You’ll Soon Be Able to Sign in to Have I Been Pwned (but Not Login, Log in or Log On)

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

How do seemingly little things manage to consume so much time?! We had a suggestion this week that instead of being able to login to the new HIBP website, you should instead be able to log in. This initially confused me because I’ve been used to logging on

Continue reading You’ll Soon Be Able to Sign in to Have I Been Pwned (but Not Login, Log in or Log On)

Coaching AI agents: Why your next security hire might be an algorithm

Security teams are drowning in alerts. The sheer volume of threats, suspicious activity, and false positives makes it nearly impossible for analysts to investigate everything effectively. Enter agentic AI, capable of completing hundreds of tasks simult… Continue reading Coaching AI agents: Why your next security hire might be an algorithm

A new era of cyber threats is approaching for the energy sector

Cyber threats targeting the energy sector come in many forms, including state-sponsored actors seeking to disrupt national infrastructure, cybercriminals motivated by profit, and insiders intentionally causing damage. The consequences of a successful a… Continue reading A new era of cyber threats is approaching for the energy sector

Operation SyncHole: Lazarus APT goes back to the well

Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach. Continue reading Operation SyncHole: Lazarus APT goes back to the well

Operation SyncHole: Lazarus APT goes back to the well

Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach. Continue reading Operation SyncHole: Lazarus APT goes back to the well

Review: Artificial Intelligence for Cybersecurity

Artificial Intelligence for Cybersecurity is a practical guide to how AI and machine learning are changing the way we defend digital systems. The book aims to explain how AI can help solve real cybersecurity problems. It does that well, but it’s not fo… Continue reading Review: Artificial Intelligence for Cybersecurity

WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads

WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block participants from sharing the contents of a conversation in traditional chats and groups.
“This new setting available in both chats and groups hel… Continue reading WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads

Posted in Uncategorized

One in three security teams trust AI to act autonomously

While AI adoption is widespread, its impact on productivity, trust, and team structure varies sharply by role and region, according to Exabeam. The findings confirm a critical divide: 71% of executives believe AI has significantly improved productivity… Continue reading One in three security teams trust AI to act autonomously