🔍 Face Recognition vs Face Verification 🔑 Face Verification → Confirms if someone is who they claim to be (Yes ✅ / No ❌). 🧑🤝🧑 Face Recognition → Identifies who the person is by comparing against many faces 👥. #FaceRecognition #FaceVerification #AI #Biometrics #IdentitySecurity #TechExplained #ComputerVision
Updated breaches are a bit messy when it comes to sending domain notifications. We only send ONE email per breach to domain subscribers, so you may get an alert for dump 1 but not for dump 2. It's probably worth...
Fun fact I had a senior Director of a facility complain about computer crashing. I would reimage their machine and it would be fine and then it broke again. They kept installing Grammarly which was doing DLL injection into every process.

The third edition of the French version of Cybersecurity For Dummies is now available... #cybersecurity #french #cybersécurité #josephsteinberg #dummies
"Prompt injection attacks in the wild" https://t.co/wXEOcvcpdX <- if you have coffee in your hand, set it down now. Snort attack likely :-)
Insights On Preventing Fraud and Identity Theft in The AI Era by @ChuckDBrooks https://t.co/Z1DoLfU6rP #CyberSecurity #identitytheft
CIOs and CISOs face AI-driven attacks that outpace traditional defenses. The answer: automated AI security, zero-trust frameworks, centralized identity, and regular training. Fighting fire with fire is how we protect organizations. https://t.co/HSIY5JYyPE

(Sponsor) If pentest reporting takes weeks, remediation stalls. ⏱️ PlexTrac replaces spreadsheet tracking with a findings-to-fix workflow and exec-ready reporting. See Demo: https://t.co/NuE4kH3FXK https://t.co/DbP8Xmotdx

Google allegedly found "severe security issues" with Pixel 4 series, blocking Google Wallet use ✅ Details - https://t.co/lnyNOXovE7 https://t.co/gJTaZoudLA
The UK’s £9.4B loss to deepfake-enabled fraud is not a headline, it’s a warning. AI-powered scams are scaling faster than legacy identity and compliance systems can adapt. If the US doesn’t harden digital onboarding, verification, and cross-sector fraud defenses now, the bill...
Been reading the @Persona_IDV incident write up as a bunch of people have asked “will the data be going into @haveibeenpwned?” Easy answer: no, because there’s no data: https://t.co/4oxtwYBxj2
RT High-level policies aren't enough. It's time for audits, training, DSPM, and privacy-by-design in AI workflows. If privacy isn't built into how data moves, you're hoping - not leading. #DataGovernance #AI #CIO @Star_CIO https://t.co/Naq82FuMWZ
One of the big advantage we have here at CXO Advisor is threat intel. We talk to security leaders across industries every week and the same concerns surface independently. Interestingly, it's not the complex theoretical threats, it's the basics: AI...
I've had a few queries on this one (which isn't unusual for a large incident), mostly to the effect of "but I've never bought tyres in Canada". So, firstly, this isn't a tyre retailer, there are a heap of other...

I love this directness: “in order to be useful Galaxy AI needs data” which is why @SamsungMobile created “keep” to make sure the user’s info is kept safe https://t.co/EK7ZvUFZTr
"Using the built-in update mechanism the actor downgraded a vSmart controller to a version with...known local privilege escalation vulnerabilities.... Achieving...persistence as the user ‘root’, the actor [then] restored..controller to [previous] version" https://t.co/PcdPHtzgCR
New threat intel shows a financially motivated threat actor using commercial generative AI tools to compromise more than 600 FortiGate devices across 55+ countries by exploiting exposed management ports and weak credentials, not zero-day vulnerabilities. AI is amplifying basic security...
Most founders optimize for the first milestone: launch fast, check the box, move on. @DrataHQ optimized for what comes after. “When you need more than SOC 2 - which happens when you’re successful - we’re right there with you.” Feature vs. platform thinking....
Cyberattacks Overtake Inflation and Recession Concerns as the #1 Threat to SMBs in 2026, New VikingCloud Research Finds https://t.co/O8FsxVZLOe
Nomma Zarubina, who once drunk-texted an FBI agent saying "Catch me baby. So many spies," is heading to U.S. prison for spying for Russian intelligence. https://t.co/UnZ15LNWq6
This interview freaked me out. The security "AI"pocalypse is here. The founders of https://t.co/yNcyjm5j7B, Arbaaz Mahmood and Matt Busigin, talk me through why security professionals are freaked out by AI and trying to prepare the world's businesses as fast as they...
Cyber resilience goes beyond stopping attacks. It’s keeping the organization running when systems fail, and data is uncertain. Prevention helps, but resilience ensures the business keeps moving. https://t.co/iRvh9PxW7z
Wynn Resorts reportedly cyberattacked and asked to pay $1.5M ransom | Casinos & Gaming | Business https://t.co/x191MhE93X

80% of Fortune 500 use active AI Agents: Observability, governance, and security shape the new frontier @Microsoft has released its latest Cyber Pulse report, offering practical insights into emerging cybersecurity risks as AI agents become embedded in everyday business operations. https://t.co/nYODu6iNVB...
You’re going to see a lot of fake Apple Newsroom headlines here that look like this (below), and it may even influence folks/markets until they realize they are all fake tomorrow. Don’t fall for these. It’s a simple manipulation of...
Peter Williams, the former Trenchant exec who stole zero-day exploits from his employer and sold them to a Russian exploit buyer, was sentenced today to 7 years and 3 months in a hearing that was partially closed to the public...
A security feature launch tweet by Claude wiped out $15B in cybersecurity stocks. AI is eating SaaS. Here’s what this means for the future of SaaS: Cybersecurity names like CrowdStrike, Palo Alto Networks, and Zscaler fell after Anthropic showed Claude can...

Asked Opus 4.6 to design an SOC2‑compliant auth service from zero. It came back with 35 issues. Pilot’s job now is to deliver them. Estimated cost: ~$4. Estimated time: ~1 hour + ~10 minutes of cleanup. --- Devs only have jobs until I get better...
📈 The Board is over "Red, Yellow, Green" charts. They want financial risk quantification. Moving from technical metrics to business risk is the #1 theme for CIOs at RSA this year. Stop reporting on "threats" and start reporting on "impact."...

Great story in the New York Times highlighting the difficulties that the US government has faced in getting the world's most profitable companies to take supply chain security seriously, and reduce their exposure to a crisis in the Taiwan straights 1/...
Threat groups move at record speeds, as AI helps scale attacks | Cybersecurity Dive https://t.co/frfbUAXzlI
So @markowitzadam was selling a product built on proving things with evidence. But when a university asked him to prove his security posture, he couldn’t. That contradiction became the seed for @DrataHQ ($100M+ ARR). Trust isn’t what you say. It’s what you prove....
Defi is a central part of the value that Ethereum provides. Financial empowerment is a central part of what it means to have agency and freedom in our current world. Finance is far from the only thing that Ethereum is...
If you’re a cybersecurity leader in NYC, join me this Thursday for a roundtable dinner focusing on New Strategies to Protect Your Expanding Dataverse. Private dinner, peer conversation, no vendor pitch. These are the discussions where the real issues come...
Introducing a new tool called "SideChannel". A secure alternative to OpenClaw. Utilizes signal for communication and has Claude integration. I built SideChannel, an open-source Signal bot that connects Claude AI to your entire development workflow. End-to-end encrypted. From your pocket. The real...
We want to address the inaccuracies in the Financial Times' reporting yesterday. The brief service interruption they reported on was the result of user error—specifically misconfigured access controls—not AI as the story claims. https://t.co/0ApCIDNsJT
Cyber supply chain security is no longer optional—it’s essential for resilience, innovation, and national security. Read the full piece: The Cybersecurity Challenges of the Supply Chain by @ChuckDBrooks https://t.co/THnR3VKAJx #cybersecurity #technology #supplychain
Do you have a forward-thinking security strategy to combat weaponized AI? I’m hosting @mikeriemer830, Field CISO at @GoIvanti for a live webinar tomorrow February 24. We’ll cover: ✅ Real-world AI-driven attack patterns ✅ Why kernel-level security matters more than ever ✅ Practical steps to...
Yikes. If this is true, then it’s both pretty ingenious and supremely negligent. I wonder what percentage of users have done a code audit of Openclaw. And what other fun ToS-voiding surprises lurk in there.

𝗨𝗹𝘁𝗶𝗺𝗮𝘁𝗲 𝗗𝗲𝘃𝗦𝗲𝗰𝗢𝗽𝘀 𝗢𝗽𝗲𝗻-𝗦𝗼𝘂𝗿𝗰𝗲 𝗟𝗶𝗯𝗿𝗮𝗿𝘆✅ One repo covering: • SAST • DAST • Supply Chain • Kubernetes Security • Cloud Guardrails • Policy as Code • DevSecOps Tooling. If you want to understand real production DevSecOps stacks, this is worth saving. Comment “𝗗𝗲𝘃𝗦𝗲𝗰𝗢𝗽𝘀” & I’ll send...
Hey @UPS I think spammers are spoofing your number. Got a call from 800-742-5877, which is UPS but came up "SPAM" on iPhone. "Ronathan" claiming to be from UPS support wanted me to apologize for tweeting my package arrived late,...
If you give OpenClaw access to your everyday machine, w/ admin privileges on your email, I would expect frustrating outcomes in the best case scenario, embarrassing email blunders in the average case, & catastrophic/mortifying situations in the worst case scenario...
I'm excited to be speaking today at the Virtual AI Summit on the cybersecurity implications of AI! I'll be talking about practical frameworks for AI deployment and oversight. If AI is on your roadmap, governance join me there today: https://buff.ly/6C9RTgu

Very proud moment of our architecture so far at Seena Labs. We got someone asking the Seena interviewer agent to reveal some code and attack us and this was Seena's response. If anyone has good advice/ resources on how to...
Simple analogy on AI and cybersecurity. Security has never been solely a technology problem - it's largely a people problem. Complexity of business integration, misconfigurations, legacy systems, business transformations, M&As, etc. are all part of this industry we call cybersecurity. I can't remember...
AI agent traffic nearly tripled in a year. 25Billion bot requests in 2 months. The question is no longer how to block bots — it's how to trust them. Visa + Akamai are building the answer. "What it takes to secure...
Until it hacks everyone’s GitHub accounts and wipes out all their IP. Be careful with tools like this. Make sure you understand what it can access and what it can do. Understand where it is sharing your code and storing...

Questions to ask when evaluating an authentication mechanism 🔒 Why I still use a password with a Yubikey, not a passkey or a pin Why I dislike the device code flow with a browser How lack of segregation facilitated a Microsoft breach. Defense...
User accidentally gains control of over 6,700 robot vacuums while tinkering with their own device to enable control with a PlayStation controller — security flaw reveals floor plans and live video feeds https://t.co/G8sfl730OU
“AI can defeat CAPTCHA systems and analyse voice biometrics to compromise authentication,” [TR: Never trusted voice recognition, it’s too fuzzy to use for auth in my opinion. Infecting memory is an interesting problem.]