AppGuard Critiques AI Hyped Defenses; Expands Its Insider Release for Its Next-Generation Platform
CybersecurityAI
BlogJan 15, 2026

AppGuard Critiques AI Hyped Defenses; Expands Its Insider Release for Its Next-Generation Platform

McLean, Virginia, United States, 15th January 2026, CyberNewsWire The post AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger
Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security
CybersecurityAI
BlogJan 15, 2026

Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security

Silver Spring, Maryland, 15th January 2026, CyberNewsWire The post Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger
New Vulnerability in N8n
Cybersecurity
BlogJan 15, 2026

New Vulnerability in N8n

This isn’t good: We discovered a critical vulnerability (CVE-2026-21858, CVSS 10.0) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers globally. No official workarounds are available for this vulnerability. Users should upgrade to version...

By Schneier on Security
How to Build a Stateless, Secure, and Asynchronous MCP-Style Protocol for Scalable Agent Workflows
CybersecurityAI
BlogJan 14, 2026

How to Build a Stateless, Secure, and Asynchronous MCP-Style Protocol for Scalable Agent Workflows

In this tutorial, we build a clean, advanced demonstration of modern MCP design by focusing on three core ideas: stateless communication, strict SDK-level validation, and asynchronous, long-running operations. We implement a minimal MCP-like protocol using structured envelopes, signed requests, and...

By MarkTechPost
Upcoming Speaking Engagements
Cybersecurity
BlogJan 14, 2026

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the David R. Cheriton School of Computer Science in Waterloo, Ontario, Canada, on January 27, 2026, at 1:30 PM ET. I’m speaking at the Université...

By Schneier on Security
1980s Hacker Manifesto
Cybersecurity
BlogJan 13, 2026

1980s Hacker Manifesto

Forty years ago, The Mentor—Loyd Blankenship—published “The Conscience of a Hacker” in Phrack. You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip...

By Schneier on Security
Who Decides Who Doesn’t Deserve Privacy?
Cybersecurity
BlogJan 13, 2026

Who Decides Who Doesn’t Deserve Privacy?

Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all time. There are many reasons for this accolade, but chief among them is that...

By Troy Hunt’s Blog
Hexaware Partners with AccuKnox for Cloud Security Services
Cybersecurity
BlogJan 13, 2026

Hexaware Partners with AccuKnox for Cloud Security Services

Menlo Park, USA, 13th January 2026, CyberNewsWire The post Hexaware Partners with AccuKnox for Cloud Security Services appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger
Corrupting LLMs Through Weird Generalizations
Cybersecurity
BlogJan 12, 2026

Corrupting LLMs Through Weird Generalizations

Fascinating research: Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs. AbstractLLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow contexts can...

By Schneier on Security
Palo Alto Crosswalk Signals Had Default Passwords
Cybersecurity
BlogJan 9, 2026

Palo Alto Crosswalk Signals Had Default Passwords

Palo Alto’s crosswalk signals were hacked last year. Turns out the city never changed the default passwords.

By Schneier on Security
Connex IT Partners with AccuKnox for Zero Trust CNAPP Security in Southeast Asia
Cybersecurity
BlogJan 6, 2026

Connex IT Partners with AccuKnox for Zero Trust CNAPP Security in Southeast Asia

Menlo Park, India, 6th January 2026, CyberNewsWire The post Connex IT Partners with AccuKnox for Zero Trust CNAPP Security in Southeast Asia appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger
Telegram Hosting World’s Largest Darknet Market
Cybersecurity
BlogJan 5, 2026

Telegram Hosting World’s Largest Darknet Market

Wired is reporting on Chinese darknet markets on Telegram. The ecosystem of marketplaces for Chinese-speaking crypto scammers hosted on the messaging service Telegram have now grown to be bigger than ever before, according to a new analysis from the crypto tracing...

By Schneier on Security
Overview of Content Published in 2025
Cybersecurity
BlogJan 3, 2026

Overview of Content Published in 2025

Here is an overview of content I published in 2025: Blog posts: Update: strings.py Version 0.0.11 Quickpost: Electrical Power & Mining Update: Python Templates Version 0.0.12 Update: cs-decrypt-metadata.py Version?0.0.5 Update: zoneidentifier.exe Version 0.0.2 Update: oledump.py Version 0.0.79 Update: 1768.py Version...

By Didier Stevens’ Blog
Friday Squid Blogging: Squid Found in Light Fixture
Cybersecurity
BlogJan 2, 2026

Friday Squid Blogging: Squid Found in Light Fixture

Probably a college prank. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

By Schneier on Security
NEW TECH Q&A: Why Data Bill of Materials (DBOM) Is Surfacing as a Crucial Tool to Secure AI
Cybersecurity
BlogDec 31, 2025

NEW TECH Q&A: Why Data Bill of Materials (DBOM) Is Surfacing as a Crucial Tool to Secure AI

Enterprises hustling to embed AI across their operations came to an uncomfortable realization in 2025: they lost track of the data powering those systems. Related: The case for SBOM Few paused to map where sensitive data lived or how it … (more…)...

By The Last Watchdog
The Definitive 2025 Cyber Rewind & 2026 Roadmap
Cybersecurity
BlogDec 29, 2025

The Definitive 2025 Cyber Rewind & 2026 Roadmap

The Definitive 2025 Cyber Rewind & 2026 Roadmap Back in June 2025, when I stood on the stage at the face-to-face SECON conference, the energy in the room was electric. We shook hands, we debated in the hallways, and we shared...

By Erdal Ozkaya’s Cybersecurity Blog
Unredaction Isn't Hacking
Cybersecurity
BlogDec 24, 2025

Unredaction Isn't Hacking

It just wasn't redacted to begin with.

By Errata Security (Robert Graham)
Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Bring AI-Driven Exposure Intelligence to Automated Incident Response
Cybersecurity
BlogDec 19, 2025

Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Bring AI-Driven Exposure Intelligence to Automated Incident Response

Torrance, United States / California, 19th December 2025, CyberNewsWire The post Criminal IP and Palo Alto Networks Cortex XSOAR integrate to bring AI-driven exposure intelligence to automated incident response appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger
News Alert: INE Expands Partnerships to Scale Hands-On Cyber Training Across Middle East, Asia
Cybersecurity
BlogDec 19, 2025

News Alert: INE Expands Partnerships to Scale Hands-On Cyber Training Across Middle East, Asia

CARY, N.C., Dec. 11, 2025, CyberNewswire — INE Security, a global leader in specialized cybersecurity and IT training, today announced continued significant expansion across the Middle East and Asia, capitalizing on major regional learning initiatives. The company’s unique, hands-on … (more…)...

By The Last Watchdog
Securing the Road Ahead: The Intersection of Cybersecurity and Intelligent Transportation
Cybersecurity
BlogDec 17, 2025

Securing the Road Ahead: The Intersection of Cybersecurity and Intelligent Transportation

Securing the Road Ahead: The Intersection of Cybersecurity and Intelligent Transportation Reflecting on the incredible energy from our recent Cybersecurity Seminar at Morgan State University, one thing is clear: the future of transportation is digital, and it must be secure.

By Erdal Ozkaya’s Cybersecurity Blog
SHARED INTEL Q&A: This Is How ‘Edge AI’ Is Forcing a Rethink of Trust, Security and Resilience
Cybersecurity
BlogDec 17, 2025

SHARED INTEL Q&A: This Is How ‘Edge AI’ Is Forcing a Rethink of Trust, Security and Resilience

A seismic shift in digital systems is underway — and most people are missing it. Related: Edge AI at the chip layer While generative AI demos and LLM hype steal the spotlight, enterprise infrastructure is being quietly re-architected, not from … (more…)...

By The Last Watchdog
News Alert: Link11’s Top 5 Cybersecurity Trends Set to Shape European Defense Strategies in 2026
Cybersecurity
BlogDec 16, 2025

News Alert: Link11’s Top 5 Cybersecurity Trends Set to Shape European Defense Strategies in 2026

Frankfurt, Dec. 16, 2025, CyberNewswire — Link11, a European provider of web infrastructure security solutions, has released new insights outlining five key cybersecurity developments expected to influence how organizations across Europe prepare for and respond to threats in 2026.… (more…)...

By The Last Watchdog
Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026
Cybersecurity
BlogDec 16, 2025

Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026

Frankfurt am Main, Germany, 16th December 2025, CyberNewsWire The post Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger
Processing 630 Million More Pwned Passwords, Courtesy of the FBI
Cybersecurity
BlogDec 12, 2025

Processing 630 Million More Pwned Passwords, Courtesy of the FBI

The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It's not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse...

By Troy Hunt’s Blog
We Need a New Type of Cybersecurity Product
CybersecurityAI
BlogDec 12, 2025

We Need a New Type of Cybersecurity Product

I think we in Cybersecurity have largely failed to show its value to the busines over the last decades. And I think we need a completely new type of product to address it. And before you get excited about a...

By Unsupervised Learning
Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide
Cybersecurity
BlogDec 12, 2025

Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide

Torrance, United States / California, 12th December 2025, CyberNewsWire The post Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger
News Alert: INE Sees Surge in Q4 Budget Shifts as Enterprises Embrace Hands-On Training for AI Roles
Cybersecurity
BlogDec 11, 2025

News Alert: INE Sees Surge in Q4 Budget Shifts as Enterprises Embrace Hands-On Training for AI Roles

CARY, N.C., Dec. 11, 2025, CyberNewswire — With 90% of organizations facing critical skills gaps (ISC2) and AI reshaping job roles across cybersecurity, cloud, and IT operations, enterprises are rapidly reallocating L&D budgets toward hands-on training that delivers measurable, real-world...

By The Last Watchdog
1inch Named Exclusive Swap Provider at Launch for Ledger Multisig
Cybersecurity
BlogDec 11, 2025

1inch Named Exclusive Swap Provider at Launch for Ledger Multisig

Road Town, British Virgin Islands, 11th December 2025, CyberNewsWire The post 1inch Named Exclusive Swap Provider at Launch for Ledger Multisig appeared first on The Security Ledger with Paul F. Roberts.

By Security Ledger