Yes, your TV can be hacked
What initially appeared to be a court case about severe harassment quickly shifted to a small “wow” moment. A 25-year-old Belgian who appeared in court today for serious harassment admitted that he had hacked his neighbors' TV.
Read MoreLatest
Fast reads. Business IT focus. Cybersecurity-first.
Anyone can hack: it's child's play
18 and 19 years old. Those are the ages of the two young boys who brought public transport across all of London to a standstill in 2024. The two were eventually identified and charged, but that doesn't change the fact that worldwide, hackers are getting younger and younger.
Do we really need to watch out for 'the Chinese'?
The US Department of the Treasury has become the victim of a hack in which several employees' computers were “infected.” Who is behind the attack is not 100% clear, but the renowned news outlet The Washington Post claims that the hackers were supported by the Chinese government.
Brussels Airport and other European airports hit by ransomware
Brussels Airport came to a standstill. The media quickly reported that this was the result of a major international cyberattack.
Protect your children — all children
27 years old: the perpetrator. 11 years old: the victim. Nude photos. Time and again we read these reports, hear these reports, see these reports, and hear about them in our surroundings.
OAuth Consent Phishing: The Login Screen That Isn't a Login
Attackers don't steal passwords — they trick users into granting permissions. Here's what to log, what to block, and how to unwind it.
Charlie's Rule: Don't Block What You Can't Explain
If you can't explain why it's malicious, you'll end up blocking business-critical traffic. Build evidence first, then automate.
“Zero Trust” Fails When Identity Hygiene Is Optional
You can't policy your way out of weak MFA, stale accounts, and unmanaged devices. Fix identity first, then enforce.
IR KPI Trap: Closing Fast While Missing the Blast Radius
“Resolved” doesn't mean “contained.” Split containment metrics from investigation metrics or you'll reward shallow response.
Charlie's Incident Diary: The IIS Line That Proved the Entry Point
One boring log entry can collapse the whole mystery. What to look for, how to pivot, and how to scope safely.
Alert Fatigue Playbook: Cut Noise Without Going Blind
Classify alerts by actionability, suppress duplicates, and enforce “owner-or-delete”. Less noise, more outcomes.
The “Alert Economy”: When Tools Sell Anxiety
More alerts ≠ more security. Severity inflation burns teams out. Set a paging budget and demand reproducibility.
When Security Breaks the Business: The Hard-Block Pattern
A rushed block takes down legit integrations. Fix it with staged policies, a rollback path, and audit trails.
No posts match your search.