This report provides a comprehensive analysis of cybersecurity incidents that occurred on July 3, 2025. After extensive investiga
This report provides a comprehensive analysis of cybersecurity incidents that occurred on July 3, 2025. After extensive investiga
In a deep-dive conversation at CISO Platform, Cassie Crossley, Vice President of Supply Chain Security at Schneider Electric, joined Bikash Barai (Co-founder, FireCompass & CISO Platform) to explore one of the most pressing concerns in enterprise sec
Black Hat’s Startup Spotlight is the cybersecurity sector’s premier launchpad—highlighting trailblazing companies at the intersection of groundbreaking defense and game-changing innovation. In 2024, the Competition narrowed hundreds of submissions do
As artificial intelligence (AI) capabilities advance, cyber attackers and defenders are entering a high-stakes arms race. Dark AI—malicious applications of AI for offensive purposes—leverages automation, precision, and adaptability to bypass traditio
Today, social platforms and online communities allow people to speak, share, and connect worldwide. Forums, real-time chats, comment sections, and multiplayer games all host active discussions. But this openness br
AI Slop will fuel the next wave of social engineering cybercrime attacks.
Rise of AI Slop (rapid ability to generate believable content)
x
Cybercriminals seeking to commit fraud
=
Enormous Rise in Social Engineering Victimization
The ease,
Decentralized Agentic AI: understanding agent communication. In the agentic space of Artificial Intelligence (AI) much recent development has taken place with folks building agents. The value of well built and/or purpose built agents can be immense.
Isn’t it about time the cybersecurity industry shifts towards positive reinforcement cybersecurity training?
We must consider that there might be better ways to change cybersecurity behaviors than threatening or boring the workers?
In the end, do we
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. T
If you are unable to view the form below, use the google form link here to express interest (RSVP)
Your biggest client just handed you a 47-page security questionnaire that reads like it was written by someone who thinks every computer is a potential gateway to nuclear launch codes. Meanwhile, your current IT setup consists of a few shared drives,
Just hours before it was set to expire on April 16, the federal contract funding MITRE’s stewardship of the CVE (Common Vulnerabilities and Exposures) program was given a temporary extension by CISA. Related: Brian Krebs’ take on
The company doesn’t keep logs, so couldn’t turn over data:
Windscribe, a globally used privacy-first VPN service, announced today that its founder, Yegor Sak, has been fully acquitted by a court in Athens, Greece, following a two-year legal battle i
A coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to the SEC to eliminate the rule requiring public disc
Our editorial team has handpicked the best of the best talks on AI/ML from RSA Conference USA – one of the most influential cybersecurity events globally. Held annually, this event brings together the sharpest minds in security to discuss the future
I was recently asked what my favorite cybersecurity speaking venue has been. Although not the largest keynote audience by sheer numbers, speaking at the Sphere 2022 conference sticks out as a unique experience with its 360° stage!
I had such a great
A 23-year-old Scottish man thought to be a member of the prolific Scattered Spider cybercrime group was extradited last week from Spain to the United States, where he is facing charges of wire fraud, conspiracy and identity theft. U.S. prosecutors al
Amazon CloudFront is a fast content delivery network (CDN). It delivers your data through edge locations worldwide. Businesses use CloudFront to reduce latency and improve user experience. However, it’s important to understand how much CloudFront wil
With daring military attacks, kinetic warfare is shifting the balance of power in regions across the globe, upending the perception of power projection. Powerful nations are reeling from the impacts of bold assaults and seeking additional methods to
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …