How Attackers Bypass Synced Passkeys
Oct 15, 2025Ravie LakshmananData Protection / Browser Security TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to…
Oct 15, 2025Ravie LakshmananData Protection / Browser Security TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to…
Bridging the cybersecurity skills gap requires a multi-faceted approach focused on expanding the educational pipeline, upskilling and reskilling the existing workforce, leveraging technology as a force multiplier, and fostering a…
Cybersecurity in the oil and gas sector is a critical issue of national and economic security, focused on protecting the industrial control systems (ICS) that manage highly volatile physical processes…
Oct 15, 2025Ravie LakshmananVulnerability / Server Security Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in…
The rise of nation-state cyber warfare marks the establishment of cyberspace as the “fifth domain” of conflict, alongside land, sea, air, and space, where governments use digital weapons to achieve…
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast…
AI Applications in Cybersecurity There is a really great series of online events highlighting cool uses of AI in cybersecurity, titled Prompt||GTFO. Videos from the first three events are online.…
The primary cybersecurity challenge in the age of the Internet of Everything (IoE) is securing a hyper-connected world where the attack surface is not just every device, but every process,…
Apple’s New Memory Integrity Enforcement Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus…
I’m Spending the Year at the Munk School This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (It’s not a real sabbatical—I’m just an…