IT talent looks the other way as wireless security incidents pile up

Enterprise wireless networks are supporting a growing mix of devices and applications, increasing operational demand and security exposure. The 2026 Cisco State of Wireless report reflects these conditions through rising incident rates, higher costs, a… Continue reading IT talent looks the other way as wireless security incidents pile up

CISOs grapple with AI demands within flat budgets

Security spending continues to edge upward across large organizations, though the changes remain gradual and tightly managed. The 2026 RH-ISAC CISO Benchmark reflects a steady environment where budgets expand in small steps, even as AI becomes a routin… Continue reading CISOs grapple with AI demands within flat budgets

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021. Continue reading Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

Internet Bug Bounty Pauses Payouts, Citing ‘Expanding Discovery’ From AI-Assisted Research

The Internet Bug Bounty program “has been paused for new submissions,” they announced last week.

Running since 2012, the program is funded by “a number of leading software companies,” reports InfoWorld, “and has awarded more than $1.5m to researchers… Continue reading Internet Bug Bounty Pauses Payouts, Citing ‘Expanding Discovery’ From AI-Assisted Research

Posted in ai

Claude Code Leak Reveals a ‘Stealth’ Mode for GenAI Code Contributions – and a ‘Frustration Words’ Regex

That leak of Claude Code’s source code “revealed “all kinds of juicy details,” writes PC World.
The more than 500,000 lines of code included:
– An ‘undercover mode’ for Claude that allows it to make ‘stealth’ contributions to public code bases
– An ‘… Continue reading Claude Code Leak Reveals a ‘Stealth’ Mode for GenAI Code Contributions – and a ‘Frustration Words’ Regex

Posted in ai

Is the Authority Information Access field the only way that browsers can process certificate chains with intermedate CAs?

Is the Authority Information Access (AIA) field the only way that browsers can process certificate chains with intermediate CAs?
I understand that if an end-user certificate is issued directly by a root CA, and that root CA’s certificate i… Continue reading Is the Authority Information Access field the only way that browsers can process certificate chains with intermedate CAs?

Posted in TLS