Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Articles

  • Home
  • Articles
  • Page 91
Posted inArticles

From Graham Cluley – SEC Twitter hack blamed on SIM swap attack

The US Securities & Exchange Comission (SEC) has confirmed that hackers managed to seize control of a phone number associated with its Twitter account, and used it to post an…
Posted by Samir K January 24, 2024
Posted inArticles

From Graham Cluley – With hackers poisoning water systems, US agencies issue incident response guide to boost cybersecurity

US federal agencies have teamed up to release a cybersecurity best practice guidance for the water and wastewater sector (WWS). Read more in my article on the Tripwire State of…
Posted by Samir K January 22, 2024
Posted inArticles

From Schneier on Security – AI Bots on X (Twitter)

You can find them by searching for OpenAI chatbot warning messages, like: “I’m sorry, I cannot provide a response as it goes against OpenAI’s use case policy.” I hadn’t thought…
Posted by Samir K January 22, 2024
Posted inArticles

From Schneier on Security – Zelle Is Using My Name and Voice without My Consent

Okay, so this is weird. Zelle has been using my name, and my voice, in audio podcast ads—without my permission. At least, I think it is without my permission. It’s…
Posted by Samir K January 19, 2024
From Krebs on Security – Canadian Man Stuck in Triangle of E-Commerce Fraud
Posted inArticles

From Krebs on Security – Canadian Man Stuck in Triangle of E-Commerce Fraud

A Canadian man who says he's been falsely charged with orchestrating a complex e-commerce scam is seeking to clear his name. His case appears to involve "triangulation fraud," which occurs…
Posted by Samir K January 19, 2024
Posted inArticles

From Schneier on Security – Speaking to the CIA’s Creative Writing Group

This is a fascinating story. Last spring, a friend of a friend visited my office and invited me to Langley to speak to Invisible Ink, the CIA’s creative writing group.…
Posted by Samir K January 19, 2024
Posted inArticles

From Schneier on Security – Canadian Citizen Gets Phone Back from Police

After 175 million failed password guesses, a judge rules that the Canadian police must return a suspect’s phone. [Judge] Carter said the investigation can continue without the phones, and he…
Posted by Samir K January 18, 2024
From Krebs on Security – E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop
Posted inArticles

From Krebs on Security – E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop

The rapper and social media personality Punchmade Dev is perhaps best known for his flashy videos singing the praises of a cybercrime lifestyle. With memorable hits such as "Internet Swiping"…
Posted by Samir K January 17, 2024
Posted inArticles

From Schneier on Security – The Story of the Mirai Botnet

Over at Wired, Andy Greenberg has an excellent story about the creators of the 2016 Mirai botnet. Read More  
Posted by Samir K January 16, 2024
Posted inArticles

From Graham Cluley – Heartless scammers prey on hundreds of lost pet owners, demanding ransoms or else…

Hundreds of pet owners across the UK have reported that they have received blackmail threats from scammers who claim to have found their lost pooches and missing moggies. Read more…
Posted by Samir K January 15, 2024
Posted inArticles

From Schneier on Security – Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the International PolCampaigns Expo (IPE24) in Cape Town, South Africa, January 25-26, 2024.…
Posted by Samir K January 14, 2024
Posted inArticles

From Schneier on Security – Friday Squid Blogging: Giant Squid from Newfoundland in the 1800s

Interesting article, with photographs. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting…
Posted by Samir K January 12, 2024
From Dark Reading – Your Cybersecurity Budget Is a Horse’s Rear End
Posted inArticles

From Dark Reading – Your Cybersecurity Budget Is a Horse’s Rear End

Are historical budget constraints limiting your cybersecurity program? Don't let old saws hold you back. It's time to revisit your budget with revolutionary future needs front of mind. Read More  
Posted by Samir K January 12, 2024
Posted inArticles

From Schneier on Security – On IoT Devices and Software Liability

New law journal article: Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims Abstract: Smart devices are used to facilitate cyberattacks against both their users and third parties. While…
Posted by Samir K January 12, 2024
Posted inArticles

From Schneier on Security – Pharmacies Giving Patient Records to Police without Warrants

Add pharmacies to the list of industries that are giving private data to the police without a warrant. Read More  
Posted by Samir K January 11, 2024

Posts pagination

Previous page 1 … 89 90 91 92 93 … 101 Next page

Latest Posts

  • From Cyber Security News – TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm ModulesMay 9, 2026
  • From Cyber Security News – NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce UsersMay 9, 2026
  • From Cyber Security News – Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate IncidentMay 9, 2026
  • From Cyber Security News – Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive InformationMay 9, 2026
  • From Schneier on Security – Friday Squid Blogging: Giant Squid Live in the Waters of Western AustraliaMay 9, 2026
Total Visitors
1504253

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top