AI and Voter Engagement
Social media has been a familiar, even mundane, part of life for nearly two decades. It can be easy to…
Social media has been a familiar, even mundane, part of life for nearly two decades. It can be easy to…
The next three in this series on online events highlighting interesting uses of AI in cybersecurity are online: #4, #5,…
A critical authentication bypass vulnerability in Fortinet’s FortiWeb web application firewalls (WAF), identified as CVE-2025-64446 with a CVSS score of…
Presently sponsored by: Malwarebytes Browser Guard blocks phishing, ads, scams, and trackers for safer, faster browsing This week, it was…
Short-finned pilot wales (Globicephala macrorhynchus) eat at lot of squid: To figure out a short-finned pilot whale’s caloric intake, Gough…
As AI capabilities grow, we must delineate the roles that should remain exclusively human. The line seems to be between…
For nearly two decades, SecPod has challenged conventions and introduced new ways of thinking about cybersecurity – ways that move…
Executive Summary A targeted cyber-espionage campaign attributed to the threat group APT-C-08 is actively exploiting a high severity directory traversal…
Every SSL/TLS certificate has a defined lifespan. Website owners for years have enjoyed the convenience of multi-year certificates, often lasting…
The Business of Secrets: Adventures in Selling Encryption Around the World by Fred Kinch (May 24, 2004) From the vantage…