A Nerdy Blog for Nerdy People Like Me!

CYBERSECURITY

All About
Cybersecurity

Uncategorized
Glenn Howard

Vacation Time!!

     My wife, Kelly and I were loooong overdue for some R&R, so when we saw that things were starting to calm down with

Read More »

RSS FEEDS

RSS Schneier on Security
  • On Moltbook March 3, 2026
    The MIT Technology Review has a good article on Moltbook, the supposed AI-only social network: Many people have pointed out that a lot of the viral comments were in fact posted by people posing as bots. But even the bot-written posts are ultimately the result of people pulling the strings, more puppetry than autonomy. “Despite […]
    Bruce Schneier
  • LLM-Assisted Deanonymization March 2, 2026
    Turns out that LLMs are good at de-anonymization: We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Reddit, LinkedIn, and anonymized interview transcripts, our method identifies users with high precision ­ and scales to tens of thousands of candidates. While it has been known that […]
    Bruce Schneier
  • Friday Squid Blogging: Squid Fishing in Peru February 27, 2026
    Peru has increased its squid catch limit. The article says “giant squid,” but they can’t possibly mean that. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
    Bruce Schneier
  • Why Tehran’s Two-Tiered Internet Is So Dangerous February 27, 2026
    Iran is slowly emerging from the most severe communications blackout in its history and one of the longest in the world. Triggered as part of January’s government crackdown against citizen protests nationwide, the regime implemented an internet shutdown that transcends the standard definition of internet censorship. This was not merely blocking social media or foreign […]
    Bruce Schneier
  • Phishing Attacks Against People Seeking Programming Jobs February 27, 2026
    This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malware on their system. News article.
    Bruce Schneier
RSS Krebs on Security
  • Who is the Kimwolf Botmaster “Dort”? February 28, 2026
    In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of distributed denial-of-service (DDoS), doxing and email flooding attacks […]
    BrianKrebs
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA February 20, 2026
    Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links to load the target brand's real website, and […]
    BrianKrebs
  • Kimwolf Botnet Swamps Anonymity Network I2P February 11, 2026
    For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to […]
    BrianKrebs
  • Patch Tuesday, February 2026 Edition February 10, 2026
    Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six "zero-day" vulnerabilities that attackers are already exploiting in the wild.
    BrianKrebs
  • Please Don’t Feed the Scattered Lapsus ShinyHunters February 2, 2026
    A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »
    BrianKrebs

AD Space Available

Share this: