NCSC warns companies to prepare for a day when your screens go dark
The UK’s National Cyber Security Centre warns that the country now faces four nationally significant cyberattacks every week – a 129% jump in a year. Some headlines claim the NCSC…
Cybersecurity as a National Defense Strategy – loopz
Cybersecurity is a core component of modern national defense, serving as both a shield to protect a nation’s critical infrastructure and a sword to project power and conduct espionage in…
A breach, a burnout, and a bit of Fleetwood Mac • Graham Cluley
A critical infrastructure hack hits the headlines – involving default passwords, boasts on Telegram, and a finale that will make a few cyber-crooks wish the ground would swallow them whole.…
How Attackers Bypass Synced Passkeys
Oct 15, 2025Ravie LakshmananData Protection / Browser Security TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to…
Bridging the Cybersecurity Skills Gap Worldwide – loopz
Bridging the cybersecurity skills gap requires a multi-faceted approach focused on expanding the educational pipeline, upskilling and reskilling the existing workforce, leveraging technology as a force multiplier, and fostering a…
Cybersecurity in the Oil and Gas Sector – loopz
Cybersecurity in the oil and gas sector is a critical issue of national and economic security, focused on protecting the industrial control systems (ICS) that manage highly volatile physical processes…
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
Oct 15, 2025Ravie LakshmananVulnerability / Server Security Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in…
The Rise of Nation-State Cyber Warfare – loopz
The rise of nation-state cyber warfare marks the establishment of cyberspace as the “fifth domain” of conflict, alongside land, sea, air, and space, where governments use digital weapons to achieve…
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast…
AI Applications in Cybersecurity – Schneier on Security
AI Applications in Cybersecurity There is a really great series of online events highlighting cool uses of AI in cybersecurity, titled Prompt||GTFO. Videos from the first three events are online.…