Smashing Security podcast #452: The dark web’s worst assassins, and Pegasus in the dock
In episode 452, a London-based YouTuber wins a landmark court case against Saudi Arabia after his phone was hacked with...
In episode 452, a London-based YouTuber wins a landmark court case against Saudi Arabia after his phone was hacked with...
How badly do you want to win an online argument? I certainly hope it's not enough to put the life...
How Safe Are Autonomous Agents in Your Cloud Environment? Have you ever considered the security risks posed by autonomous agents...
Are Organizations Truly Safe Without Effective Non-Human Identity Management? The Growing Importance of Agentic AI in Platform Security How can...
Image: Omid Armin/Unsplash Apple has finally begun paying up for the Siri eavesdropping scandal. After a long-running legal battle, Apple...
Image: appshunter.io (Unsplash) If you’ve ever worried about who might try to reach you on WhatsApp, the company has a...
A survey of 506 cybersecurity leaders and practitioners working for organizations with more than 500 employees, published today, finds that...
Cyber incidents in the public sector rarely begin with chaos. More often, they start quietly, with access that appears routine...
Multi-factor authentication has long been treated as a security finish line. Once enabled, organizations assume that account takeover risks drop...
Welcome to our podcast series, Coffee with the Council. I'm Alicia Malone, Director of Communications and Public Relations for the...
Fortinet patches actively exploited FortiOS SSO auth bypass (CVE-2026-24858) Pierluigi Paganini January 28, 2026 Fortinet released fixes for a critical...
An already expansive investigation into a widespread scheme to steal money from ATMs around the United States grew even larger...
He offered a number of examples involving AI in production. The company, for example, built a migration buddy agent to help...
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the...
Ravie LakshmananJan 28, 2026Critical Infrastructure / Threat Intelligence The "coordinated" cyber attack targeting multiple sites across the Polish power grid...