Communication Security Skype Bites the Dust: A Fond Farewell for Saturday 1st March 2025 Goodbye, old friend.
Vulnerability Management Digging Up Ancient Relics, Turncloak Alert, Cyber Ninjas Arise, Ransomware Sentinels, MS Botnets Running Amok, and Major Oopsies. It's CISO Intelligence for Friday 28th February 2025. Old but still useful drivers put to bad use, rogue soldiers, red teams are the good guys, continuous vigilance required, botnets using a scattergun approach, and oh dear, Adobe and Oracle! TGIF!
Ransomware The Hackers' Public Broadcast, Lazarus' New Friend, Ghostly Obfuscation, Breaches: The Never Ending Story, Website Rerouting, and Data In: New Wallets Out. It's CISO Intelligence for Wednesday 26th February 2025. Today's topics: The hackers announcing their presence, Lazarus has a new toy for a new target, there's a Ghost in Excel, eternal vigilance is the price of security, when following a route takes you to a different address, and from phishing to laundering.
Regulatory Compliance Business Restrictions vs Safety Protocols, Medical Data: The Hackers' Must-Have, The Greatest Heist, Pinching Fingerprints, Insecure Vertebrae, and Unwanted Passengers. It's CISO Intelligence for Monday 24th February 2025. How much security is too much, healthcare: the prime target for data theft, the highest of heists and its fallout, the downside of user ID information, when the digital backbone isn't quit fully connected, and the risks of third-party software carrying a little fungus.
Malware Threats There's a Ghost in the System, and We Can't Hide. An Ethereal Read for Sunday 23rd February 2025. The phantom of the ransomware is here, inside multiple infrastructures.
Third Party Risk Management The Silent Maestro: Software's Role in Vendor Risk Management. A Thought-Provoking Read for Saturday 22nd February 2025. From useful to essential: how tools change.
Cyber Espionage The Drone Wars, A Dark Star Rising, The Mac Attack, Smooth MS, SEO Detours, and DeepSeek Deep Dives. It's CISO Intelligence for Friday 21st February 2025. Drones: the battle against the highly lucrative cons, multipurpose ransomware that isn't fussy about its victims, once secure Macs are now a hard malware target, MS are finetuning their update systems, being led down the wrong path, and when technology digs a little too deep.
Cyber Threat Management Creek Meets CTEM Paddle, Death-Breaches-Taxes, Lazarus's New Sidekick, Digital Sleight of Hand, Google's AI Defense, and Levelling the Jurisdictional Landscape. It's CISO Intelligence for Wednesday 19th February 2025. Today's topics: CTEM is the new lifeboat, cyber incidents are now an inevitable part of the digital world, Lazarus keeps rising and this time they brought a friend, digital laundering: a whole new magic trick, Google's new AI star player, and compliance is not an option.
Cyber Espionage The Cloak and Dagger Upgrade, A Different Kind of Stew, There's a Hole in the Keystore, Email Intruders, Trimming the Fat, and The New Directive in Town. It's CISO Intelligence for Monday 17th February 2025. Today's topics: The world of espionage is now fully up to speed, sadly there's no comfort food in sight. "Is it secret? Is it safe?" Battening down the email hatches, shedding excess insurance premium weight, and the new GovTech safety blanket.
IoT Vulnerability Exploitation !Exploitable Episode One - Breaking IoT: Misadventures on a Geeky Mediterranean Voyage. A "Gaming" Read for Sunday 16th February 2025 "Let's play a game..."
Data Privacy Unmasking the Masked: The YouTube Privacy Snafu. The CISO Intelligence "Sharp Intake of Breath" Read for Saturday 15th February 2025. A close shave!
Third Party Risk Management The Art of Persuasion, Trojans in Recruiter Clothing, More than Pesky Pests, Etsy: The Latest Scammer Target, Cyber Pirates Going Global, and Unwanted Exposure. It's CISO Intelligence for Friday 14th February 2025. Today's food for thought: sweet-talking the bosses, beware of malware bearing job offers, bugs that need a whole lot more than spray, Etsy is the new hunting ground for support scammers, cyber assaults without frontiers, and stocks with the wrong kind of shares.