Don't sleep on The Stack - it has a solid cybersecurity reporting game lately.
The Big Interview: NATO cybersecurity chief Mario Beccia
https://www.thestack.technology/the-big-interview-nato-cybersecurity-chief-mario-beccia/
Don't sleep on The Stack - it has a solid cybersecurity reporting game lately.
The Big Interview: NATO cybersecurity chief Mario Beccia
https://www.thestack.technology/the-big-interview-nato-cybersecurity-chief-mario-beccia/
NEW: Peter Williams, the former head of Western zero-day and spyware maker Trenchant, pleaded guilty to selling eight exploits to a Russian broker that resells to the Russian government.
The DOJ said Williams was promised millions of dollars in exchange for "national-security focused software."

Prosecutors confirmed Peter Williams, the former Trenchant boss, sold eight exploits to a Russian buyer. TechCrunch exclusively reported that the Trenchant division was investigating a leak of its hacking tools, after another employee was accused of involvement.
Lazarus (North Korea) is targeting the UAV-sector
Absolutely excellent research coming out of ESET today (2025-10-23): https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/
Also very timely given the state of the world. It's a long one, and they have also provided an abundance of IoC:s in their github repo:
https://github.com/eset/malware-ioc/tree/master/nukesped_lazarus
I may be in the minority on this one, but I want to hear your bio during a talk. To be sure, it's nice when they are short and sweet and devoid of meaningless accolades ("I was awarded CISO of the century in the 1900s by a print magazine, founded a made up not-for-profit that lasted five minutes, and wrote slam poetry and press releases as a teen member of a hacking group"), but I want to hear it.
I sit thru the equivalent of three or four security talks per day as an analyst. About the only thing really unique to you as a speaker I'm listening to, is your story (and sometimes hopefully your research or solution). There are a lot of voices competing for attention in infosec, and establishing credibility via experience out of the gate makes a difference.
Scoop, by @lorenzofb: A federal contract shows ICE spent $825,000 on vans equipped with fake cellphone towers known as cell-site simulators, which can be used to spy on nearby phones.
The Maryland-based company that integrates the cell-site simulators into their vans is called TechOps Specialty Vehicles.
This has got to be one of the best. In Wales, UK, there is a legal requirement for road signs to be in both English and Welsh. So, in this case, the official of the Highways department emailed the English wording to the translator and, after receiving a reply, proceeded to have the sign made and installed.
Unfortunately, a few weeks later, Welsh-speaking drivers began to call up to point out that the Welsh reads..... "I am currently out of the office. Please submit any work to the translation team."