Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

BygoneSSL and the certificate that wouldn't die

Turns out the scariest thing about SSL certificates isn’t when they expire. It’s when they don’t. I wrote about the CA/Browser fight that led to the 47-day certificate mandate. CAs crying about lost revenue, browsers flexing their root program authority, enterprises stuck in the middle. But nobody talks about the security research that started it all: BygoneSSL at DEFCON 2018. Two researchers mining Certificate Transparency logs found something surprising.

October 27, 2025 Cyber Threat Intelligence Briefing

This campaign uses an updated lure combination of a Cloudflareturnstile and fake Windows update before socially engineering the victim into pasting malicious commands into the run dialogue box. Sekoia has released a detailed technical analysis of the POLAREDGE botnet which it initially reported on earlier this year. The botnet is spread by exploiting vulnerabilities, most notably CVE-2023-20118 in cisco routers; however, other samples from the same family have been seen exploiting routers from other vendors such as Asus, QNAP and Synology.

Off the Blocks | Ep. 1: What myths in digital assets need to be debunked?

New series. Real talk. No fluff. Welcome to Off the Blocks, a rapid-fire video series from Fireblocks filmed on the ground at TOKEN2049 Singapore. In Episode 1, we asked builders, investors, and operators one bold question: What’s the biggest myth in digital assets that needs to go? Their answers are sharp, surprising, and sometimes controversial. This isn’t your average crypto panel. It’s unfiltered insight from the people shaping the future of finance.

Widespread Installation of Calendaromatic Adware Includes Homoglyph Channel

Kroll has recently seen a widespread installation of an application called Calendaromatic, that Kroll Threat Intelligence (TI) is currently classifying as a potentially unwanted program (adware) but displays some functionality that gives it the potential to conduct more malicious behaviors.

Logs & Lattes: Episode 3 - Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

API Attack Awareness: Business Logic Abuse - Exploiting the Rules of the Game

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed Broken Object Level Authentication (BOLA), injection attacks, and authentication flaws; this week, we’re exploring business logic abuse (BLA). Unlike technical flaws, business logic flaws exploit how an API is designed to behave.

Report: More Than Half of Adults Encountered a Scam Last Year

Researchers at Bitdefender warn that scams are seeing a steady increase globally. Citing a recent report from the Global Anti-Scam Alliance (GASA), the researchers note that 57% of adults worldwide have reported encountering a scam in the past year, and 13% encounter a scam at least once per day. One in four adults lost money to a scam, and annual global scam losses now exceed $1 trillion.