News

  • How Each Pillar of the 1st Amendment is Under Attack

    “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.” -U.S. Constitution, First Amendment. Image: Shutterstock, zimmytws. In an address…

    Read More

  • Friday Squid Blogging: Squid Werewolf Hacking Group

    In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read More

    Read More

  • Solar Power System Vulnerabilities Could Result in Blackouts

    Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to cause emergencies and blackouts Read More

    Read More

  • Nine in Ten Healthcare Organizations Use the Most Vulnerable IoT Devices

    Claroty revealed that 89% of healthcare organizations use the top 1% of riskiest Internet-of-Medical-Things (IoMT) devices Read More

    Read More

  • VanHelsing ransomware: what you need to know

    First reported earlier in March 2025, VanHelsing is a new ransomware-as-a-service operation. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • Trump CISA Cuts Threaten US Election Integrity, Experts Warn

    Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyber-attacks on US election infrastructure Read More

    Read More

  • Morphing Meerkat PhaaS Platform Spoofs 100+ Brands

    A PhaaS platform, dubbed ‘Morphing Meerkat,’ uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel Read More

    Read More

  • AIs as Trusted Third Parties

    This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: We often interact with untrusted parties. Prioritization of privacy can limit the effectiveness of these interactions, as achieving certain goals necessitates sharing private…

    Read More

  • CoffeeLoader Malware Loader Linked to SmokeLoader Operations

    Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security Read More

    Read More

  • When Getting Phished Puts You in Mortal Danger

    Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for organizations that are fighting the Kremlin war machine, can cost you your freedom or your life. The real website of the Ukrainian paramilitary group “Freedom of Russia” legion. The…

    Read More