2025-04-17
Microsoft Security
Microsoft’s Secure by Design journey: One year of success
Amazon Security
How to help prevent hotlinking using referer checking, AWS WAF, and Amazon CloudFront
Schneier on Security
Age Verification Using Facial Scans
Talos Intelligence
Care what you share
Talos Intelligence
Unmasking the new XorDDoS controller and infrastructure
Okta Security
Detect and Prevent Cross Device Authentication
NVISO Labs
Crisis Management – Beacon in the Storm
Dark Reading
Cybersecurity by Design: When Humans Meet Technology
Offensive Security
CVE-2024-13059: Exploiting Path Traversal in AnythingLLM for Remote Code Execution
Searchlight Cyber
Slopsquatting Supply Chain Threat
TrustedSec
Discovering Your Baud
2025-04-16
Microsoft Security
Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures
XPN's Blog
The SQL Server Crypto Detour
Schneier on Security
CVE Program Almost Unfunded
Talos Intelligence
Eclipse and STMicroelectronics vulnerabilities
Eclypsium
Downstream Security: NIST & C-SCRM
Google Safety & Security
Our 2024 Ads Safety Report shows how we use AI to safeguard consumers.
Dark Reading
Active Directory Recovery Can't Be an Afterthought
The Citizen Lab
JUICYJAM: รายงานเรื่องวิธีการที่เจ้าหน้าที่รัฐเปิดเผยข้อมูลส่วนตัวเพื่อปราบปรามฝ่ายประชาธิปไตยในไทย
Ars Technica Security
CVE, global source of cybersecurity info, was hours from being cut by DHS
Krebs on Security
Funding Expires for Key Cyber Vulnerability Database
TrustedSec
TrustedSec Achieves CREST Certification
2025-04-15
Microsoft Security
Threat actors misuse Node.js to deliver malware and other malicious payloads
Microsoft Security
Transforming security with Microsoft Security Exposure Management initiatives
Schneier on Security
Slopsquatting
Talos Intelligence
Year in Review: The biggest trends in ransomware
Dark Reading
Accounting Firms Can't Skimp on Cybersecurity
Dark Reading
With AI's Help, Bad Bots Are Taking Over the Web
Dark Reading
Hertz Falls Victim to Cleo Zero-Day Attacks
Dark Reading
Are We Prioritizing the Wrong Security Metrics?
Claroty
CVE-2025-3128
Claroty
CVE-2025-3232
Krebs on Security
Trump Revenge Tour Targets Cyber Leaders, Elections
Compass Security Blog
300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race (CVE-2025-24076 and CVE-2025-24994)
2025-04-14
Microsoft Security
Explore how to secure AI by attending our Learn Live Series
Cloudflare
Developer Week 2025 wrap-up
Schneier on Security
Upcoming Speaking Engagements
Schneier on Security
China Sort of Admits to Being Behind Volt Typhoon
Malwarebytes
Meta slurps up EU user data for AI training
Malwarebytes
No, it’s not OK to delete that new inetpub folder
Malwarebytes
Malwarebytes named “Best Antivirus Software” and “Best Malware Removal Service”
Malwarebytes
A week in security (April 7 – April 13)
CrankySec
There is no "community"
Dark Reading
AI Code Tools Widely Hallucinate Packages
Palo Alto Networks
Modernizing Federal Security with Prisma Access
Searchlight Cyber
How Can Organizations Secure Their Digital Attack Surface?
2025-04-11
Cloudflare
A global virtual private cloud for building secure cross-cloud apps on Cloudflare Workers
Schneier on Security
Friday Squid Blogging: Squid and Efficient Solar Tech
Schneier on Security
AI Vulnerability Finding
Schneier on Security
Reimagining Democracy
Malwarebytes
The Pall Mall Pact and why it matters
Dark Reading
10 Bugs Found in Perplexity AI's Chatbot Android App
Offensive Security
How OSCP Holders Can Lead Their Teams to Greater Cybersecurity Resilience
Ars Technica Security
That groan you hear is users’ reaction to Recall going back into Windows
Ars Technica Security
Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs
Searchlight Cyber
Researchers Shed Light on Changes in Revived Babuk 2.0