Black Hat Asia 2025: Identity Intelligence

Last year, Black Hat asked Cisco Security if we could be the Single Sign-On (SSO) provider for all the partners in the Black Hat NOC. The idea is to centralize our user base, make access to products easier, provide easier user management, and to show r…

WhatsApp introduces Advanced Chat Privacy to protect sensitive communications

WhatsApp adds Advanced Chat Privacy feature that allows users to block others from sharing chat content outside the app. WhatsApp announced the availability of a new feature called “Advanced Chat Privacy” for both individual and group chats that enhances content protection. The feature blocks chat exports, auto-media downloads, and the use of messages in AI […]

Good Samaritan Describes Helping Tesla Victims

Tesla, driving the wrong-way on an interstate, crashed like a missile into two innocent people. A nearby woman jumped to the rescue of those victims, and now describes what it was like. It was about 7 p.m. on Wednesday, April 16, when 911 calls started…

Tesla Crash Lawsuit Highlights Disappearance of Evidence

Well known to lawyers who are trying to help victims of Tesla, is this strange fact found as a buried lede of one story. The lawsuit seeks access to the vehicle, which has remained unavailable to the family’s legal team since the incident. Tesla system…

“Oh, shit, we’ve got Mrs Hegseth”

The Russians and Chinese already may be crawling through the Hegseth family devices and on their way to compromise U.S. military missions. It’s not unreasonable to assume the risk scenarios painted by experts are spot on. Goldsmith, a threat inte…

Crypto mining campaign targets Docker environments with new evasion technique

New malware campaign targets Docker environments using unknown methods to secretly mine cryptocurrency, researchers warn. Researchers from Darktrace and Cado Security have spotted a malware campaign that targets Docker environments with a novel technique to mine cryptocurrency. The malware campaign targets Docker environments to deploy a malicious node connected to Teneo, a decentralized infrastructure network. […]