Jeff Hall - PCI Guru - #StandWithUkraine
@jbhall56
Followers
922
Following
35K
Media
1K
Statuses
72K
PCI QSA, vCISO and all around devil's advocate. Been in IT and security for a very long time. Maybe too long.
Minneapolis, MN
Joined February 2009
World’s biggest polluter on track to hit peak emissions target early but miss goal for cutting carbon intensity.
theguardian.com
World’s biggest polluter on track to hit peak emissions target early but miss goal for cutting carbon intensity
0
0
0
An artist sneaked an AI-generated print on to a gallery wall before bemused visitors alerted museum staff.
bbc.com
A visitor who noticed the piece says staff "admitted they had no idea about the piece or when it arrived".
0
0
0
Tsunamis are notoriously difficult to spot on the open ocean as they race towards shore. But in the summer of 2025, scientists watched one unfold as it happened.
bbc.com
Tsunamis are notoriously difficult to spot on the open ocean as they race towards shore. But in the summer of 2025, scientists watched one unfold as it happened.
0
0
0
Jeremy Messersmith’s idea to rerecord Gordon Lightfoot’s epic 1976 song about the shipwreck became “all-consuming.”
startribune.com
Jeremy Messersmith’s idea to rerecord Gordon Lightfoot’s epic 1976 song about the shipwreck became “all-consuming.”
0
0
0
Attackers are running sophisticated spear-phishing attacks against company executives, with recent campaigns seen targeting enterprises in financial services and technology verticals.
bleepingcomputer.com
Attackers are increasingly phishing over LinkedIn to reach executives and bypass email security tools. Push Security explains how real-time browser protection detects and blocks phishing across apps...
0
0
0
Since August, analysts at security awareness company KnowBe4 have noticed Quantum Route Redirect (QRR) attacks in the wild across a wide geography, although nearly three-quarters are located in the U.S.
bleepingcomputer.com
A new phishing automation platform named Quantum Route Redirect is using around 1,000 domains to steal Microsoft 365 users' credentials.
0
0
0
Security misconfiguration jumped to second place while injection vulnerabilities dropped, as organizations improve defenses against traditional coding flaws.
darkreading.com
Security misconfiguration jumped to second place as organizations improve defenses against traditional coding flaws.
0
0
0
Enforcement of the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) requirements started on November 10, 2025.
securityweek.com
Enforcement of the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) requirements started on November 10, 2025.
0
0
0
Attackers intercepting network traffic can determine the conversation topic with a chatbot despite end-to-end encrypted communication.
securityweek.com
Attackers intercepting network traffic can determine the conversation topic with a chatbot despite end-to-end encrypted communication.
0
0
0
Reminding everyone why open document formats still matter.
techspot.com
LibreOffice developer The Document Foundation (TDF) is once again reminding users that not all document formats are created equal. Italo Vignoli, TDF's co-founder, warned that using proprietary...
0
0
0
Many employers are even perfecting their approach to flexible work arrangements. They’re making in-person time more strategic and purposeful, designating in-office days and taking steps to ensure new employees don’t feel isolated.
chicagotribune.com
Employers are perfecting their flexible work arrangements. They’re making in-person time strategic and ensuring new employees don’t feel isolated.
0
0
0
The disclosure that attackers are probing the systems relied on to manage the delivery of safe drinking water to millions of households comes in newly-released information from the Drinking Water Inspectorate (DWI).
fortra.com
Critical infrastructure is once again in the spotlight, as it is revealed that several UK water suppliers have reported cybersecurity incidents over the last two years.
0
0
0
This is why AIs are not ready to be personal assistants.
schneier.com
This is why AIs are not ready to be personal assistants: A new attack called ‘CometJacking’ exploits URL parameters to pass to Perplexity’s Comet AI browser hidden instructions that allow access to...
0
0
0
The increasingly common method, which many potential targets have yet to learn of, is quick, bypasses most endpoint protections, and works against both macOS and Windows users.
arstechnica.com
Relatively new technique can bypass many endpoint protections.
0
0
0
Sachin Katti, the exec Intel promoted to chief technology and AI officer in April, will leave the x86 giant to join OpenAI after just six months in the job.
theregister.com
: Sachin Katti was one of new Intel CEO Lip Bu Tan's first appointments
0
0
0
Meta's fight against scams is undermined by its own ad algorithms – while making billions.
techspot.com
Meta has quietly been struggling with the financial and reputational fallout from a vast online fraud economy operating through its social platforms. A cache of internal documents...
0
0
1
Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact" package with the intent to target GitHub-owned repositories.
thehackernews.com
Veracode exposes npm package "@acitons/artifact" stealing GitHub tokens via build scripts.
0
0
1
Current and former military officers are warning that adversaries are likely to exploit a natural flaw in artificial intelligence chatbots to inject instructions for stealing files, distorting public opinion or otherwise betraying trusted users.
defensenews.com
Current and former military officers are warning that countries are likely to exploit a security hole in artificial intelligence chatbots.
0
0
0
The White House was blindsided by the idea and is now dealing with a furious backlash from conservative allies, business leaders and lawmakers.
politico.com
The White House was blindsided by the idea and is now dealing with a furious backlash from conservative allies, business leaders and lawmakers.
0
0
0
The new protections will initially be available only in Private Browsing Mode and Enhanced Tracking Protection (ETP) Strict mode. After testing and optimization, they will be enabled by default in the Firefox web browser.
bleepingcomputer.com
Mozilla announced a major privacy upgrade in Firefox 145 that reduces even more the number of users vulnerable to digital fingerprinting.
0
0
0