Veeam acquires Securiti AI for $1.7 billion
Veeam announced Tuesday it agreed to acquire Securiti AI for $1.725 billion, marking the data protection company's largest acquisition and its entry into the artificial intelligenc...
A Cybersecurity Merit Badge
Scouting America (formerly known as Boy Scouts) has a new badge in cybersecurity. Thereâs an image in the article; it looks good. I want one.
Agentic AIâs OODA Loop Problem
The OODA loopâfor observe, orient, decide, actâis a framework to understand decision-making in adversarial situations. We apply the same framework to artificial intelligence agents...
Hackers Dox ICE, DHS, DOJ, and FBI Officials
Plus: A secret FBI anti-ransomware task force gets exposed, the mystery of the CIAâs Kryptos sculpture is finally solved, North Koreans busted hiding malware in the Ethereum blockc...
Powering AI at the Tactical Edge
As the U.S. Department of Defense (DoD) continues to make artificial intelligence (AI) a key segment of national security, turning cutting-edge research
September 2025 CVE Landscape
Discover the top 16 exploited vulnerabilities from September 2025, including critical Cisco and TP-Link flaws, malware-linked CVEs, and actionable threat intelligence from Recorded...
Cryptocurrency ATMs
CNN has a great piece about how cryptocurrency ATMs are used to scam people out of their money. The fees are usurious, and theyâre a common place for scammers to send victims to bu...
F5 network compromised
On October 15, 2025, F5 reported that a nation-state threat actor had gained long-term access to some F5 systems and exfiltrated data, including source code and information about u...
Appleâs Bug Bounty Program
Apple is now offering a $2M bounty for a zero-click exploit. According to the Apple website: Today weâre announcing the next major chapter for Apple Security Bounty, featuring the ...
Mysterious Elephant: a growing threat
Kaspersky GReAT experts describe the latest Mysterious Elephant APT activity. The threat actor exfiltrates data related to WhatsApp and employs tools such as BabShell and MemLoader...
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: Nathan E. Sanders and I will be giving a book talk on Rewiring Democracy at the Harvard Kennedy Schoolâs Ash Cente...
How to Mitigate Supply Chain Attacks
For more proactive supply chain security, move beyond third-party risk checklists and defend against supply chain attacks with real-time intelligence.
Rewiring Democracy is Coming Soon
My latest book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship, will be published in just over a week. No reviews yet, but you can read chapter...
AI and the Future of American Politics
Two years ago, Americans anxious about the forthcoming 2024 presidential election were considering the malevolent force of an election influencer: artificial intelligence. Over the...
Disrupting threats targeting Microsoft Teams
Threat actors seek to abuse Microsoft Teams features and capabilities across the attack chain, underscoring the importance for defenders to proactively monitor, detect, and respond...
10 Big Cybersecurity Acquisition Deals In 2025
Among the biggest cybersecurity acquisitions of 2025 are mega-deals by Google and Palo Alto Networks, along with multiple startup M&A deals from CrowdStrike, SentinelOne and Check ...
New LockBit 5.0 Targets Windows, Linux, ESXi
Trendâą Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniq...
The Ultimate MSP Podcast List
Discover 15 must-hear podcasts packed with real strategy, sharp insights, and no wasted airtime. Ready to binge your way to a smarter 2026?
Gamaredon X Turla collab
ESET researchers reveal how the notorious APT group Turla collaborates with fellow FSB-associated group known as Gamaredon to compromise highâprofile targets in Ukraine.
Gamaredon X Turla collab
ESET researchers reveal how the notorious APT group Turla collaborates with fellow FSB-associated group known as Gamaredon to compromise highâprofile targets in Ukraine.
August 2025 CVE Landscape
Recorded Futureâs Insikt Group identified 18 high-impact vulnerabilities in August 2025, including RCE flaws in Citrix, WinRAR, and Fortinet products. Several were actively exploit...
Whatâs Your Cybersecurity Maturity?
This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organizationâs progress.
Scammers Up Their Game With AI
Learn how to spot the threats and protect yourself from scammers using AI for phishing and deepfakes with smart security practices.
Top 10 Cybersecurity Companies in Europe
Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At...
Password breach statistics in 2025
At Heimdal weâre constantly monitoring the latest industry alerts, media reports, academic research and government data to keep track of password breaches. Itâs a crucial part of o...
UK Cybersecurity Statistics for 2025
As Dame Margeret Beckett, a member of the House of Lords recently put it: âThe UK has the dubious distinction of being one of the worldâs most cyber-attacked nationsâ. Calculating ...
What is a Fraud Scheme?
The fraud auditing industry uses so many terms interchangeably that it creates confusion. Let's cut the confusion and implement better fraud definitions.
Beware: Tax Season is Scam Season
Tax season is also prime time for tax scams. To safeguard your personal information, consider these key points: Communication methods The IRS initiates contact primarily through ma...
âTis the Season for Holiday Shopping Scams
The holidays are typically the time of year for gifting presents to friends and family or donations to charity. Unfortunately, not-so-jolly fraudsters take advantage of this genero...
Scams Targeting Seniors
Scammers target seniors more aggressively than any other group. Recognizing the most common scams helps prevent your money and personal information from getting stolen.
IRS Identity Theft Season Begins Now
Each year thieves try to steal billions in federal withholdings by stealing your identity. As the IRS focuses more attention on this quickly growing problem, now is the time of yea...
Five Ways to Protect Your Finances from Fraud
With fraud on the rise, itâs important to understand how to best protect yourself and your financial accounts. Here are five ways you can stay proactive to avoid fraudulent credit ...
Scammers Team Up
In this post, learn ore about recent cyber attacks and how to avoid them.
The Worldâs Identity Platform
Learn about the new Trulioo integrated, high-speed, global identity platform that helps your organization foster growth, innovation and trust.
What is a Money Mule Scam?
A Money Mule Scam occurs when the victim, often unknowingly, acts as a âmuleâ to transfer money so criminals can avoid financial institutions.
Recognizing Lonely Heart Scams
Among the most insidious types of fraud we see are Lonely Heart, or Romance Scams, because they combine traditional theft with emotional betrayal of someone who has built a relatio...