Last update (UTC): 22:45 - 14/10/2025
https://www.security.nl/posting/909151/Website+RIVM+weer+online+na+verhelpen+van
https://www.security.nl/posting/909141/Firefox+Password+Manager+slaat+wachtwoord
https://www.security.nl/posting/909136/TeamViewer%3A+veertig+procent+computers+d
https://www.security.nl/posting/909132/Pixnapping-aanval+laat+malafide+app+2FA-c
https://www.security.nl/posting/909118/RIVM+haalt+website+offline+nadat+er+malaf
https://www.security.nl/posting/909092/Defecte+software-update+laat+Jeeps+langs+
https://www.security.nl/posting/909081/Australische+overheid+roept+bedrijven+op+
https://www.security.nl/posting/909076/Aanstelling+van+Meta-lobbyist+als+commiss
https://www.security.nl/posting/909069/Kringloopwinkels+Friese+afvalverwerker+Om
https://www.security.nl/posting/909064/Britse+overheid+meldt+recordaantal+cybera
Read more of this story at Slashdot.
https://tech.slashdot.org/story/25/10/14/2043238/windows-10-support-ends-today?u
Read more of this story at Slashdot.
https://slashdot.org/story/25/10/14/1925230/salesforce-says-ai-customer-service-
Read more of this story at Slashdot.
https://entertainment.slashdot.org/story/25/10/14/1323222/directv-will-soon-brin
Read more of this story at Slashdot.
https://yro.slashdot.org/story/25/10/14/1542245/lawyer-caught-using-ai-while-exp
Read more of this story at Slashdot.
https://entertainment.slashdot.org/story/25/10/14/1536226/indonesias-film-indust
Read more of this story at Slashdot.
https://news.slashdot.org/story/25/10/14/1525220/the-world-is-producing-more-foo
Read more of this story at Slashdot.
https://slashdot.org/story/25/10/14/155258/generative-ai-systems-miss-vast-bodie
Read more of this story at Slashdot.
https://slashdot.org/story/25/10/14/176237/california-cracks-down-on-predatory-e
Read more of this story at Slashdot.
https://science.slashdot.org/story/25/10/14/1043236/satellites-are-leaking-the-w
Read more of this story at Slashdot.
https://it.slashdot.org/story/25/10/14/0920224/beijing-issues-documents-without-
Asahi's cyber hangover just got worse, with the brewer now admitting that personal information may have been tapped in last month's attack....
https://go.theregister.com/feed/www.theregister.com/2025/10/14/asahi_breach_upda
Mozilla is working on a built-in VPN for Firefox, with beta tests opening to select users shortly....
https://go.theregister.com/feed/www.theregister.com/2025/10/14/mozilla_firefox_v
Oracle is rushing out another emergency patch for its embattled E-Business Suite as the fallout from the Clop-linked attacks continues to spread....
https://go.theregister.com/feed/www.theregister.com/2025/10/14/oracle_rushes_out
Cyberattacks that meet upper severity thresholds set by the UK government's cyber agents have risen 50 percent in the last year, despite almost zero change in the volume of cases handled....
https://go.theregister.com/feed/www.theregister.com/2025/10/14/ncsc_uk_cyberatta
The European Union's new biometric Exit/Entry System (EES) got off to a chaotic start at Prague's international airport, with travelers facing lengthy queues and malfunctioning equipment forcing border staff to process arrivals manually....
https://go.theregister.com/feed/www.theregister.com/2025/10/14/eu_biometric_bord
The Scattered Lapsus$ Hunters (SLSH) cybercrime collective - compriseed primarily of teenagers and twenty-somethings - announced it will go dark until 2026 following the FBI's seizure of its clearweb site....
https://go.theregister.com/feed/www.theregister.com/2025/10/13/scattered_lapsus_
An Austrian digital privacy group has claimed victory over Microsoft after the country's data protection regulator ruled the software giant "illegally" tracked students via its 365 Education platform and used their data....
https://go.theregister.com/feed/www.theregister.com/2025/10/13/microsoft_365_edu
China's competition regulator has launched an investigation into Qualcomm's purchase of Israeli firm Autotalks, the latest salvo in the escalating tech trade war between Washington and Beijing....
https://go.theregister.com/feed/www.theregister.com/2025/10/13/qualcomm_autotalk
Ofcom, the UK's Online Safety Act regulator, has fined online message board 4chan £20,000 ($26,680) for failing to protect children from harmful content....
https://go.theregister.com/feed/www.theregister.com/2025/10/13/4chan_ofcom_fine/
The Dutch government has placed Nexperia - a Chinese-owned semiconductor company that previously operated Britain's Newport Wafer Fab — under special administrative measures, citing serious governance failures that threaten European tech security....
https://go.theregister.com/feed/www.theregister.com/2025/10/13/nexperia_special_
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 6
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 4
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.troyhunt.com – Author: Troy Hunt Sponsored by: So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to announce AI-driven events, such as people ringing the doorbell. A few hours’ worth of video from these weekly updates fed into ElevenLabs and […]
La entrada Weekly Update 469 – Source: www.troyhunt.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/weekly-update-469-source-www-troyhunt-com/
Source: thehackernews.com – Author: . The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for a string of data theft and extortion attacks. “Both groups have recently been observed targeting organizations’ Salesforce platforms via different initial […]
La entrada FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/fbi-warns-of-unc6040-and-unc6395-targeting-salesforce-plat
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool […]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-d
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s […]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-sourc
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 4
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-sour
Source: www.darkreading.com – Author: Riaz Lakhani Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and our communities. Original Post URL: https://www.darkreading.com/cyberattacks-data-breaches/without-federal-help-cyber-defense-cisa Category & Tags: – Views: 6
La entrada Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/without-federal-help-cyber-defense-is-up-to-the-rest-of-us
Source: securityboulevard.com – Author: Gaurav Banga Here’s a scenario security teams increasingly face. A user—or an attacker pretending to be one—types something like: This is how many prompt injection attempts begin. The phrase looks harmless, but it’s a red flag: the user is telling the AI to forget its built‐in rules. What follows is often […]
La entrada Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/safer-conversational-ai-for-cybersecurity-the-bix-approach
Source: securityboulevard.com – Author: Sofia Naer Introduction On July 16, 2025, Europol revealed the details of Operation Eastwood, a coordinated international strike against one of the most active pro-Russian cybercrime groups, NoName057(016). The announcement promised a major disruption to the group’s activities. In this blog, we explore whether Operation Eastwood had any real impact on […]
La entrada Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/operation-eastwood-measuring-the-real-impact-on-noname0571
https://hackread.com/microsoft-limits-ie-mode-edge-chakra-zero-day/
https://hackread.com/criminal-ip-to-showcase-asm-and-cti-innovations-at-govware-
https://hackread.com/sweet-security-named-cloud-security-leader-and-cadr-leader-
https://hackread.com/agentic-systems-mcp-vibe-coding-schema-software-engineering
https://hackread.com/police-bust-gxc-team-cybercrime-networks/
https://hackread.com/how-top-socs-up-to-date-current-threat-landscape/
https://hackread.com/astaroth-trojan-github-images-active-takedowns/
https://hackread.com/gcore-mitigates-record-breaking-6-tbps-ddos-attack/
https://hackread.com/shinyhunters-leak-data-qantas-vietnam-airlines-others/
https://hackread.com/openai-guardrails-bypass-prompt-injection-attack/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333
https://www.ncsc.nl/actueel/nieuws/2025/09/30/28-publieke-en-private-partijen-te
https://www.ncsc.nl/actueel/nieuws/2025/09/26/subsidie-voor-mkb-bedrijven-nog-1-
https://www.ncsc.nl/actueel/nieuws/2025/09/10/cyberweerbaarheidsnetwerk-bouwplan
https://www.ncsc.nl/actueel/nieuws/2025/08/29/nieuwe-malwarecampagne-ontdekt-via
https://www.ncsc.nl/actueel/nieuws/2025/08/26/nieuwe-kwetsbaarheden-in-citrix-ne
https://www.ncsc.nl/actueel/nieuws/2025/08/15/eefje-zents-chief-relations-office
https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid
https://www.ncsc.nl/actueel/nieuws/2025/07/23/casus-microsoft-sharepoint
https://www.ncsc.nl/actueel/nieuws/2025/07/20/kwetsbaarheden-in-microsoft-sharep
https://www.ncsc.nl/actueel/nieuws/2025/07/21/informatie-over-kwetsbaarheden-in-
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2268
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2274
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2110
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1417
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2023
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1928
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1389
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3368
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1665
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3086
https://thehackernews.com/2025/10/chinese-hackers-exploit-arcgis-server.html
https://thehackernews.com/2025/10/moving-beyond-awareness-how-threat.html
https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html
https://thehackernews.com/2025/10/new-pixnapping-android-flaw-lets-rogue.html
https://thehackernews.com/2025/10/what-ai-reveals-about-web-applications.html
https://thehackernews.com/2025/10/npm-pypi-and-rubygems-packages-found.html
https://thehackernews.com/2025/10/researchers-expose-ta585s-monsterv2.html
https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html
https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html
https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html
A GitHub Copilot Chat bug let attackers steal private code via prompt injection. Learn how CamoLeak worked and how to defend against AI risks.
The post CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft appeared first on TechRepublic.
https://www.techrepublic.com/article/news-github-copilot-data-theft/
Oracle patches a high-severity EBS flaw that could let attackers bypass authentication and access sensitive enterprise data.
The post Critical Oracle EBS Flaw Could Expose Sensitive Data appeared first on TechRepublic.
https://www.techrepublic.com/article/news-oracle-ebs-vulnerability/
The World Economic Forum and Accenture offer a practical roadmap for organizations to leverage responsible AI into a competitive advantage.
The post New Playbook Offers Guidelines on Advancing Transformative Responsible AI appeared first on TechRepublic.
https://www.techrepublic.com/article/news-advance-transformative-responsible-ai-
After breaching the security of Oracle’s E-Business Suite, a well-known group of hackers is actively trying to extort execs for millions of dollars.
The post Oracle Extortion Case: $50M Demand From ‘Notorious’ Hacking Group appeared first on TechRepublic.
https://www.techrepublic.com/article/news-oracle-e-business-suite-breach-ransom-
Microsoft 365 Premium subscription bundles Copilot AI and Office apps for $19.99/month. It replaces Copilot Pro and offers a secure way to use AI at work.
The post Microsoft Unveils 365 Premium, Its New Top-Tier AI and Productivity Bundle appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-365-premium/
Developers can sell security solutions and agents that work with Microsoft security products, including the Copilot AI.
The post Microsoft Launches Security Store to Unify AI-Powered Defense Tools appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-security-store/
The US Commerce Chief has also issued a warning about DeepSeek that reliance on those AI models is "dangerous and shortsighted."
The post DeepSeek AI Models Are Easier to Hack Than US Rivals, Warn Researchers appeared first on TechRepublic.
https://www.techrepublic.com/article/news-deepseek-security-gaps-caisi-study/
CISA is among the government agencies affected. The shutdown is a reminder for government contractors to harden their cybersecurity.
The post What Does the Government Shutdown Mean for Cybersecurity? appeared first on TechRepublic.
https://www.techrepublic.com/article/news-government-shutdown-2025/
This new ransomware detection is available in beta in Google Drive for desktop on Windows or macOS, with a general release expected by the end of the year.
The post Google Adds AI-Powered Ransomware Protection and Recovery to Drive for Desktop appeared first on TechRepublic.
https://www.techrepublic.com/article/news-google-drive-ai-ransomware-detection/
Two defendants pleaded guilty in a Bitcoin laundering case tied to the UK's record crypto seizure. The Met’s seven-year probe moves to sentencing 10–11 November.
The post UK Police Convicts Pair in £5.5 Billion Bitcoin Launder Case appeared first on TechRepublic.
https://www.techrepublic.com/article/news-uk-record-bitcoin-seizure/
https://www.bleepingcomputer.com/news/security/malicious-crypto-stealing-vscode-
https://www.bleepingcomputer.com/news/microsoft/final-windows-10-patch-tuesday-u
https://www.bleepingcomputer.com/news/security/new-android-pixnapping-attack-ste
https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-2016-and-2019
https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2025-patch-tue
https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5066835-and-kb50667
https://www.bleepingcomputer.com/news/security/us-seizes-15-billion-in-crypto-fr
https://www.bleepingcomputer.com/news/security/oracles-silently-fixes-zero-day-e
https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-that-windows-10-
https://www.bleepingcomputer.com/news/security/security-firms-dispute-credit-for
Large language models are reshaping how we write software. With a few prompts, developers can generate boilerplate, integrate dependencies, write tests, and scaffold entire systems in a fraction of the time it used to take.
The post The LLM Dependency Trap appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/the-llm-dependency-trap/
4 min readSay goodbye to long-lived personal access tokens as you replace them with ephemeral, policy-driven credentials and automated service account management.
The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared first on Aembit.
The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/aembit-connects-ai-and-workload-access-to-
Author, Creator & Presenter: Keynote2: Frederik Braun (Mozilla)
Session 3: Web3 and Work in Progress: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’YouTube channel.
The post NDSS 2025 – MADWeb 2025, Keynote 2 and Session 3 appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/ndss-2025-madweb-2025-keynote-2-and-sessio
Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI is transforming the way enterprises defend against modern cyber threats. Reed, who joined Vectra after years leading cloud security and product teams at Google, explains that traditional approaches to threat detection are no longer sufficient...
The post Beyond Alerts: Building Smarter, Context-Aware Threat Detection appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/beyond-alerts-building-smarter-context-awa
Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, discusses how artificial intelligence and evolving threat dynamics are reshaping cybersecurity. Rodriguez brings a unique perspective—equal parts technical and creative—describing how CrowdStrike continues to innovate in an era defined by speed and complexity. He notes that attackers are evolving just as quickly as defenders, with AI..
The post Preparing for the Next Wave of AI-Driven Threats appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/preparing-for-the-next-wave-of-ai-driven-t
The China-based APT group Flax Typhoon used a function within ArcGIS' legitimate geo-mapping software to create a webshell through which it established persistence for more than a year to execute malicious commands and steal credentials.
The post China’s Flax Typhoon Exploits ArcGIS App for Year-Long Persistence appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/chinas-flax-typhoon-exploits-arcgis-app-fo
Despite continued investments in SIEMs, threat intelligence platforms, and managed detection services, many Security Operations Centers (SOCs) remain in a defensive position. SOCs are reactive, overstretched, and underprepared. High-profile breaches continue to grab headlines, but they are only what is visible. The reality is that SOC teams are overwhelmed by alert fatigue, organizational friction, and..
The post The Defensive Gap: Why Modern SOCs Are Losing Ground and How to Close It appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/the-defensive-gap-why-modern-socs-are-losi
Your users aren’t downloading files to their desktops anymore. They’re not running local applications. They’re working in Google Docs, Salesforce, Slack, and dozens of other browser-based platforms. The endpoint—the place where work actually happens—has moved entirely into the browser. Your security tools haven’t made that move with them. Legacy vendors built traditional Secure Web Gateways..
The post The Endpoint Has Moved to the Browser — Your Security Tools Haven’t appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/the-endpoint-has-moved-to-the-browser-your
Learn how microsegmentation builds OT breach ready cyber defense, limits lateral movement, and protects industrial systems from disruptions.
The post What is OT Breach Ready Cyber Defense? appeared first on ColorTokens.
The post What is OT Breach Ready Cyber Defense? appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/what-is-ot-breach-ready-cyber-defense/
As a leader in AI-centric DevSecOps, Sonatype has been recognized as a Visionary in the 2025 Gartner Magic Quadrant for Application Security Testing (AST).
The post Sonatype Named a Visionary in the 2025 Gartner® Magic QuadrantTM for Application Security Testing appeared first on Security Boulevard.
https://securityboulevard.com/2025/10/sonatype-named-a-visionary-in-the-2025-gar
https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-recor
https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-
https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ran
https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-pack
https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-
https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-editi
https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-st
https://krebsonsecurity.com/2025/09/gop-cries-censorship-over-spam-filters-that-
https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chat
https://krebsonsecurity.com/2025/08/affiliates-flock-to-soulless-scam-gambling-m
This week's video was recorded on Friday morning Aussie time, and as promised, hackers dumped data the following day. Listening back to parts of the video as I write this on a Sunday morning, pretty much what was predicted happened: data was dumped, it included Qantas, and the
You see it all the time after a tragedy occurs somewhere, and people flock to offer their sympathies via the "thoughts and prayers" line. Sympathy is great, and we should all express that sentiment appropriately. The criticism, however, is that the line is often offered as a substitute
https://www.troyhunt.com/court-injunctions-are-the-thoughts-and-prayers-of-data-
This probably comes through pretty strongly in this week's video, but I love the vibe at CERN. It's a place so focused on the common good of science that all the other cultural attributes that often put people at odds these days fade into the distance.
It's hard to explain the significance of CERN. It's the birthplace of the World Wide Web and the home of the largest machine ever built, the Large Hadron Collider. The bit that's hard to explain is, well, I mean, look at it!
Charlotte and
https://www.troyhunt.com/welcoming-cern-to-have-i-been-pwned/
I'm so happy to finally be getting those HIBP demos out! The first couple are simple, but as I say in this week's vid, it's the simple questions we're still dealing with. As if to taunt me (or prove my point), we
One of the most common use cases for HIBP's API is querying by email address, and we support hundreds of millions of searches against this endpoint every month. Loads of organisations use this service to understand the exposure of their customers and provide them with better protection against
https://www.troyhunt.com/hibp-demo-querying-the-api-and-the-free-test-key/
Imagine jumping on board a class action after your precious datas have been breached, then sticking through it all the way until a settlement is reached. Then, finally, after a long and arduous battle, cashing in and getting... $1. Well, kinda $1, the ParkMobile class action granted up to $1
Well, one of them is, but what's important is that we now have a platform on which we can start pushing out a lot more. It's not that HIBP is a particularly complex system that needs explaining in any depth, but we still get a lot
https://www.troyhunt.com/have-i-been-pwned-demos-are-now-live/
So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to announce AI-driven events, such as people ringing the doorbell. A few hours' worth of video from these weekly updates fed into ElevenLabs and wammo! Here
I only just realised, as I prepared this accompanying blog post, that I didn't talk about one of the points in the overview: food. One of my fondest memories as a child living in Singapore and now as an adult visiting there is the food. It's
This is a current list of where and when I am scheduled to speak:
https://www.schneier.com/blog/archives/2025/10/upcoming-speaking-engagements-49.
This chilling paragraph is in a comprehensive Brookings report about the use of tech to deport people from the US:
The administration has also adapted its methods of social media surveillance. Though agencies like the State Department have gathered millions of handles and monitored political discussions online, the Trump administration has been more explicit in who it’s targeting. Secretary of State Marco Rubio announced a new, zero-tolerance “Catch and Revoke” strategy, which uses AI to monitor the public speech of foreign nationals and revoke visas...
https://www.schneier.com/blog/archives/2025/10/the-trump-administrations-increas
My latest book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship, will be published in just over a week. No reviews yet, but you can read chapters 12 and 34 (of 43 chapters total).
You can order the book pretty much everywhere, and a copy signed by me here.
Please help spread the word. I want this book to make a splash when it’s public. Leave a review on whatever site you buy it from. Or make a TikTok video. Or do whatever you kids do these days. Is anyone a Slashdot contributor? I’d like the book to be announced there...
https://www.schneier.com/blog/archives/2025/10/rewiring-democracy-is-coming-soon
Two years ago, Americans anxious about the forthcoming 2024 presidential election were considering the malevolent force of an election influencer: artificial intelligence. Over the past several years, we have seen plenty of warning signs from elections worldwide demonstrating how AI can be used to propagate misinformation and alter the political landscape, whether by trolls on social media, foreign influencers, or even a street magician. AI is poised to play a more volatile role than ever before in America’s next federal election in 2026. We can already see how different groups of political actors are approaching AI. Professional campaigners are using AI to accelerate the traditional tactics of electioneering; organizers are using it to reinvent how movements are built; and citizens are using it both to express themselves and amplify their side’s messaging. Because there are so few rules, and so little prospect of regulatory action, around AI’s role in politics, there is no oversight of these activities, and no safeguards against the dramatic potential impacts for our democracy...
https://www.schneier.com/blog/archives/2025/10/ai-and-the-future-of-american-pol
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2025/10/friday-squid-blogging-sperm-whale
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything.
Over the summer, hackers proved the concept, industry institutionalized it, and criminals operationalized it. In June, AI company XBOW took the top spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in just a few months. In August, the seven teams competing in DARPA’s AI Cyber Challenge ...
https://www.schneier.com/blog/archives/2025/10/autonomous-ai-hacking-and-the-fut
The company Flok is surveilling us as we drive:
A retired veteran named Lee Schmidt wanted to know how often Norfolk, Virginia’s 176 Flock Safety automated license-plate-reader cameras were tracking him. The answer, according to a U.S. District Court lawsuit filed in September, was more than four times a day, or 526 times from mid-February to early July. No, there’s no warrant out for Schmidt’s arrest, nor is there a warrant for Schmidt’s co-plaintiff, Crystal Arrington, whom the system tagged 849 times in roughly the same period.
You might think this sounds like it violates the Fourth Amendment, which protects American citizens from unreasonable searches and seizures without probable cause. Well, so does the American Civil Liberties Union. Norfolk, Virginia Judge Jamilah LeCruise also agrees, and in 2024 she ruled that plate-reader data obtained without a search warrant couldn’t be used against a defendant in a robbery case...
https://www.schneier.com/blog/archives/2025/10/flok-license-plate-surveillance.h
Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel.
Key Findings
https://www.schneier.com/blog/archives/2025/10/ai-enabled-influence-operation-ag
We are nearly one year out from the 2026 midterm elections, and it’s far too early to predict the outcomes. But it’s a safe bet that artificial intelligence technologies will once again be a major storyline.
The widespread fear that AI would be used to manipulate the 2024 US election seems rather quaint in a year where the president posts AI-generated images of himself as the pope on official White House accounts. But AI is a lot more than an information manipulator. It’s also emerging as a politicized issue. Political first-movers are adopting the technology, and that’s opening a ...
https://www.schneier.com/blog/archives/2025/10/ai-in-the-2026-midterm-elections.
https://securityaffairs.com/183389/security/researchers-warn-of-widespread-rdp-a
https://securityaffairs.com/183379/security/harvard-university-hit-in-oracle-ebs
https://securityaffairs.com/183372/security/uk-ncsc-reports-429-cyberattacks-in-
https://securityaffairs.com/183303/hacking/unverified-cots-hardware-enables-pers
https://securityaffairs.com/183362/security/oracle-issued-an-emergency-security-
https://securityaffairs.com/183349/data-breach/customer-payment-data-stolen-in-u
https://securityaffairs.com/183342/uncategorized/simonmed-imaging-discloses-a-da
https://securityaffairs.com/183333/security/microsoft-revamps-internet-explorer-
https://securityaffairs.com/183323/cyber-crime/astaroth-trojan-abuses-github-to-
https://securityaffairs.com/183306/hacking/google-mandiant-expose-malware-and-ze
https://news.sophos.com/en-us/2025/10/14/prevention-first-approach-to-security-w
https://news.sophos.com/en-us/2025/10/13/cybersecurity-awareness-month-2025-10-t
https://news.sophos.com/en-us/2025/10/10/whatsapp-worm-targets-brazilian-banking
https://news.sophos.com/en-us/2025/10/08/the-state-of-ransomware-in-healthcare-2
https://news.sophos.com/en-us/2025/10/06/case-study-advance-2000-msp/
https://news.sophos.com/en-us/2025/10/01/introducing-sophos-advisory-services/
https://news.sophos.com/en-us/2025/09/30/report-addressing-cybersecurity-burnout
https://news.sophos.com/en-us/2025/09/30/rethink-siem-xdr-mdr/
https://news.sophos.com/en-us/2025/09/29/sophos-named-a-leader-in-the-idc-market
https://news.sophos.com/en-us/2025/09/26/heartcrypts-wholesale-impersonation-eff