Smashing Security podcast #449: How to scam someone in seven days

Graham Cluley 0:03 It feels a little bit like one of those choose-your-own-adventure books where you’re…

It’s all about you

It’s a marketer’s dream: Hosting a sold-out event for 10k attendees. That brands are begging to…

Why brands should stop overlooking their most powerful influencers: customers

Every January, I sit down to write my predictions for the year ahead in social media…

Loop Marketing strategy: A framework for stellar AI-era growth

Something’s been throwing marketers for a loop lately. (Eye-roll level pun very much intended.) Loop Marketing…

Machine learning in email marketing: What drives revenue growth (and what doesn’t)

TL;DR: Machine learning in email marketing uses algorithms to personalize content, optimize send times, and predict…

AI is breaking traditional security models — Here’s where they fail first

Adopting LLM-based AI-assisted security triage helps accelerate how teams detect, triage and prioritize those vulnerability findings…

6 key trends reshaping the IAM market

“Many enterprises are still in the early stages of deploying passkeys and FIDO2, and biometrics are…

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

The disclosure highlighted a common approach that attackers follow these days. Instead of going off immediately…

Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave

“Repeated compromises of the same vendor in a short period suggest a persistent weakness,” said Cory…

Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service

Opswat also discovered two other Catalyst 9300 vulnerabilities: CVE-2026-20112 (cross-site scripting) and CVE-2026-20113 (CRLF injection). These…