2025-03-21
Troy Hunt
Weekly Update 444
Schneier on Security
NCSC Releases Post-Quantum Cryptography Timeline
Dark Reading
Why Cyber Quality Is the Key to Security
RAM - Security Insights
Security Compliance Fit
Searchlight Cyber
Cyberattack to Blame for Recent X Outage
2025-03-20
Talos Intelligence
Tomorrow, and tomorrow, and tomorrow: Information security and the Baseball Hall of Fame
Talos Intelligence
UAT-5918 targets critical infrastructure entities in Taiwan
Schneier on Security
Critical GitHub Attack
Malwarebytes
Semrush impersonation scam hits Google Ads
Malwarebytes
Targeted spyware and why it’s a concern to us
watchTowr Labs
By Executive Order, We Are Banning Blacklists - Domain-Level RCE in Veeam Backup & Replication (CVE-2025-23120)
Cloudflare
Improved support for private applications and reusable access policies with Cloudflare Access
Dark Reading
Are We Closing the Gender Gap in Cybersecurity?
Dark Reading
HP Brings Quantum-Safe Encryption to Printers
Elastic Security Labs
Shedding light on the ABYSSWORKER driver
Krebs on Security
DOGE to Fired CISA Staff: Email Us Your Personal Data
Compass Security Blog
Bypassing Web Filters Part 4: Host Header Spoofing & Domain Fronting Detection Bypasses
2025-03-19
Eclypsium
BTS #47 - BMC&C Part 3
SentinelOne
Dragon RaaS | Pro-Russian Hacktivist Group Aims to Build on “The Five Families” Cybercrime Reputation
Cloudflare
Trapping misbehaving bots in an AI Labyrinth
Dark Reading
Cytex Unveils AICenturion
Dark Reading
Enterprises Gain Control Over LLM Oversharing With Prompt Security's GenAI Authorization
Dark Reading
Women in CyberSecurity and ISC2 Announce the WiCyS + ISC2 Certified in CybersecuritySM Certification Spring Camp
Dark Reading
AI Cloud Adoption Is Rife With Cyber Mistakes
Dark Reading
Why Cybersecurity Needs More Business-Minded Leaders
The Citizen Lab
Virtù o vizio? Un primo sguardo alle operazioni in espansione dello spyware di Paragon
Zero Day Initiative
Building an electric vehicle simulator to research EVSEs
Searchlight Cyber
Effective Ransomware Prevention Strategies
Palo Alto Networks
Palo Alto Networks Helps Secure Black Hat Asia 2025
2025-03-18
Eclypsium
BMC&C: Redfish Alert 3
Schneier on Security
Is Security Human Factors Research Skewed Towards Western Ideas and Habits?
Google Safety & Security
Google announces agreement to acquire Wiz
Cloudflare
Unleashing improved context for threat actor activity with our Cloudforce One threat events platform
Cloudflare
Extending Cloudflare Radar’s security insights with new DDoS, leaked credentials, and bots datasets
Dark Reading
Duke University & GCF Partner to Identify Pathways for Advancing Women's Careers in Cybersecurity
Dark Reading
3 AI-Driven Roles in Cybersecurity
PortSwigger
SAML roulette: the hacker always wins
Compass Security Blog
Bypassing Web Filters Part 3: Domain Fronting
Palo Alto Networks
SOC and Awe — How Autonomous Security Is Changing the Game
2025-03-17
Schneier on Security
Improvements in Brute Force Attacks
Malwarebytes
A week in security (March 10 – March 16)
watchTowr Labs
Bypassing Authentication Like It’s The ‘90s - Pre-Auth RCE Chain(s) in Kentico Xperience CMS
Amazon Security
AWS KMS CloudWatch metrics help you better track and understand how your KMS keys are being used
Dark Reading
OAuth Attacks Target Microsoft 365, GitHub
Dark Reading
Lexmark Expands Print Security Services Worldwide
Sansec Threat Research
You have 2 weeks left to set up CSP for your store
Google Security Blog
Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source
Ars Technica Security
Large enterprises scramble after supply-chain attack spills their secrets
2025-03-14
Schneier on Security
Friday Squid Blogging: SQUID Band
Schneier on Security
Upcoming Speaking Engagements
Dark Reading
Man-in-the-Middle Vulns Threaten Car Security
Krebs on Security
ClickFix: How to Infect Your PC in Three Easy Steps
Palo Alto Networks
Key Cybersecurity Considerations for Financial Institutions