VMware Aria Is on CISA’s Hotlist: Patch the Admin Console Now

VMware Aria Is on CISA’s Hotlist: Patch the Admin Console Now

I need a minute. I just wrote about Cisco SD-WAN Manager being actively exploited via CVE-2026-20122 — management console, web shells deployed, watchTowr telling everyone their exposed systems should be assumed compromised — and before that coffee went cold, CISA turns around and drops VMware Aria Operations onto the Known Exploited Vulnerabilities catalog. Another management … Continue reading VMware Aria Is on CISA’s Hotlist: Patch the Admin Console Now

Clop Breached MSG via Third-Party Oracle EBS: 131K SSNs Gone

Clop Breached MSG via Third-Party Oracle EBS: 131K SSNs Gone

I had barely finished my write-up on the Marquis vs. SonicWall disaster — where a firewall vendor's own backup service handed ransomware gangs the keys to a fintech company's network — and I was sitting here telling myself that at least we had a lawsuit, at least someone was trying to hold a vendor accountable, … Continue reading Clop Breached MSG via Third-Party Oracle EBS: 131K SSNs Gone

GTIG Drops the Bomb: 90 Zero-Days and Enterprise in the Crosshairs

GTIG Drops the Bomb: 90 Zero-Days and Enterprise in the Crosshairs

My coffee wasn't even cold after writing about the Tycoon 2FA PhaaS takedown and what it means for the state of offensive infrastructure, and then Google's Threat Intelligence Group drops the 2025 zero-day review and I nearly choked. Ninety. Ninety zero-days exploited in the wild last year. That's not the number that should make you feel sick, … Continue reading GTIG Drops the Bomb: 90 Zero-Days and Enterprise in the Crosshairs

Tycoon 2FA Is Dead: Europol Kills the MFA-Busting PhaaS King

Tycoon 2FA Is Dead: Europol Kills the MFA-Busting PhaaS King

I need a minute. Because this is genuinely good news, and I don't get to write those very often, and I want to savour it for approximately thirty seconds before I spend the next fifteen hundred words explaining why it doesn't actually fix the underlying problem and you still need to sort your shit out. … Continue reading Tycoon 2FA Is Dead: Europol Kills the MFA-Busting PhaaS King

LexisNexis AWS Breach: ‘Lexis1234’ Opens the Door to Gov Data

LexisNexis AWS Breach: ‘Lexis1234’ Opens the Door to Gov Data

I haven't even finished my third coffee this week and I'm already writing about a data breach so stupid it physically hurts. Not "sophisticated nation-state intrusion" stupid. Not "supply chain zero-day" stupid. I mean "the password was literally Lexis1234" stupid. A company trusted by federal judges, DOJ attorneys, and U.S. SEC staff was running a … Continue reading LexisNexis AWS Breach: ‘Lexis1234’ Opens the Door to Gov Data

Marquis vs. SonicWall: When Your Firewall Vendor Hands Over the Keys

Marquis vs. SonicWall: When Your Firewall Vendor Hands Over the Keys

I've been saying for years that vendor risk is not a checkbox exercise. I've been saying it in blog posts, in conference rooms, in papers, and presumably in my sleep. And then the Marquis vs. SonicWall lawsuit drops and it is the most perfect, catastrophic illustration of exactly that point that I could not have … Continue reading Marquis vs. SonicWall: When Your Firewall Vendor Hands Over the Keys

CVE-2026-21902 Juniper PTX: Unauthenticated Root on Your Core Router

CVE-2026-21902 Juniper PTX: Unauthenticated Root on Your Core Router

You know what I love about my mornings? Reading about another critical-severity, unauthenticated remote code execution vulnerability in a piece of network core infrastructure that half the Fortune 500 has sitting in the middle of their backbone. My coffee was almost at a drinkable temperature when the Juniper advisory landed. Almost. CVE-2026-21902. CVSS 9.3 to … Continue reading CVE-2026-21902 Juniper PTX: Unauthenticated Root on Your Core Router

RESURGE Is Still on Your Ivanti Gear — Dormant, Waiting, Hiding

RESURGE Is Still on Your Ivanti Gear — Dormant, Waiting, Hiding

I hadn't even finished my second coffee after writing about China's UNC5221 carpet-bombing organisations globally, and CISA decides to drop an updated malware analysis report that should make every network defender in the room deeply, personally uncomfortable. RESURGE is still out there. On Ivanti Connect Secure devices. Possibly yours. Dormant. Undetected. Sipping a metaphorical coffee … Continue reading RESURGE Is Still on Your Ivanti Gear — Dormant, Waiting, Hiding

Conduent Ransomware Exposes 25 Million Americans: SafePay’s Biggest Payday Yet

Conduent Ransomware Exposes 25 Million Americans: SafePay’s Biggest Payday Yet

TL;DR SafePay ransomware hit Conduent and exposed 25 million Americans' personal data. Likely the largest breach in US history. Here's the full breakdown and what it means for third-party risk management. Twenty-five million Americans. Let that sit for a second. Twenty-five million people who had their data — Social Security numbers, financial records, personal identifiers … Continue reading Conduent Ransomware Exposes 25 Million Americans: SafePay’s Biggest Payday Yet

React’s Server Components RCE Bullshit: CVE-2025-55182 Exposes How Hype Fucks Over Real Security

React’s Server Components RCE Bullshit: CVE-2025-55182 Exposes How Hype Fucks Over Real Security

Jesus Christ, React's latest "innovation" just handed remote code execution to every basement hacker with a keyboard. CVE-2025-55182 turns Server Components into an RCE playground—unauthenticated, CVSS 10.0, and exploiting deserialization like it's 2010 all over again. If your Next.js app's humming on React 19 without patches, you're one POST away from disaster; uncover the full rant and fixes before your server's not yours anymore.

Fortinet SSL VPN Gets Hammered—780 Unique IPs Join the Brute-Force Pileup

Fortinet SSL VPN Gets Hammered—780 Unique IPs Join the Brute-Force Pileup

Fortinet SSL VPN devices just got hammered by a coordinated brute-force assault involving 780 unique IP addresses. This wasn't random scanning—it was focused, deliberate, and strategic. Attackers are specifically targeting VPN endpoints because they know that's the easiest path into internal networks. If you're running Fortinet SSL VPN with weak passwords and no multi-factor authentication, assume you're already compromised.

Booking.com Gets Phished (Again)—Because Hotel Managers Still Click Malicious Links

Booking.com Gets Phished (Again)—Because Hotel Managers Still Click Malicious Links

A phishing campaign targeting Booking.com partners has been running since April 2025, and it's so profitable that attackers are selling access to compromised accounts on Russian forums. They've stolen guest payment data, orchestrated elaborate social engineering schemes, and—get this—some victims paid twice: once to the hotel, once to the crooks. The hospitality industry is now a target-rich environment for cybercriminals.

Clop’s Oracle EBS Rampage—Another Day, Another Zero-Day, Another Round of Corporate Humiliation

Clop’s Oracle EBS Rampage—Another Day, Another Zero-Day, Another Round of Corporate Humiliation

Clop's been quietly exploiting an Oracle E-Business Suite zero-day since August—before the vendor even knew about it. Canon, Broadcom, Dartmouth College, and dozens of others got hit. But here's the thing: Clop's not encrypting anymore. They're just stealing data, then sending extortion emails with proof. Two-month window of unrestricted access, and companies are still discovering compromises. This is the new ransomware playbook.

OnSolve CodeRED Gets Ransomed—Emergency Alert Systems Held Hostage by INC Ransom

OnSolve CodeRED Gets Ransomed—Emergency Alert Systems Held Hostage by INC Ransom

OnSolve's CodeRED emergency alert system just got ransomed. Emergency agencies across the US suddenly couldn't contact residents during emergencies. The INC Ransom gang breached the system, stole customer data including plain-text passwords, and when they didn't get paid, leaked everything online. Crisis24's response? Rebuild from an eight-month-old backup. This is what happens when critical infrastructure treats security as optional.

The Shai Hulud 2.0 Nightmare—When Your Supply Chain Becomes a Credential Harvesting Farm

The Shai Hulud 2.0 Nightmare—When Your Supply Chain Becomes a Credential Harvesting Farm

Shai Hulud 2.0 just turned the npm ecosystem into a credential harvesting farm. Nearly 1,200 organizations got compromised—and many don't even know it yet. The attack wasn't just stealing data; it was extracting full runtime environments containing live GitHub tokens, AWS keys, and blockchain production credentials. Three days after disclosure, some of those stolen credentials were still valid. This is what modern supply chain warfare looks like.

So, What the Hell is a Man-in-the-Middle Attack in an Industrial Setting?

So, What the Hell is a Man-in-the-Middle Attack in an Industrial Setting?

Man-in-the-Middle attacks pose significant threats to Industrial Control Systems (ICS), allowing attackers to intercept, manipulate, and impersonate devices within crucial infrastructures like power grids and factories. Vulnerabilities arise from outdated protocols and blind trust among devices. Effective security measures include encryption, network segmentation, and certificate pinning to mitigate these risks.

Your Company Culture Might Be Screwing Your Security – How do cultural and organisational factors influence the effectiveness of cybersecurity awareness programs across different sectors?

So, Your Company Culture Might Be Screwing Your Security

Discover how organizational culture and leadership critically impact cybersecurity awareness program effectiveness. Learn to tailor training, foster open communication, and build a robust security culture to mitigate human risk and enhance overall protection across sectors. It's less about the tech, more about the people, you see." Or, if you want it a bit less cheeky for the actual search engines: "Explore the critical influence of cultural and organizational factors on the effectiveness of cybersecurity awareness programs. Understand how leadership, communication, and tailored training contribute to a stronger security culture and reduce human-related cyber risks." There, that should keep the algorithms happy. For a bit, anyway.

So, What’s This Usability vs. Security Kerfuffle All About Then? A Summary, If You Must.

So, What’s This Usability vs. Security Kerfuffle All About Then? A Summary, If You Must.

Organizations struggle to balance usability and security in digital environments, often facing a "pendulum effect" where stringent security frustrates users, leading them to ignore rules. This creates vulnerabilities. The solution lies in user-centered design, continuous feedback, and cultivating a security-conscious culture to enhance both security and usability effectively.

Socio-Technical Cybersecurity – The Human Clusterfuck in Cybersecurity and why Your Firewall Won’t Save You When Karen Clicks a Phishing Link

The Human Clusterfuck in Cybersecurity: Why Your Firewall Won’t Save You When Karen Clicks a Phishing Link

Cybersecurity hinges more on human behavior than technology, with 82% of breaches resulting from human error. Effective frameworks like NIST and ISO 27001 require organizations to foster a security-focused culture. Training is crucial to reducing risks, as demonstrated by successful interventions in companies like British Airways and Google.