How Attackers Bypass Synced Passkeys
Oct 15, 2025Ravie LakshmananData Protection / Browser Security TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to…
Bridging the Cybersecurity Skills Gap Worldwide – loopz
Bridging the cybersecurity skills gap requires a multi-faceted approach focused on expanding the educational pipeline, upskilling and reskilling the existing workforce, leveraging technology as a force multiplier, and fostering a…
Cybersecurity in the Oil and Gas Sector – loopz
Cybersecurity in the oil and gas sector is a critical issue of national and economic security, focused on protecting the industrial control systems (ICS) that manage highly volatile physical processes…
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
Oct 15, 2025Ravie LakshmananVulnerability / Server Security Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in…
The Rise of Nation-State Cyber Warfare – loopz
The rise of nation-state cyber warfare marks the establishment of cyberspace as the “fifth domain” of conflict, alongside land, sea, air, and space, where governments use digital weapons to achieve…
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast…
AI Applications in Cybersecurity – Schneier on Security
AI Applications in Cybersecurity There is a really great series of online events highlighting cool uses of AI in cybersecurity, titled Prompt||GTFO. Videos from the first three events are online.…
Cybersecurity in the Age of Internet of Everything (IoE) – loopz
The primary cybersecurity challenge in the age of the Internet of Everything (IoE) is securing a hyper-connected world where the attack surface is not just every device, but every process,…
Apple’s New Memory Integrity Enforcement
Apple’s New Memory Integrity Enforcement Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus…
I’m Spending the Year at the Munk School
I’m Spending the Year at the Munk School This academic year, I am taking a sabbatical from the Kennedy School and Harvard University. (It’s not a real sabbatical—I’m just an…