News

UK’s online safety act continues rollout.Welcome to the CAVEAT Weekly Newsletter, where we break down some of the major developments and happenings occurring worldwide when discussing cybersecurity, ...
You can’t copy Maya Doron. Not just because she’ll notice (and yes, she has receipts), but because everything she does on social at Wiz is built on something AI can’t touch: chaos, specificity, and a ...
Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover ...
Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling ...
Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop ...
The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks.
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious ...
Ann Johnson talks with cybersecurity leaders and industry experts about the trends shaping the cyber landscape and what should be top-of-mind for key decision makers.
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through ...
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
Join Dave Bittner, Joe Carrigan and Maria Varmazis each week as they look behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll ...
In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone welcome back George Hughey and Rohit Mothe from the Microsoft Security Response Center (MSRC) to discuss their latest blog ...