Security Culture & Human Factors

09
Mar
Exec Blames Subordinate, Reveals Critical Insider Risk and Governance Gaps

Exec Blames Subordinate, Reveals Critical Insider Risk and Governance Gaps

A senior security leader publicly pinned a recent data‑leak incident on a junior team member, claiming the employee had
1 min read
09
Mar

OWASP Shifts from Meetup to Hub—What It Means for Security Teams

OWASP announced that its long‑standing Meetup platform is being retired. All community coordination, event scheduling, and discussion will now
08
Mar
Fake Google Meet Update Delivers Full‑Control RAT to Enterprises

Fake Google Meet Update Delivers Full‑Control RAT to Enterprises

A phishing campaign is distributing a counterfeit Google Meet “update” dialog that mimics the legitimate UI. When a user clicks
1 min read
25
Feb
App Exposes Nearby Smart Glasses via IR Signature Scan

App Exposes Nearby Smart Glasses via IR Signature Scan

A developer has published a mobile application that uses the device’s camera and infrared (IR) sensor to identify the
1 min read
25
Feb

OWASP Sunset's Meetup Platform, Shifts Event Coordination to Secure Alternatives

The OWASP Foundation announced that its long‑used Meetup.com group will be decommissioned by the end of Q2 2024.
1 min read
25
Feb
Starkiller Phishing Service Mirrors Real Logins, Skips MFA and Harvests Tokens

Starkiller Phishing Service Mirrors Real Logins, Skips MFA and Harvests Tokens

KrebsOnSecurity exposed a new phishing‑as‑a‑service platform dubbed “Starkiller” that routes victims through live, unmodified login pages of
1 min read
25
Feb
AI-Driven Threats Surge: Generative Models Fuel Malware, Phishing, and Deepfake Attacks

AI-Driven Threats Surge: Generative Models Fuel Malware, Phishing, and Deepfake Attacks

CrowdStrike’s Global Threat Report for 2026 reveals a sharp rise in adversaries exploiting generative AI to automate the creation
1 min read
25
Feb
AI-Driven Threats Surge: Check Point 2025 Reveals New Weaponization Playbook

AI-Driven Threats Surge: Check Point 2025 Reveals New Weaponization Playbook

Check Point’s 2025 retrospective shows threat actors have moved from experimental use of artificial intelligence to fully integrating it
1 min read
17
Feb
QR Code Phishing Surge Hits Web and Mobile: Threats Hide in Plain Sight

QR Code Phishing Surge Hits Web and Mobile: Threats Hide in Plain Sight

Threat actors are increasingly embedding malicious URLs and deep‑link payloads into QR‑code images that appear on posters, transit
1 min read
17
Feb
Scale SOC Automation Fast with CrowdStrike Falcon Fusion Playbooks

Scale SOC Automation Fast with CrowdStrike Falcon Fusion Playbooks

CrowdStrike’s recent blog walks security teams through extending their SOC using Falcon Fusion, the vendor’s native SOAR platform.
1 min read