Posts

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m giving an...

Slopsquatting

As AI coding assistants invent nonexistent software libraries to download and us...

CVE Program Almost Unfunded

Mitre’s CVE’s program—which provides common naming and other informational resou...

Age Verification Using Facial Scans

Discord is testing the feature: “We’re currently running tests in select region...

Friday Squid Blogging: Live Colossal Squid Filmed

A live colossal squid was filmed for the first time in the ocean. It’s only a ju...

Chinese APT Mustang Panda Debuts 4 New Attack Tools

The notorious nation-state-backed threat actor has added two new keyloggers, a l...

Could Ransomware Survive Without Cryptocurrency?

Threat actors would be at least temporarily derailed, experts say. But the real ...

Attackers and Defenders Lean on AI in Identity Fraud Ba...

Identity verification, insurance claims, and financial services are all seeing s...

Burp Everywhere, All Around the World: Bringing AppSec ...

Security is a team sport. Whether you're a pentester, bug bounty hunter, student...