Smashing Security podcast #459: This clever scam nearly hijacked a tech CEO’s Apple ID
In episode 459 of Smashing Security, we dive into a chillingly clever account takeover attempt targeting WordPress co-founder Matt Mullenweg...
In episode 459 of Smashing Security, we dive into a chillingly clever account takeover attempt targeting WordPress co-founder Matt Mullenweg...
Whether you’re a hardcore basketball fan or the office colleague who gets roped into filling out a bracket every year, March Madness...
A patient walks into a new hospital. At the front desk, they are asked to fill in their insurance...
FBI launches inquiry into Steam games spreading malware Pierluigi Paganini March 16, 2026 The FBI is asking gamers who installed...
FBI launches inquiry into Steam games spreading malware Pierluigi Paganini March 16, 2026 The FBI is asking gamers who installed...
AI has quietly turned identity governance into the place where real power flows are decided—who (or what) can move...
Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious...
Your Google Search history provides one of the most detailed windows into your private life, and I know this...
Montreal has a guardrail baked into its skyline. The “mountain restriction" keeps most buildings from rising higher than the...
Lohrmann on Cybersecurity A deep dive into Iranian cyber warfare and actionable defenses for network operators. March 08, 2026 • ...
FBI probing intrusion into a system managing sensitive surveillance information Pierluigi Paganini March 07, 2026 The Federal Bureau of Investigation...
How autonomous triage turns security analysts from ticket processors into strategic operators The Security Operations Center has a math...
Geopolitical conflict rarely stays confined to physical battlefields. Increasingly, it spills into the digital domain. The latest escalation of tensions...
The pervasive integration of large language models (LLMs) into modern application development is fundamentally reshaping the software security landscape....
Untrusted repositories turn Claude code into an attack vector Pierluigi Paganini February 25, 2026 Flaws in Anthropic’s Claude Code could...