The United States has rolled out stricter cybersecurity rules for companies in the defense industry. These rules aim to protect sensitive government data from cyber espionage, leaks, and foreign interference. The changes apply not only to major defense contractors but also to small manufacturers, niche technology vendors, and subcontractors that form the backbone of the […]
Ransomware is no longer only about locking systems and demanding payment to unlock them. A growing number of attacks now skip encryption altogether. Instead, attackers steal sensitive data and threaten to leak it unless the victim pays. This shift changes the risk for businesses. Even if you can restore your systems from backups, you may […]
Last month, I discovered something that stopped me cold during a routine penetration test. A developer had spun up an Ollama server to experiment with local AI models. Nothing unusual about that, except the server was publicly accessible with no authentication. The models it hosted had been trained on internal company data. This scenario plays […]