Counterfeit Android devices found preloaded With Triada malware
A new version of the Triada trojan has been discovered preinstalled on thousands of new Android devices, allowing threat actors to steal data as soon as they are set up.
Independent tests show why orgs should use third-party cloud security services | CyberScoop
AWS, Microsoft Azure and Google Cloud Platform each scored 0% security effectiveness in CyberRatings.org’s evaluation of cloud network firewall vendors’ ability to prevent exploits and evasions.
The Reality Behind Security Control Failures—And How to Prevent Them
Most orgs only discover their security controls failed after a breach. With OnDefend's continuous validation, you can test, measure, and prove your defenses work—before attackers exploit blind spots.
Police shuts down KidFlix child sexual exploitation platform
Kidflix, one of the largest platforms used to host, share, and stream child sexual abuse material (CSAM) on the dark web, was shut down on March 11 following a joint action coordinated by German law enforcement.
Why Security Questionnaires Aren’t the Best for Risk | CSA
Discover why traditional security questionnaires fail to provide accurate risk assessments and how companies can implement more effective evaluation methods.
Cisco warns of CSLU backdoor admin account used in attacks
Cisco warns admins to patch a critical Cisco Smart Licensing Utility (CSLU) vulnerability, which exposes a built-in backdoor admin account now used in attacks.
A l'occasion du Forum InCyber, le Campus Cyber, en collaboration avec le Hub France IA, publie un guide pour protéger les systèmes...-Intelligence artificielle
North Korea's Fake IT Worker Scheme Sets Sights on Europe
Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies, leading to data theft and extortion
MFT and AI: Secure Data Movement for AI Success | CSA
The challenges many enterprises face in harnessing AI’s potential are becoming more apparent. MFT plays a crucial role in enabling enterprises to leverage AI.
Rational Astrologies and Security - Schneier on Security
John Kelsey and I wrote a short paper for the Rossfest Festschrift: “Rational Astrologies and Security“: There is another non-security way that designers can spend their security budget: on making their own lives easier. Many of these fall into the category of what has been called rational astrology. First identified by Randy Steve Waldman [Wal12], the term refers to something people treat as though it works, generally for social or institutional reasons, even when there’s little evidence that it works—Âand sometimes despite substantial evidence that it does not...
SHARED INTEL Q&A: Forrester’s Geoff Cairns on why IAM is overdue for a fundamental reset
Identity and Access Management (IAM) is no longer just about keeping the wrong people out—it’s about ensuring the right people, machines, and AI-driven agents can securely operate in an increasingly complex digital world. Related: How IAM can be a growth engine If 2024 was the year of Zero Trust acceleration, 2025 is shaping up to