A smiling man with short dark hair and a light beard, wearing a blue t-shirt, poses in front of a blurred background of water and what appears to be a dock or bridge structure.
Hackers are using AI agents to outsmart old logins. Itβs time to ditch passwords and move to phishing-proof credentials like passkeys.
Donβt miss the full story from #FoundryExpert Contributor, Srinivasa Ravi Teja Peri: spr.ly/633227PN1m
#Authentication
#Passwords
#Phishing
07.11.2025 20:38 β π 0 π 0 π¬ 0 π 0
A professional headshot of a Black woman with curly hair and glasses, wearing a navy blazer and white blouse. She's confidently posed with her arms crossed against a gray background.
If your backups arenβt secure, your business isnβt either. Cybersecurity and continuity must now work hand in hand to keep you running.
Donβt miss the full story from #FoundryExpert Contributor, Omowunmi Makinde, MsC: spr.ly/633227PFTj
#Hacking #DataBreach
07.11.2025 20:11 β π 0 π 0 π¬ 0 π 0
A woman with brown skin, dark hair, and a bindi is centered in the image. She wears a blue top and a gold necklace. The background is light.
The next pandemic wonβt just test our biology β itβll test whether our AI and cybersecurity can survive the storm.
Read the full piece from #FoundryExpert Contributor, Rama Devi Drakshpalli: spr.ly/633297OiqD
Enjoyed this story? β¬οΈ
spr.ly/633247Oiqy
06.11.2025 22:26 β π 0 π 0 π¬ 0 π 0
Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw
Chinese UNC6384 campaign cleverly exploits Windows .LNK vulnerability, security company finds.
Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability thatβs been popular with threat groups as far back as 2017.
www.csoonline.com/article/4082...
06.11.2025 14:44 β π 0 π 0 π¬ 0 π 0
Flaw in React Native CLI opens dev servers to attacks
The bug exposes the Metro development server to remote attacks, allowing arbitrary OS command execution on developer systems before a fix in version 20.0.0.
A critical remote-code execution (RCE) flaw in the widely used @react-native-community/cli (and its server API) lets attackers run arbitrary OS commands via the Metro development server, the default JavaScript bundler for React Native.
www.infoworld.com/article/4085...
06.11.2025 14:43 β π 1 π 0 π¬ 0 π 0
A man smiles wearing a blue shirt and gray blazer, facing forward. He has short, graying hair. The background is a blurry white.
Cyber threats donβt just hit your systems β they move through your connections. The ULM shows how those hidden links fuel real risk.
Donβt miss the full story from #FoundryExpert Contributor, Henry Sienkiewicz: spr.ly/633257HRR3
#ZeroTrust #Cyberattacks
31.10.2025 20:34 β π 0 π 0 π¬ 0 π 0
Close-up of a smiling Black man with a neatly trimmed graying beard, wearing blue-rimmed glasses and a black turtleneck sweater, facing the camera directly with a soft, neutral background.
If your cyber dashboard looks like a tech manual, youβre flying blind. Real leaders measure resilience, not patch counts.
Here are the only metrics that matter to rewire your boardroom dashboard spr.ly/633227GG5O
#Analytics
#NetworkSecurity
#ROIandMetrics #FoundryExpert
30.10.2025 21:48 β π 0 π 0 π¬ 0 π 0
Headshot of a man with a beard wearing glasses, a suit jacket, and a patterned blue tie. He is smiling at the camera.
Is your perimeter having an identity crisis?
Your biggest security risk might now sound exactly like your boss. AI clones identities so well that only zero-trust thinking can keep you safe.
Get the full story by #FoundryExpert Contributor, Chris Novak: spr.ly/633247Eajp
29.10.2025 19:41 β π 0 π 0 π¬ 0 π 0
BlueNoroff reemerges with new campaigns for crypto theft and espionage
GhostCall and GhostHire use fake investor meetings and bogus recruiter tests to deliver cross-platform malware to blockchain and Web3 professionals.
North Korea-aligned threat actor BlueNoroff, also known under aliases APT38 and TA444, has resurfaced with two new campaigns dubbed βGhostCallβ and βGhostHire,β targeting executives, Web3 developers, and blockchain professionals.
www.csoonline.com/article/4081...
29.10.2025 13:38 β π 0 π 0 π¬ 0 π 0
A selfie of a man on an airplane, seated next to a window. Outside, the view includes airport tarmac, buildings, and a blue sky. The man has short hair and is wearing a dark-colored shirt.
Volvoβs data scare shows how fast β and smart β you need to move after a breach, especially when the problem starts with a vendor.
Catch the full write-up by #FoundryExpert Contributor, Justin Tolman: spr.ly/633267Dtse
#Cyberattacks
#DataBreach
#IncidentResponse
28.10.2025 23:08 β π 0 π 0 π¬ 0 π 0
Close-up of a smiling man with dark hair and a light complexion, wearing a blue suit jacket and a white shirt, standing in front of a reflective glass building.
Reactive security is dead. The ROC proves the future belongs to those who fuse cyber and finance before the next breach hits.
Catch the full write-up by #FoundryExpert Contributor, Vishaal Hariprasad: spr.ly/633277Dtgt
#Cyberattacks
#Malware
#Ransomware
28.10.2025 23:01 β π 0 π 0 π¬ 0 π 0
Do CISOs need to rethink service provider risk?
CISOs are charged with managing a vast ecosystem of MSPs and MSSPs, but are the usual processes fit for purpose as outsourced services become more complex and critical β and will AI force a rethink?
As organizations increasingly rely on services providers to help manage critical systems and security operations β from cloud infrastructure and data platforms to managed security and AI services β the risk of exposure also grows.
www.csoonline.com/article/4075...
28.10.2025 12:34 β π 0 π 0 π¬ 0 π 0
Atlas browser exploit lets attackers hijack ChatGPT memory
OpenAIβs Atlas browser is under scrutiny after researchers demonstrated how attackers can hijack ChatGPT memory and execute malicious code, without leaving traditional malware traces.
Days after cybersecurity analysts warned enterprises against installing OpenAIβs new Atlas browser, researchers have discovered a vulnerability that allows attackers to infect systems with malicious code, granting themselves access privileges, or deploy malware. www.csoonline.com/article/4080...
28.10.2025 12:26 β π 0 π 0 π¬ 0 π 0
Close-up of a woman with dark hair and a warm smile. She is wearing a black jacket over a red top. The background is plain white.
Go beyond data sovereignty promises to proof with five CSO controls: zero-trust, local keys, logs, validation and third-party attestation.
See what #FoundryExpert Contributor Michelle Buckner has to say: spr.ly/6332478dwG
#AccessControl
#Encryption
#ZeroTrust
27.10.2025 21:02 β π 0 π 0 π¬ 0 π 0
A man with dark hair and sunglasses in a gray t-shirt. Behind him is blurred background with water and a cityscape. He's centered, looking directly at the camera with a neutral expression.
Signalβs getting ahead of the quantum curve, adding new layers of encryption to keep your chats safe from tomorrowβs supercomputers.
Get the full story by #FoundryExpert Contributor, Sunil Gentyala: spr.ly/63321AhYfb
#Encryption #Security
24.10.2025 16:14 β π 0 π 0 π¬ 0 π 0
A smiling man with short brown hair stands with arms crossed. He wears a blue polo shirt with "RESOLVE" on it and a smartwatch. A blurred city backdrop is visible.
Detectionβs not defense β if you canβt act in five minutes, youβre already losing the cyber war.
Get the full story by #FoundryExpert Contributor, Sean Heuer: spr.ly/63325AhYyJ
#CloudSecurity #CyberAttacks
24.10.2025 16:04 β π 0 π 0 π¬ 0 π 0
Why must CISOs slay a cyber dragon to earn business respect?
Security leaders and industry experts weigh in on the complex calculus of CISOsβ internal clout.
Although one in four security leaders find themselves replaced after a ransomware attack, for example, other CISOs are finding incident-hardened experiences β with transparent and successful outcomes β to be increasingly sought after in the hiring market.
www.csoonline.com/article/4074...
23.10.2025 12:20 β π 0 π 0 π¬ 0 π 0
Serious vulnerability found in Rust library
Hole in the TAR library and its forks could lead to remote code execution.
Researchers at Edera say they have uncovered a critical boundary-parsing bug, dubbed TARmageddon (CVE-2025-62518), in the popular async-tar Rust library. And not only is it in this library, but also in its many forks, including the widely used tokio-tar.
www.csoonline.com/article/4077...
23.10.2025 12:18 β π 0 π 0 π¬ 0 π 0
Prompt hijacking puts MCP-based AI workflows at risk
An AI version of session hijacking can lead to attackers injecting malicious prompts into legitimate MCP communications.
Security researchers warn that MCP-based AI workflows can be vulnerable to malicious prompt injection attacks if session ID management was implemented insecurely on the MCP servers facilitating the connection. www.csoonline.com/article/4077...
23.10.2025 12:16 β π 0 π 0 π¬ 0 π 0
A portrait of a young man with brown hair and a beard, wearing a light colored shirt against a gray background. He has brown eyes and a serious expression.
Most GenAI pilots flop, but with better security, oversight and smart integration, enterprises can finally turn experiments into real impact.
Get expert perspective from #FoundryExpert Contributor, Virendra Singh Panwar spr.ly/63323A7LEL
#Privacy #APIs
22.10.2025 21:06 β π 0 π 0 π¬ 0 π 0
We are the 501(c)(3) critical action think tank that unites technology and policy leaders to create solutions to emerging security challenges.
https://securityandtechnology.org/
#CIO connects enterprise IT leaders with expert insights on business strategy, innovation, and #ITleadership. From career growth to #digitaltransformation, we help CIOs and technology executives drive success.
Senior writer, InfoWorld.com. Python, Rust, LLVM, language dev, software dev, cloud, containers, databases, extra mayo hold the relish
The worldβs only cyberpunk non-fiction writer. SUBSCRIBE TO MY NEWSLETTER FREE!!! βοΈ βοΈ βοΈ https://machinesociety.ai/
π¨βπ» Used to write code, now writes words about code π Azure AI Services At Scaleπ¦O'Reilly π» Beats: enterprise, dev, cloud πββοΈ Vrai Jerri, bird photos, SFF writer, reader, ally, he/him/they πββ¬ calico floofs π§ simon@sandm.co.uk π sbisson.com
Arsenal apologist. Pronounced "ay-see".
DC resident and cybersecurity writer, analyst, book author, publisher. https://metacurity.com/ https://cyberriskbook.com/
https://www.csoonline.com/profile/cynthia-brumfield/ https://infosec.exchange/@metacurity
Send tips to Cynthia.507 via Signal.
Technology journalist covering artificial intelligence, cybersecurity and quantum computing. Science fiction author and magazine editor. Also -- retired war correspondent.
Cybersecurity journalist and senior writer for http://CSOonline.com. Past work featured in Forbes, Motherboard, The New Stack, PCWorld, Computerworld, others.
Childless cat lady β Gen X β Managing Editor/Features for @computerworld.com β Opinions are my own.
Tech journalist for a while, NC ('61) to RI ('84) to NC ('20). Cars/history/dogs/Macs/tech/politics/gym (not necessarily in that order); happily married. π³οΈβπ
Editor in Chief for B2B tech pubs CIO, CSO, Computerworld, InfoWorld, Network World.