US Senator Wyden demands that Microsoft be held accountable for the cloud services data theft…https://www.securityweek.com/us-senator-wyden-accuses-microsoft-of-cybersecurity-negligence/Jul 28, 2023Jul 28, 2023
Other challenges to brew the Perfect Storm: Rate of Change.Post II of: “Why we are losing the Cyberwar” (And what can we do about it).Jun 14, 2023Jun 14, 2023
Why we are losing the CyberwarPost I of: “Why we are losing the Cyberwar” (And what can we do about it).Jun 13, 2023Jun 13, 2023
BABUK, here we go again.I’ve read this morning in https://www.securityweek.com/new-babuk-based-ransomware-targeting-organizations-in-us-korea/ that a new group…May 17, 2023May 17, 2023
Budworm attacks again (allegedly)Budworm a.k.a APT27, Bronze Union, Emissary Panda, TG-3390, Red Phoenix, LuckyMouse; seems to have resurfaced again after several attacks…Oct 15, 2022Oct 15, 2022
An unbridled Twitter APICloudSEK has discovered that more than 10K apps were leaking API twitter data and a subset of 3207 apps were “leaking valid Consumer Key…Aug 3, 2022Aug 3, 2022
OT: Insecure-by-design?The CISA release of a cluster of 56 Industrial Controls Systems Advisories focuses on the prevalence of vulnerabilities caused by…Jul 4, 2022Jul 4, 2022
Cybersecurity trends: Cybersec Mesh ArchitectureHackers don’t think in silos, hackers look at your organization as a target domain. Therefore, your security standards must embrace the…Jun 23, 2022Jun 23, 2022
Ukraine Cyberwarfare: Main Threat Actors and attacks.I’ve read with keen interest this HBR article and I would like to add from a Threat Intelligence point of view a description of the main…Mar 9, 2022Mar 9, 2022