Hiding Bluetooth Trackers in Mail
It was used to track a Dutch naval ship: Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch governmen...
The Iran War: What You Need to Know
Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran â with continuously updated threat analysis and scenarios.
Bad Memories Still Haunt AI Agents
Anthropic fixed a significant vulnerability in Claude Code's handling of memories, but experts caution that memory files will continue to be an AI threat.
CNAPP â ein Kaufratgeber
Cloud-Native-Application-Protection-Plattformen wollen eine mĂśglichst umfassende Cloud-Security-LĂśsung bieten. Lesen Sie, welche CNAPP-Angebote zu empfehlen sind.
Critical minerals and cyber operations
Learn how critical minerals and rare earth elements (REEs) are evolving from commodities into strategic flashpoints. Explore the geopolitical risks of Chinaâs refining dominance, t...
Cisco Catalyst SD-WAN Vulnerabilities
Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an attacker to access an affected system, elevate privileges to root, gain access to...
The AI era demands a different kind of CISO
Static audits canât stop AI-speed attacks. Rinki Sethi argues why CISOs must shift from periodic compliance to real-time risk awareness to survive the modern threat landscape.
Security Leaders Discuss the Vercel Breach
Following the news of the Vercel data breach, security experts are discussing implications, sharing their insights, and weighing in on what this incident suggests about the future ...
Emerging Enterprise Security Risks of AI
Agentic AI adoption is accelerating rapidly as enterprise software and applications increasingly incorporate task-specific AI agents, enabling autonomous execution of complex tasks...
Is âSatoshi Nakamotoâ Really Adam Back?
The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk Adam Back. I donât kno...
What the ransom note wonât say
Viewing ransomware only as an attack produces defenses built against attacks. But think about ransomware as an industry and additional priorities come into focus.
What the ransom note wonât say
Viewing ransomware only as an attack produces defenses built against attacks. But think about ransomware as an industry and additional priorities come into focus.
Friday Squid Blogging: New Giant Squid Video
Pretty fantastic video from Japan of a giant squid eating another squid. As usual, you can also use this squid post to talk about the security stories in the news that I havenât co...
Mythos and Cybersecurity
Last week, Anthropic pulled back the curtain on Claude Mythos Preview, an AI model so capable at finding and exploiting software vulnerabilities that the company decided it was too...
Europeâs Online Age Verification App Is Here
Available for free to any company that wants to use it, the âcompletely anonymousâ app puts the pressure on porn sites and social media platforms to start blocking access by minors...
Human Trust of AI Agents
Interesting research: âHumans expect rationality and cooperation from LLM opponents in strategic games.â Abstract: As Large Language Models (LLMs) integrate into our social and eco...
From Bazooka to Fake Nikes
A deep dive into business impersonation fraud â from fake companies cashing stolen checks to AI-powered shopping scams â and why the same vulnerability enables both.
Defense in Depth, Medieval Style
This article on the walls of Constantinople is fascinating. The system comprised four defensive lines arranged in formidable layers: The brick-lined ditch, divided by bulkheads and...
Patch Tuesday, April 2026 Edition
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-d...
Identity Protection in the AI Era
Learn about a proactive, identity-first security approach that integrates visibility, threat detection and response, zero trust enforcement, AI protection, and threat intelligence ...
VIP Credential Monitoring Blog
Executives and high-privilege users are prime targets for credential theft â and standard monitoring often misses them. Learn how VIP Credential Monitoring in Recorded Future Ident...
Shoptalk 2026: Retail in the Age of AI
Explore Forterâs key takeaways from Shoptalk 2026. Discover how AI is reshaping returns abuse, the rise of agentic commerce, and why identity is the foundation of trust.
The Real Risk of Vibecoding
Is vibecoding hurting your projects? Discover the hidden dangers behind this trend and how it can lead to unstable code, poor performance, and costly fixes.
Microsoft Patch Tuesday, March 2026 Edition
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this mo...
Sednit reloaded: Back in the trenches
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants â BeardShell and Covenant.
Sednit reloaded: Back in the trenches
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants â BeardShell and Covenant.
Who is the Kimwolf Botmaster âDortâ?
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botne...
Tax Season Scams to Watch For This Year
Tax season is a busy time for taxpayers and, unfortunately, a busy time for scammers as well. Each year, the Internal Revenue Service continues to warn individuals and businesses t...
When Buyers Discount MSPs With One Big Customer
Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, thatâs loyalty. From where a buyer sits, thatâs a $$$ disc...
Scammers Up Their Game With AI
Learn how to spot the threats and protect yourself from scammers using AI for phishing and deepfakes with smart security practices.
Beware: Tax Season is Scam Season
Tax season is also prime time for tax scams. To safeguard your personal information, consider these key points: Communication methods The IRS initiates contact primarily through ma...
âTis the Season for Holiday Shopping Scams
The holidays are typically the time of year for gifting presents to friends and family or donations to charity. Unfortunately, not-so-jolly fraudsters take advantage of this genero...
IRS Identity Theft Season Begins Now
Each year thieves try to steal billions in federal withholdings by stealing your identity. As the IRS focuses more attention on this quickly growing problem, now is the time of yea...
The Worldâs Identity Platform
Learn about the new Trulioo integrated, high-speed, global identity platform that helps your organization foster growth, innovation and trust.