steel and aluminium sectors. But they have a cost, particularly when it comes to their carbon footprint. By Noelia García Nebra, He…

  • governance
  • regulation

1 min read

International Standards are a common language for a fragmented global economy

This year’s World Economic Forum Annual Meeting took place during a moment of global uncertainty. Conversations often returned to the same underlying tension: We are innovating faster than ever, yet our ability to collaborate and coordin…

  • governance
  • network-edge
  • compliance
  • regulation

1 min read

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

New security development detected from Krebs on Security. A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and w…

  • security
  • cloud
  • vulnerabilities
  • devops

1 min read

EDPB conference on cross-regulatory cooperation: what we learned

New governance development detected from EDPB News. Brussels, 23 March - On 17 March 2026, the EDPB conference “Cross-regulatory interplay and cooperation in the EU: a data protection perspective” took place in Brussels.

  • ai-risk
  • compliance
  • regulation
  • children

1 min read

Sen. Wyden Warns of Another Section 702 Abuse

Sen. Ron Wyden is warning us of an abuse of Section 702: Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with support of many Democrats) nomination of Joshua Rudd to lead the NSA. Wyden wa…

  • privacy
  • regulation
  • public-sector
  • espionage

1 min read

Team Mirai and Democracy

Japan’s election last month and the rise of the country’s newest and most innovative political party, Team Mirai, illustrates the viability of a different way to do politics. In this model, technology is used to make democratic processes…

  • ai-risk
  • regulation
  • threat-intelligence

No matches

No briefings matched that combination.

Try removing a tag filter, switching category, or broadening the keyword. You can also return to the full archive.