Cybersecurity Social Media and Updates

Chinese Tech in Canadian Fisheries Raises Spy Concerns
SocialMar 29, 2026

Chinese Tech in Canadian Fisheries Raises Spy Concerns

And there is goes… all of Our North American seafood. What could possibly go wrong bringing Chinese technology and equipment into Canada? How much do you want to bet the CCP gives them free fish finding equipment that also sends submarine charts...

By John Konrad
Identity Security Advances, Yet Critical Gaps Persist
SocialMar 29, 2026

Identity Security Advances, Yet Critical Gaps Persist

How Identity Security Has Evolved and Where It Still Falls Short: Token at RSAC 2026 https://t.co/jSbKk2TLry

By Shashi Bellamkonda
CVE Funding Secured, Yet Deal Details Remain Opaque
SocialMar 29, 2026

CVE Funding Secured, Yet Deal Details Remain Opaque

CVE funding secured, but the deal details remain a black box. Plus: lookup.disclose.io is live in beta, exploited vulns surged 105%, and the EU CRA clock is ticking. Policy Pulse #8: https://blog.disclose.io/policy-pulse-issue-8-week-of-march-29-2026/

By Casey Ellis
Beyond Heatmaps: Quantify Cyber Risk Financially
SocialMar 29, 2026

Beyond Heatmaps: Quantify Cyber Risk Financially

Heatmaps aren’t enough anymore for cyber risk. Leaders want to understand financial impact, not just red, yellow, green. https://buff.ly/zGxWwLP

By Sean D. Mack
Apple Adds Extra Security for Older iPhones
SocialMar 29, 2026

Apple Adds Extra Security for Older iPhones

Apple is taking an additional step to keep older iPhones protected from the latest exploits. https://t.co/jPJ441uP8A

By TechRadar
Compliance as Code: GENIUS Act Redefines Financial Infrastructure
SocialMar 29, 2026

Compliance as Code: GENIUS Act Redefines Financial Infrastructure

🔺 Is the "old era" of compliance finally dead? 🪦 In this episode of Fintech Conversations & Insights, Beth Haddock (Stablecoin Standard) explains why the GENIUS Act is forcing a total rethink of financial infrastructure. We dive into: ❌ Why "Honeypot" data collection...

By Efi Pylarinou
Compliance Checklists Aren't Enough to Stop Hacks
SocialMar 29, 2026

Compliance Checklists Aren't Enough to Stop Hacks

You filled out the checklist. You're 'compliant.' But I can still hack your systems. Compliance theater doesn't protect you. #DataGovernance #Cybersecurity https://t.co/ycxJfEqCmC

By Yves Mulkers
Anonymous Threat Follows Hertz IT Failure Exposé
SocialMar 29, 2026

Anonymous Threat Follows Hertz IT Failure Exposé

Posted an article about Hertz's IT failure and received a cryptic, anonymous voicemail warning: "Eric, I saw your article about Hertz. I would be careful if I were you." #TechFailures #Cybersecurity https://t.co/H9ugvwOIjq

By Eric Kimberling
Airrived Unveils AetherClaw, Bridging Governance Gap
SocialMar 28, 2026

Airrived Unveils AetherClaw, Bridging Governance Gap

Closing the Governance Gap: A Plain-English Guide to Airrived’s AetherClaw Announced at RSAC 2026 https://t.co/IhDEL5K3P6

By Shashi Bellamkonda
Real-World LockBit Response Reveals Key Cybersecurity Lessons
SocialMar 28, 2026

Real-World LockBit Response Reveals Key Cybersecurity Lessons

What are we reading? Title: “Locked Up - Cybersecurity Threat Mitigation Lessons from a Real-World LockBit Ransomware Response” Author: Zach Lewis Publisher: Wiley @wiley_global #Books #Leadership #SocialSelling #Cybersecurity #Cyberattack https://t.co/PZ1cI5jLVu https://t.co/O9FBmlGxvb

By Tim Hughes
Enterprise Devices Lagging Updates Risk Security and Workflow
SocialMar 28, 2026

Enterprise Devices Lagging Updates Risk Security and Workflow

Enterprise devices lag in updates and stability, exposing Windows and Mac fleets to security gaps, workflow interruptions, and upgrade pressures. https://t.co/zh91WVTxnQ

By TechRadar
Apple: Lockdown Mode Remains Unbreached After Four Years
SocialMar 28, 2026

Apple: Lockdown Mode Remains Unbreached After Four Years

Four years in, hackers and scammers haven't been able to get past Lockdown Mode, Apple says. https://t.co/w7MXWH0ex3

By TechRadar
Euro Tech Hubris Threatens Privacy with Mass Message Scanning
SocialMar 28, 2026

Euro Tech Hubris Threatens Privacy with Mass Message Scanning

These people want to scan ALL YOUR MESSAGES the euro boomer tech incompetency and hubris (not understanding risks) is beyond comprehendible

By Ivan on Tech
No Known Danish or Swedish Cases of Biometric Device Seizure
SocialMar 28, 2026

No Known Danish or Swedish Cases of Biometric Device Seizure

Have there been any cases in Denmark or Sweden where the authorities have gained access to a journalist’s device using Touch ID or Face ID? Ref: the FBI and WaPo in January. https://t.co/v0vfip6VUz

By Runa Sandvik
Cloudflare Expands Platform, Adds AI Security and SASE Breakthroughs
SocialMar 28, 2026

Cloudflare Expands Platform, Adds AI Security and SASE Breakthroughs

At #RSAC2026, @Cloudflare doubled down on its expanding platform strategy. AI Security for Apps reached general availability, they rolled out free AI endpoint discovery across all plans, and Cloudflare One became the first SASE solution to secure Model Context Protocol...

By Shashi Bellamkonda
Delete Scam Emails; Verify Through Official Sites Only
SocialMar 28, 2026

Delete Scam Emails; Verify Through Official Sites Only

Another day, another scam 🚨 SSA won’t email you a benefits PDF IRS won’t send account info as an attachment If you get one → delete it. Need info? Go straight to the official site and log in. https://t.co/ambNOfA6NZ

By Kelly Phillips Erb
NightBeacon's Primary Model Acts as Evaluator for Better Reasoning
SocialMar 28, 2026

NightBeacon's Primary Model Acts as Evaluator for Better Reasoning

One cool component of NightBeacon is different models trained on the same data, but look at the work that the main model does - think of it as an evaluator, judge, or tier 3 soc analyst that looks at the...

By Dave Kennedy
Fidelity's $2.5M Settlement Highlights Persistent Banking Cyber Risks
SocialMar 28, 2026

Fidelity's $2.5M Settlement Highlights Persistent Banking Cyber Risks

Fidelity is preparing to close the door on a class action lawsuit stemming from a recent data breach, agreeing to pay $2.5 million to affected customers. While the settlement amount is relatively modest for a company of Fidelity's scale, the...

By Rich Tehrani
Instantly Generate Detection Rules From Any Source
SocialMar 27, 2026

Instantly Generate Detection Rules From Any Source

If you missed this post, it’s a good read on a the ability to rapidly almost instantly push new detection capabilities or gaps within a monitoring environment. I developed a component of NightBeacon called Nexus Intelligence, it’s an agent where you...

By Dave Kennedy
AI‑Powered Fraud Evolves Into Fast, Organized Threat
SocialMar 27, 2026

AI‑Powered Fraud Evolves Into Fast, Organized Threat

Fraud has scaled into an organized system driven by AI speed, complex deception methods, and limited response windows for institutions worldwide. https://t.co/daIf9K8o01

By TechRadar
AI‑SOC Tool Deconstructs Attacks, Slashes MTTR and False Positives
SocialMar 27, 2026

AI‑SOC Tool Deconstructs Attacks, Slashes MTTR and False Positives

Here's a small taste of NightBeaconAI (our human driven but AI-SOC augmented solution I've built) @Binary_Defense - it has attack path deconstruction - can see every part of an attack chain with details on each part of it. Doesn't matter...

By Dave Kennedy
Panasonic Launches First Grid‑scale BESS Cybersecurity Monitoring Trial
SocialMar 27, 2026

Panasonic Launches First Grid‑scale BESS Cybersecurity Monitoring Trial

Panasonic claims world’s first trial of cybersecurity monitoring for grid-scale BESS #energysky -- via pv magazine global: https://t.co/BPgKqiFdUD

By Tor “SolarFred” Valenza
US Puts $10M Bounty on Iranian IOControl Hackers
SocialMar 27, 2026

US Puts $10M Bounty on Iranian IOControl Hackers

US offering $10 million for info on Iranian hackers behind IOControl malware | The Record from Recorded Future News https://t.co/2wnlp84kjx

By Teri Radichel
Systemd's Birthdate Storage Sparks Distro Privacy and Compliance Debate
SocialMar 27, 2026

Systemd's Birthdate Storage Sparks Distro Privacy and Compliance Debate

Recent systemd updates store user birth dates for age verification, causing debate across Linux distros over legal compliance and privacy concerns. https://t.co/lWEa7CN3BT

By TechRadar
Single-Account Governance Led to $25M DeFi Exploit
SocialMar 27, 2026

Single-Account Governance Led to $25M DeFi Exploit

$25 million stolen. In this episode of Uneasy Money, hosts @kaiynne, @tayvano_ & @LucaNetz are joined by @omeragoldberg to unpack the Resolv exploit and Aave v4 governance approval: 🤔 Why was the USR minting function governed by a single account? ⁉️ How did...

By Laura Shin
Iran-Linked Hackers Breach FBI Director Kash Patel's Email
SocialMar 27, 2026

Iran-Linked Hackers Breach FBI Director Kash Patel's Email

FBI Director Kash Patel's email breached by hackers linked to Iran, sour... https://t.co/CmeuUp2yiA via @YouTube

By Harold (Hal) Good
Democrats Question VPN Use Over Foreign Surveillance Risks
SocialMar 27, 2026

Democrats Question VPN Use Over Foreign Surveillance Risks

Six Democrats sent a letter to the Director of National Intelligence seeking clarity on whether using a commercial VPN could strip citizens of their privacy rights by exposing them to foreign surveillance laws. https://t.co/6Uq3Y7oKvv

By TechRadar
IOS 26.4 and iPadOS 26.4 Patch Numerous
SocialMar 27, 2026

IOS 26.4 and iPadOS 26.4 Patch Numerous

A lot of security vulns addressed in this update About the security content of iOS 26.4 and iPadOS 26.4 - Apple Support https://t.co/R0oUJMKheX

By Teri Radichel
Google Targets 2029 for Post‑quantum Authentication Rollout
SocialMar 27, 2026

Google Targets 2029 for Post‑quantum Authentication Rollout

Quantum cryptography now has a deadline. Google has announced that it has set 2029 as the year by which it will have migrated authentication services to post-quantum cryptography. Will it win the race to secure against quantum attacks before they...

By Kim Zetter
Apple’s Lockdown Mode Remains Unbreached Spyware Shield
SocialMar 27, 2026

Apple’s Lockdown Mode Remains Unbreached Spyware Shield

Apple’s Lockdown Mode feature is the best defense we have against spyware on iOS, macOS, watchOS, and iPadOS. Apple launched the feature four years ago and has not yet seen a device with Lockdown Mode on be compromised. https://t.co/0lF1BbEWZE

By Runa Sandvik
Apple Silently Patches iOS via Hidden Incremental Updates
SocialMar 27, 2026

Apple Silently Patches iOS via Hidden Incremental Updates

Apple has been installing silent fixes on your devices. These fixes don't require an entire OS update, and they get same version # as previous whole update, but with (a) appended to version #. These silent fixes then get incorporated...

By Kim Zetter
OneDrive’s Personal Vault Adds Biometric‑protected Storage
SocialMar 27, 2026

OneDrive’s Personal Vault Adds Biometric‑protected Storage

Microsoft OneDrive cloud storage is a cornerstone of the modern Windows experience, but did you know it includes a biometric secure storage area? Welcome to your Personal Vault... https://t.co/cee7hX96oT #onedrive #privacy #security https://t.co/2Ra5U1ULHP

By Dave Taylor
AWS Adopts Quantum‑safe Crypto; Start Preparing Now
SocialMar 27, 2026

AWS Adopts Quantum‑safe Crypto; Start Preparing Now

For those who are not yet worried about quantum cryptography…should start thinking about it. AWS already uses quantum safe cryptography in many of its services.

By Teri Radichel
Attack Triggers only via Lithuanian‑registered iPhone Link
SocialMar 27, 2026

Attack Triggers only via Lithuanian‑registered iPhone Link

"the attack would be launched only if I would access the link using an iPhone registered in Lithuania"

By Kim Zetter
Shared Observability Unites SOCs and DevOps Agents
SocialMar 27, 2026

Shared Observability Unites SOCs and DevOps Agents

SOCs and DevOps will need shared observability for agents: data access, tool calls, MCP interactions, and risk levels in one view. #Security #DevOps https://t.co/tRGwCPc4Mb

By Isaac Sacolick
Free Open-Source AI App Hacker Beats $117M Startup
SocialMar 27, 2026

Free Open-Source AI App Hacker Beats $117M Startup

🚨 A startup got $117M to build an AI app hacker. An open-source alternative just dropped that does the exact same thing. It breaks into your app, steals your data, and hands you the fix. Now running directly in your CI/CD pipeline. 100% Free...

By Data Chaz
Europe May Soon Ban Foreign WiFi Routers
SocialMar 27, 2026

Europe May Soon Ban Foreign WiFi Routers

An #unthinkable scenario, but not impossible: What happens if UK or Europe follow the US and try to ban foreign WiFi routers? https://t.co/63TLrKcnki

By Dean Bubley
Neglect Data Governance Until Breach Forces Reactive Cleanup
SocialMar 27, 2026

Neglect Data Governance Until Breach Forces Reactive Cleanup

Data governance is almost always an afterthought. Then a breach happens. Then we start digging. #DataGovernance #DataBreach #Leadership https://t.co/41ivbJYV3c

By Yves Mulkers
Security Must Follow Users Across Dynamic Workspaces
SocialMar 27, 2026

Security Must Follow Users Across Dynamic Workspaces

Workspaces have dissolved into networks of temporary environments. What matters is trusted connectivity, device integrity, and consistent security policies that follow people across locations and contexts.

By Antonio Grasso
Students Shouldn't Be Exposed to Biometric Surveillance in Schools
SocialMar 27, 2026

Students Shouldn't Be Exposed to Biometric Surveillance in Schools

“A review is ongoing about voice and facial recognition, biometric data gathering and surveillance.” Students should not be exposed to surveillance technology in schools. Certain tech can be great for learning, but NOT tech that harvests biometric data, surveils...

By Taylor Lorenz
Powerful AI Models Will Tip Cybersecurity Balance
SocialMar 27, 2026

Powerful AI Models Will Tip Cybersecurity Balance

We'll soon see if very powerful AI models favor the attack or the defense when it comes to cybersecurity...

By Noah Smith
Unknown Voicemail? Spot and Avoid Scam Tactics
SocialMar 27, 2026

Unknown Voicemail? Spot and Avoid Scam Tactics

Just got an email saying you have a voicemail message from an unknown person. Odds are good the message is part of a scam. Here's how it works, how to spot it, and how to avoid being duped by similar...

By Dave Taylor
Enable WhatsApp Two‑Step Verification: Simple Protection Upgrade
SocialMar 26, 2026

Enable WhatsApp Two‑Step Verification: Simple Protection Upgrade

Whether you just joined @WhatsApp or have been using it for years, it's a smart idea to enable two-step verification. Here's how, step by step, and why it's not as good as 2-factor authentication, but better than nothing... https://t.co/KDT8J6yR9L #whatsapp...

By Dave Taylor
Beyond Potemkin: Real Value of HIPAA and SOC 2
SocialMar 26, 2026

Beyond Potemkin: Real Value of HIPAA and SOC 2

This week on Complex Systems, we have compliance regimes designed to go viral in and around industries, like HIPAA and the new hotness SOC 2, and we Delve into the difference between Potemkin compliance and the messy-but-real value these regimes...

By Patrick McKenzie
House Committee Approves Chip Security Act Targeting China
SocialMar 26, 2026

House Committee Approves Chip Security Act Targeting China

House Foreign Affairs Committee Passes Chip Security Act | Select Committee on the CCP https://t.co/Pxi7ysePpz

By Paul Triolo
Chrome Silently Generates DNS Requests for Every Site
SocialMar 26, 2026

Chrome Silently Generates DNS Requests for Every Site

I just wrote this post about DNS leaks and tunnels. So today I go to visit a web are and my host-based firewall is popping up repeatedly connection attempts to the website like it’s beaconing to maintain a connection. So...

By Teri Radichel
AI: Cybersecurity’s Double‑Edged Sword Demands New Strategies
SocialMar 26, 2026

AI: Cybersecurity’s Double‑Edged Sword Demands New Strategies

AI in cybersecurity is your new frenemy. It supercharges attacks via rogue AI and blind spots, yet also defends at machine speed, spotting patterns and automating responses. Success requires adapting classic security. https://t.co/9XdfJYGyDr

By Cristina Dolan
Cloud Phones Become New Threat to Banking App Users
SocialMar 26, 2026

Cloud Phones Become New Threat to Banking App Users

Cloud phones are the latest tool to be used against banking app users and the security community should take notice. https://t.co/temWl9DMlh

By TechRadar
Don't Rely on Hope for Firmware Security
SocialMar 26, 2026

Don't Rely on Hope for Firmware Security

This is how many view firmware updates. Wishing for the best is not the best security strategy... https://t.co/MnyAcBQT6u

By Paul Asadoorian