Information modeling blends lateral thinking and deductive logic. Applied to information security, it’s a powerful technique for designing a security architecture with multi-dimensional controls that minimizes risk and achieves continuous compliance. – Read more
Latest article
Handala Wiper Attack
What is the Attack? A large-scale cyberattack against medical technology company...
Ransomware group exploited Cisco firewall vulnerability as a zero day, weeks before a patch...
One of the world’s most active ransomware groups, Interlock, started exploiting a critical-rated Cisco firewall vulnerability as a zero day...
Google Cloud Platform (GCP) BigQuery Cross Tenant Data Sources Exfiltration through Canvas Assistant
Google Cloud Platform (GCP) BigQuery Cross Tenant Data Sources Exfiltration through Canvas Assistant The vulnerability stems from a flaw in how Gemini in BigQuery...
You have to invite them in
Welcome to this week’s edition of the Threat Source newsletter. I found myself watching the Oscars ceremony in its entirety for the first time in...


