My Latest Book: Rewiring Democracy
I am pleased to announce the imminent publication of my latest book, Rewiring Democracy: How AI will Transform our Politics, Government, and Citizenship: coauthored with Nathan San...
Innovator Spotlight: SwissBit
Securing the Digital Frontier: How Micro Storage Technology is Rewriting Cybersecurity Protocols The physical security of digital assets has long been the
Innovator Spotlight: 360 Privacy
The Future of Cyber Resilience The algorithms are hunting us. Not with malicious code, but with something far more insidious. During a recent Black Hat
Innovator Spotlight: Harness
Securing the Digital Frontier: How AI is Reshaping Application Security The software development landscape is transforming at breakneck speed. Developers
Innovator Spotlight: Whalebone
Cybersecurity DNS Security for a Safer Digital Life Whalebone is redefining how telcos, ISPs, and enterprises protect their customers in a world where
Generative AI as a Cybercrime Assistant
Anthropic reports on a Claude user: We recently disrupted a sophisticated cybercriminal that used Claude Code to commit large-scale theft and extortion of personal data. The actor ...
Innovator Spotlight: OPSWAT
Zero Trust: The Unsung Hero of Cybersecurity Cybersecurity professionals are drowning in complexity. Acronyms fly like digital confetti, vendors promise
Innovator Spotlight: NetBrain
Network Visibility: The Silent Guardian of Cybersecurity Network complexity is killing enterprise security teams. Buried under mountains of configuration
A CISOâs guide to monitoring the dark web
From leaked credentials to ransomware plans, the dark web is full of early warning signs â if you know where and how to look. Hereâs how security leaders can monitor these hidden s...
Top 10 Cybersecurity Companies in Europe
Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At...
Password breach statistics in 2025
At Heimdal weâre constantly monitoring the latest industry alerts, media reports, academic research and government data to keep track of password breaches. Itâs a crucial part of o...
UK Cybersecurity Statistics for 2025
As Dame Margeret Beckett, a member of the House of Lords recently put it: âThe UK has the dubious distinction of being one of the worldâs most cyber-attacked nationsâ. Calculating ...
Friday Squid Blogging: Catching Humboldt Squid
First-person account of someone accidentally catching several Humboldt squid on a fishing line. No photos, though. As usual, you can also use this squid post to talk about the secu...
Baggage Tag Scam
I just heard about this: Thereâs a travel scam warning going around the internet right now: You should keep your baggage tags on your bags until you get home, then shred them, beca...
The UK May Be Dropping Its Backdoor Mandate
The US Director of National Intelligence is reporting that the UK government is dropping its backdoor mandate against the Apple iPhone. For now, at least, assuming that Tulsi Gabba...
H1 2025 Malware and Vulnerability Trends
Explore Recorded Futureâs H1 2025 malware & vulnerability trends: key exploited CVEs, most-targeted vendors (Microsoft, edge devices), ransomware & mobile malware shifts â practica...
Exploits and vulnerabilities in Q2 2025
This report provides statistical data on published vulnerabilities and exploits we researched in Q2 2025. It also includes summary data on the use of C2 frameworks.
Encryption Backdoor in Military/Police Radios
I wrote about this in 2023. Hereâs the story: Three Dutch security analysts discovered the vulnerabilitiesÂâfive in totalâÂin a European radio standard called TETRA (Terrestrial Tr...
91% of Teens Use Generative AI
A recent survey found that when presented with an online safety issue, most teen respondents will ask for help from a parent or other trusted adult.
Warlock ransomware: What you need to know
Warlock is a ransomware operation that emerged in 2025, combining the traditional "double extortion" tactics of encrypting victims' files so they cannot be accessed.
Speed cameras knocked out after cyber attack
A hack of the Netherlands' Public Prosecution Service has had an unusual side effect - causing some speed cameras to be no longer capturing evidence of motorists breaking the ...
Microsoft Patch Tuesday, August 2025 Edition
Microsoft today released updates to fix more than 100 security flaws in its Windows operating systems and other software. At least 13 of the bugs received Microsoft's most-dire "cr...
What is a Fraud Scheme?
The fraud auditing industry uses so many terms interchangeably that it creates confusion. Let's cut the confusion and implement better fraud definitions.
Beware: Tax Season is Scam Season
Tax season is also prime time for tax scams. To safeguard your personal information, consider these key points: Communication methods The IRS initiates contact primarily through ma...
âTis the Season for Holiday Shopping Scams
The holidays are typically the time of year for gifting presents to friends and family or donations to charity. Unfortunately, not-so-jolly fraudsters take advantage of this genero...
Scams Targeting Seniors
Scammers target seniors more aggressively than any other group. Recognizing the most common scams helps prevent your money and personal information from getting stolen.
IRS Identity Theft Season Begins Now
Each year thieves try to steal billions in federal withholdings by stealing your identity. As the IRS focuses more attention on this quickly growing problem, now is the time of yea...
Five Ways to Protect Your Finances from Fraud
With fraud on the rise, itâs important to understand how to best protect yourself and your financial accounts. Here are five ways you can stay proactive to avoid fraudulent credit ...
Summer 2023 Tax Deadlines and IRS News
Upcoming Tax Deadlines June 15 â Second quarter 2023 individual estimated tax payments are due. August 1 â Due date for filing 2022 retirement or employee benefit plan returns (550...
Avoid IRS Phishing Schemes
Tax season is a prime opportunity for identity thieves who target your personal information through phishing scams.
Scammers Team Up
In this post, learn ore about recent cyber attacks and how to avoid them.
The Worldâs Identity Platform
Learn about the new Trulioo integrated, high-speed, global identity platform that helps your organization foster growth, innovation and trust.
What is a Money Mule Scam?
A Money Mule Scam occurs when the victim, often unknowingly, acts as a âmuleâ to transfer money so criminals can avoid financial institutions.
Recognizing Lonely Heart Scams
Among the most insidious types of fraud we see are Lonely Heart, or Romance Scams, because they combine traditional theft with emotional betrayal of someone who has built a relatio...