Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attack ...Show more
The leak was only a matter of time.
Mythos leaks. The DOD preps a more aggressive cyber strategy. A former FBI cyber official urges homicide charges for hospital ransomware deaths. Lotus Wiper targeted the Venezuelan energy and utilities sector. Over 1,300 SharePoint servers remain unpatched against a spoofing vuln ...Show more
Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ...Show more
Meta & Google antitrust, Apple recycling tips & AI-powered scams
Rich discusses major antitrust cases against Meta and Google—and what they could mean for the future of Big Tech. Richard in Bell, California asks why his PayPal transaction won’t go through on a website. Dennis in San Dimas is looking for a NAS drive that works with both Windows ...Show more