“Cyber Budgets Slow, AI Surges: What the Data Says About 2026”
👉 “Organizations that understand their exposure, test their defenses, and secure their supply chains will be best placed to withstand the next wave of attacks,” argued Sam Peters, Chief Product Officer at IO.
Never let a good crisis go to waste!
If your organization doesn't have security awareness training, don't let cost or complexity be the roadblock. There are lots of good resources out there to throw into a slide deck. It's better than doing nothing.
Most businesses now operate multiple, complex cloud environments, but many face major security gaps and have suffered AI-related breaches.
I travel with my FZ all the time and have never had an issue. Are these folks waving it around?
🤣 "According to the indictment, the auditor texted ... "This was the best trip I had in Florida. The girls were very beautiful and nice."
Time's up! ⏰
Upgrade to Windows 11 (if your PC supports it), purchase a new device with Windows 11 or another OS, or enroll in the Extended Security Updates (ESU) program for one more year of updates.
www.engadget.com/com...
A newly observed Astaroth banking trojan campaign leverages GitHub to keep its operations running even when traditional command-and-control infrastructure is disrupted.
"CMMC Is Finalized. How Will It Impact State and Local Government?"
The use of undocumented, unsigned actor tokens, coupled with a legacy API vulnerability, created a perfect storm.
Recovery Time Objective and Maximum Tolerable Downtime are often confused. Here's a great example where I'm sure the RTO was hours (or less) and the MTD is apparently weeks - however the question of JLRs future viability is still unanswered.
Yes, Virginia. Security IS hard.
Few clients I encounter have implemented baseline configs and hardening, yet these are essential. Combine with vuln scans and periodic pentests, and you create a stronger and more secure foundation.
Now would be a great time to look into what control gaps might be created and available tooling to block its use, if needed.
Check out Offensive Countermeasures: The Art of Active Defense by John Strand if you're interested in more information on the topic.
One of the things that concerns me about OffSec is that you don't often know your adversary very well. Just like the old saying goes, don't bring a knife to a gunfight.
🥇“We are now in recovery . . . Our approach is deliberate, prioritized, and secure: systems are brought back only after testing and validation, with priority given to those essential for public safety, financial stability, and daily operations.”
Great summary of some often-forgotten information security controls. Partnering with your facilities team is the best way to ensure you can be successful.
The Silent Threat: How Unclaimed Subdomains Can Lead to Catastrophic Takeovers
Introduction: Subdomain takeover vulnerabilities represent a critical yet often overlooked attack vector in modern cybersecurity. When a company points a subdomain to a third-party service like Softr, Vercel, or AWS but…
The threat actor Silver Fox exploited a previously unknown vulnerable driver linked to WatchDog Anti-malware in a BYOVD attack, disabling security solutions on compromised hosts.
FTC complaint claims that Disney did not label specific YouTube videos as intended for children when uploading them to the platform. This oversight led to those videos being subjected to online advertising.
"Jaguar Land Rover says cyberattack ‘severely disrupted’ production"
I was once reported to HR for threatening to commit Office Space-style violence against a Citrix cluster. It resulted in a formal meeting with my manager (where we both had a good laugh).
Just a reminder that not everyone sees things as (funny) as you do!
"Using This Domain (onmicrosoft.com)? Microsoft Will Soon Restrict Your Emails"
www.pcmag.com/news/u...
Always have a rollback plan. It should be more detailed than "Ctrl-Z" so that others can understand what you did and reverse it, if necessary.
Another reminder that having an Apple device does not make you impervious to attack. Patch 'em if you got 'em!
The HR giant said hackers mounted a socially engineered cyberattack on its third-party CRM system but did not gain access to customer information; only "commonly available" business contact info was exposed. www.darkreading.com/application-...
Ugh, a quintet of hooded hackers!
Myth: Macs can't get viruses. 🚫🦠 Truth: While they're less targeted, Macs can still fall victim to malware! Stay vigilant, everyone! #CyberMyths