In October 2025, thieves stole eight priceless jewels from the Louvre Museum in under ten minutes. They climbed a balcony, broke a window, and vanished before guards could respond.The...
In 2025, attackers no longer need zero-day exploits. They don’t need insider access. All they need is a device still running with its factory-set credentials. Default usernames and passwords...
For too long, vulnerability management has relied on CVSS scores alone to guide remediation priorities. But as CISOs and vulnerability managers know, severity does not equal risk. A “critical”...
This past weekend, airports across Europe, including Brussels, London Heathrow, and Berlin, were hit by a cyberattack that rippled far beyond the continent. Flight delays and cancellations cascaded into...
The dynamic evolution of hacker culture, the ongoing transformation of cybersecurity conferences, and the importance of resilience and curiosity among security researchers are all topics covered in this episode...
NASHVILLE, TN — September 4, 2025 — Phosphorus, the leading provider of proactive security and management for the extended Internet of Things (xIoT), today announced the promotion of Brett...
As outlined in the advisory, advanced persistent threat (APT) actors sponsored by the Chinese government systematically compromise infrastructure sectors, including telecommunications, transportation, government, and military, to build a global...
Aseem Jakhar, Cybersecurity Entrepreneur, Technologist, and Founder of EXPLIoT, joins Phillip Wylie to address the current state and evolution of IoT and hardware security, examining why security has lagged...
Nashville, TN — Aug 25, 2025 — Phosphorus Cybersecurity, the leading provider of proactive security and management for the extended Internet of Things (xIoT), today announced the company has...
The Weak Password that Opened the Floodgates How a Simple xIoT Security Flaw Caused Chaos with Norway’s Dam Breach On April 7, 2025, a dam in a remote part...
Take the recent case where the Akira ransomware group successfully deployed ransomware across a corporate network after their initial Windows-based attack was blocked by Endpoint Detection and Response (EDR)...
The episode centers on the challenges and opportunities in IoT and OT security, with insights from technical content creator, hardware hacker, and educator Andrew Bellini. It highlights the often-overlooked...