CSOonline.com reported that “Summer is a time for vacation and a well-deserved break from the intensity of work. It’s also a great time to be targeted for a cyberattack. While cybercriminal activity extends throughout the year, summer has a special quality for cyber attackers. Whether it’s because our guard is

Continue Reading Vacation season means cybersecurity needs to be strengthened!

SCWorld.com reported that “Risk management isn’t just about defense. I learned this lesson early in my career when I watched promising business initiatives stall because the legal, HR, and security teams operated in isolation, each applying their specialized lens without understanding the full picture. These disconnects created unnecessary friction

Continue Reading Security, Legal and HR need to do a better job communicating!

BankInfoSecurity.com reported “A malicious actor breached a customer relationship management platform used by Allianz Life Insurance of North America on July 16 and stole personally identifiable information of most of its 1.4 million U.S. customers, financial professionals and some employees, the company said.” The July 28, 2025 article entitled ”

Continue Reading CRM compromise is a major data breach problem!

Darkreading.com reported “A group of female cybersecurity pioneers will share what they’ve learned about navigating a field dominated by men, in order to help other women empower themselves and pursue successful cybersecurity careers.”  The July 16, 2025 article entitled “Women Who ‘Hacked the Status Quo’ Aim to Inspire Cybersecurity Careers”

Continue Reading Good news for Women who seek Cybersecurity careers!

Microsoft Threat Intelligence reported “On July 19, 2025, Microsoft Security Response Center (MSRC) published a blog addressing active attacks against on-premises SharePoint servers that exploit CVE-2025-49706, a spoofing vulnerability, and CVE-2025-49704, a remote code execution vulnerability. These vulnerabilities affect on-premises SharePoint servers only and do not affect SharePoint Online in

Continue Reading Microsoft 365 SharePoint is under attack!

SCWorld.com reported that “Cyberspace shattered that distance. It collapses distance, bypasses borders, and connects everything instantly. The advantages of geography no longer apply. What once shielded us—oceans, borders, early warning—is now irrelevant. In this domain, the United States is no fortress. It’s a glass house.” The July 21, 2025 article

Continue Reading America is the most vulnerable country in the world for Cyberattacks!

DarkReading.com reported that “Four vulnerabilities in a popular Bluetooth implementation can be chained together to enable remote code execution (RCE) in untold millions of vehicles and miscellaneous devices. “Blue SDK” is a Bluetooth protocol stack and software development kit (SDK). On May 17, 2024, researchers from PCA Cyber Security discovered

Continue Reading Millions of vehicles and devices have been exposed by Bluetooth RCE (Remote Code Execution)!

CSOnline.com reported that “Salesforce Industry Cloud customers can easily misconfigure their deployments to enable attackers to access encrypted customer information, session data, credentials, and business logic, security researchers have found. The Salesforce Industry Cloud suite of vertical-aligned solutions includes a low-code platform that provides pre-built digital transformations tools for specific

Continue Reading Watch out! The Salesforce Industry Cloud may be putting many businesses at risk!

CIO.com reported that “At a time when IT budgets are increasingly constrained, many CIOs are tempted to squeeze extra life out of systems that should have been put out to pasture years ago. …If you’re investing money in an IT system that’s limping along on a version that’s barely being

Continue Reading  Are outdated IT systems killing you because of Cybersecurity problems?

SCWorld.com reported that “OpenAI said in its June security report that it spotted and disrupted a number of attacks, most originating in China and Russia, that appear to have been using ChatGPT to either generate code or automate the process of making social media posts or emails for social engineering

Continue Reading Can we really trust ChatGPT to figure out state-sponsored threats?