Subscribe
Sign in
Latest
Top
Security Threats From Home WiFi Routers
Which WiFi router are you using at home or your business? The recent FCC ruling confirms what security experts have said for years.
Mar 31
•
Martin Szudarski
A Dozen Ways to Hack Enterprises in the Cloud
Are you ready for attackers to use your cloud against you?
Mar 24
•
Martin Szudarski
Attackers are Now Living Off the Cloud
Is your cloud protected and are you ready for their latest attack plan?
Mar 17
•
Martin Szudarski
1
February 2026
Malicious VSCode AI Assistants Directly Target Developers
Over a million developers are affected.
Feb 3
•
Martin Szudarski
January 2026
Twelve Months of Fighting Cybercrime
An Endpoint Security Summary of 2025
Jan 28
•
Martin Szudarski
2026 Security Predictions
AI may take over as a larger threat.
Jan 13
•
Martin Szudarski
September 2025
Attackers Exploit SonicWall Vulnerability to Deploy Akira Ransomware
Poor practices and inadequate protection allowed Akira to spread.
Sep 9, 2025
•
Martin Szudarski
The node.js Package Manager has Been Under Attack
North Korean attackers are flooding the NPM Registry with malicious package.
Sep 2, 2025
•
Martin Szudarski
August 2025
AI Vulnerability: Amazon Q Developer Tool Hack Could Wipe Systems
Part Three of a series of recently found AI Vulnerabilities in Major AI Provider Models.
Aug 29, 2025
•
Martin Szudarski
AI Vulnerability: Google Gemini Can Be Exploited to Steal Credentials
Part two of a series of recently found AI Vulnerabilities in Major AI Provider Models.
Aug 27, 2025
•
Martin Szudarski
AI Vulnerability: The MS Copilot “EcoLeak” Vulnerability
Part One of a series of recently found AI Vulnerabilities in Major AI Provider Models.
Aug 25, 2025
•
Martin Szudarski
Seven Ways Mobile Devices can be Hacked
You rely on your phone. Here are a few tips to keep it safe.
Aug 5, 2025
•
Martin Szudarski
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts