How Your Car Shares Data with Insurers & TikTok Ban Impact

The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update

In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...
Figure 1. Attack Types

Insight Into the DDoS Attacks on the French Government

The attacks are ongoing as of this writing. Here are a few screenshots of data and some insight. I’ll make sure to keep it brief since you have seen this news in ...
The Rise of AI Worms in Cybersecurity

The Rise of AI Worms in Cybersecurity

The swift advancement of generative AI systems like OpenAI’s ChatGPT and Google’s Gemini has brought about a new era of technological ease. A recent report from CyberArk illustrates the transformative impact of ...
Why Edtech Industries Need Cybersecurity?

Why Edtech Industries Need Cybersecurity?

As educational technology (edtech) industries gets better, it changes the way how students learn. But now, keeping student information safe is a big worry. People like parents and teachers are really concerned, ...
Privacy and AI Relationships: The Dangers of Trusting Your AI Girlfriend/Boyfriend

Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection

In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...
Cyber Threat Assessment

Cyber Threat Assessment

| | Cyber Security
In the digital landscape, what you don’t know can hurt you. The unseen threats lurking in the shadows of your network, often called ‘blind spots’, can lead to significant business disruptions, regulatory ...
The-C2 Threat Intelligence Conference

The-C2 Threat Intelligence Conference

A Guide to Fortifying Cyber Defence Following cyber security best practices is not enough. Excellence in the face of ever-evolving adversaries requires a proactive and strategic approach combined with a solid understanding ...
Blog RMM as a Vulnerability Exploitation Vehicle

RMM as a Vulnerability Exploitation Vehicle

Remote Monitoring and Management (RMM) tools are used by a substantial percentage of Managed Service Providers (MSPs) and IT infrastructure professionals. The post RMM as a Vulnerability Exploitation Vehicle appeared first on ...
Get to Know Me: The Social Media Trend and Its Privacy Risks

‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage

In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like Instagram and the potential risks of sharing personal information publicly, particularly in light of potential ...