More Steganography!, (Sat, Jun 14th) on June 14, 2025 Posted by SANS Internet Storm Center, InfoCON: green
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets on June 13, 2025 Posted by The Hacker News
Posted in application application development Application Security book review Business Interview Podcast Podcasts Products She Hacks Purple Software software development Spotlight vulnerabilities Web web applications Episode 260: The Art of Teaching Secure Coding with Tanya Janca on February 18, 2025 Paul F. Roberts
Posted in 2025 APT attack simulation cyber attack simulation cybersecurity Cymulate Hacking Interview Podcast Podcasts Risk risk management security validation Spotlight trends vulnerabilities Security Validation: A Deep Dive with Cymulate’s David Kellerman on January 15, 2025 Paul F. Roberts
Posted in APT Business china CISO CISO Close Up Companies Conferences critical infrastructure CSO Cyber Attack DirectDefense Government Hacking ICS industrial control systems (ICS) Internet of Things Interview MSSP operational security operational technologies Operational Technology OT Podcast Podcasts RSA Conference Spotlight Technologies Threats Top Stories Utility Volt Typhoon Spotlight Podcast: OT Is Under Attack. Now What? on June 5, 2024 Paul F. Roberts
Posted in APT Business china CISA Companies critical infrastructure CSO DirectDefense Government hacks Internet of Things Interview MSSP operational technologies Operational Technology OT Podcast Podcasts social engineering Spotlight Technologies Threats Top Stories Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk on May 16, 2024 Paul F. Roberts
Posted in artificial intelligence authentication cybersecurity DirectDefense Interview MSSP multi-factor authentication Podcast Podcasts Reports Spotlight Technologies trends vulnerabilities Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape on May 2, 2024 Paul F. Roberts
Posted in artificial intelligence authentication cybersecurity DirectDefense Interview MSSP multi-factor authentication Podcast Podcasts Reports Spotlight Technologies trends vulnerabilities Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape on May 2, 2024 Paul F. Roberts
Posted in artificial intelligence Berryville Institute of Machine Learning Companies data privacy Interview machine learning OpenAI Podcasts Reports Risk risk management Spotlight Technologies Top Stories Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity on February 21, 2024 Paul F. Roberts
Posted in Business Conferences Consumer data privacy DefCon firmware Hacking hardware Internet of Things Interview Law linux Networking Podcast Podcasts reverse engineering right to repair robot vacuum smart home Software Spotlight surveillance The Fight to Repair Top Stories vulnerabilities Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement on December 19, 2023 Paul F. Roberts
Posted in application development critical infrastructure data privacy hardware Internet of Things Interview platform Podcast Podcasts Software Spotlight Technologies Thistle Technologies Top Stories Trusted Platform Module vulnerabilities Episode 250: Window Snyder of Thistle on Making IoT Security Easy on May 13, 2023 Paul F. Roberts
Posted in API Application Security artificial intelligence CISO Close Up Cloud digital transformation Interview Podcast Podcasts Software Spotlight Technologies Top Stories Traceable web applications Spotlight: Traceable CSO Richard Bird on Securing the API Economy on April 5, 2023 Paul F. Roberts