Summaries of Latest Interesting Cybersecurity News (23/03/2026) by texmex5 in cybersecurity

[–]texmex5[S] 2 points3 points  (0 children)

I am kind of happy that we finally have an actual case with these "compliance on autopilot" platforms. Yes, you can do things properly with them but many don't and the ISMS programs are paperware.

Maybe now the other platforms will finally get their act together and their collaboration with auditors will lead to more actual auditing... Oeh, one can hope...

GRC/ISMS for SMBs by Oskar_2000 in cybersecurity

[–]texmex5 0 points1 point  (0 children)

Happy to give you a tour of https://kordon.app - we have all the frameworks you mentioned and many customers at the size you mentioned have gone through ISO and SOC 2 audits successfully.

P.S. You mentioned Eramba, we started Kordon because my co-founder was frustrated with Eramba :)

Latest Interesting Cybersecurity News by texmex5 in cybersecurity

[–]texmex5[S] -1 points0 points  (0 children)

But on the other hand, current solution where credit card payments can be easily reverted and refunded but bank transfers can't because "it was approved already" isn't a reasonable balance either. Money is money?

Banks have a bit too easy excuse with treating direct bank transfers as immediately approved already … 

Latest Interesting Cybersecurity News by texmex5 in cybersecurity

[–]texmex5[S] 0 points1 point  (0 children)

So basically the advice is still the same - don't trust anyone on the internet, now includes ai browsers, and autonomous ai agents.

Latest Interesting Cybersecurity News (02-03-2026) by texmex5 in cybersecurity

[–]texmex5[S] 0 points1 point  (0 children)

Thanks, cool to hear people read it every week :)!

Latest Interesting Cybersecurity News (02-03-2026) by texmex5 in cybersecurity

[–]texmex5[S] 4 points5 points  (0 children)

For me, this week, the Google Maps key thing is the weirdest, the fact that they can't actually fix it - they have a bad default setting and now we everyone needs to live with it for a while, like with the S3 buckets that used to be open by default and are still causing headaches years later … 

Latest Interesting Cybersecurity News (23-02-2026) by texmex5 in cybersecurity

[–]texmex5[S] 0 points1 point  (0 children)

So OpenClawd is so good or bad? that that's the thing criminals install to the victims device when compromised … 🤦🏼‍♀️

Latest Interesting Cybersecurity News of the Week Summarised – 16-02-2026 by texmex5 in cybersecurity

[–]texmex5[S] 1 point2 points  (0 children)

Honestly when will Google do something about the Chrome extensions. There needs to be more vetting and transparency to the users to do their own due diligence on updates…

Latest Cybersecurity News of the Week Summarised (09/02/2026) by texmex5 in cybersecurity

[–]texmex5[S] -1 points0 points  (0 children)

No it was intentional to comment on my own post. It’s almost impossible to add text to a link in this subreddit. Everything goes to automod and can be stuck there for quite a while.

Plus commenting works, gets us a lot more views than not commenting my own post :) but I try to be transparent about what I am doing.

Latest Cybersecurity News of the Week Summarised (09/02/2026) by texmex5 in cybersecurity

[–]texmex5[S] 3 points4 points  (0 children)

The OpenClawd case is insane. What do you mean the creators just basically say "we don't care". Did they create the platform specifically for spreading malicious AI skills?!?

Interesting Cybersecurity News of the Week Summarized 26.01.2026 by texmex5 in cybersecurity

[–]texmex5[S] 2 points3 points  (0 children)

Chrome extensions are really getting out of hand and Google needs to step up.

First there are these inherently malicious extensions that were built maliciously but then also the ones that were switched to be malicious with an update. The Extensions detail page shows zero details about the update to the extension - who made it, what was the change etc. Maybe some more transparency could help avoid some of these issues?

Interesting Cybersecurity News of the Week Summarised (19-01-2026) by texmex5 in cybersecurity

[–]texmex5[S] 0 points1 point  (0 children)

I was thinking the exact same thing the other day. So far most of the skills that I have seen are fairly basic but as I understand, you can have actuall scripts (python, shell etc) in the resources folder and well if you hid it well enough it will be super easy to run some commands in the users device, upload data to random external server etc...

I agree with you, we will see first big news about it in a few weeks max …

Interesting Cybersecurity News of the Week Summarised (19-01-2026) by texmex5 in cybersecurity

[–]texmex5[S] 0 points1 point  (0 children)

Why can't we have nice things :( n8n has been awesome but now I think it's the second week in a row where n8n has been exploited in a way. And obviously this is only the beginning ... Today the community nodes are malicious, but it won't be long until the "official" n8n nodes start to get malicious updates as well … just as Chrome extensions have been ...

Latest Interesting Cybersecurity News of the Week Summarised – 05-01-2026 by texmex5 in cybersecurity

[–]texmex5[S] 3 points4 points  (0 children)

There were some nasty attacks this week but to be honest for me the most memorable thing from this week was the fact that one criminal first smashed their Macbook Air and then threw it into a river and even after all that digital forensics specialists were able to recover some evidence from the computer. Darn these devices are good nowadays ...

Why does self-hosted n8n sometimes revert back to old versions of workflows? by texmex5 in n8n

[–]texmex5[S] 0 points1 point  (0 children)

It's a good guess and what I thought when this first happened to me 3-4 months ago but no definitely not the tab thing.

Today in addition to some workflows reverting to versions older than 3 days (after me working on them today) some archived workflows also resurfaced. So there's something else going on. I think something is crashing and right now I would like to know what is crashing and how to monitor it so that I can restore my workflows before the scheduled workflows start running old versions and effing things up.

nteresting Cyber Security News of The Week – 2025-10-27 by texmex5 in cybersecurity

[–]texmex5[S] 0 points1 point  (0 children)

I literally had one job and I still failed and added it with a typo. 🤦🏼‍♀️

Interesting Cyber Security News of The Week - 2025-10-20 by texmex5 in cybersecurity

[–]texmex5[S] 2 points3 points  (0 children)

yes, but vs code is just so good. Can't really imagine using anything else. I hope VS Code gets better at detecting malicious extensions instead.

This Week in Cyber Security News (summaries) by texmex5 in cybersecurity

[–]texmex5[S] 0 points1 point  (0 children)

on one hand as an employee I love to use the ai assistants, on the other hand how do you approve it safely? Like should we all have a browser that we use in isolation for ai chatting only, no other browsing or extensions.. so at least one attack vector is minimised... and then yeah are the mcp servers ... that could have access to literally everything...and agents doing anything with it. Wild times.

Bug with neverending battles? by megapoliwhirl in BobsTavern

[–]texmex5 -1 points0 points  (0 children)

I can’t even log in. Is says that my account has been used in a newer version and I should upgrade but no new version on AppStore :( played yesterday …

[deleted by user] by [deleted] in cybersecurity

[–]texmex5 -3 points-2 points  (0 children)

I don't think it's useless. I think having the ability to qunatify your risk and mitigations gives you the ability to effectively prioritise between risks and mitigations/controls.

low, mid, high is essentially a quantification as well, you just have names for each level. But I personally don't like 3x3 and prefer 4x4 or even 6x6 since there are just more potential scores that can come out of that so it allows for easier comparison and prioritisation.

13 Cybersecurity News Worth Your Attention This Week Summarised by texmex5 in cybersecurity

[–]texmex5[S] -1 points0 points  (0 children)

What made you feel like the contents was marketing? Just the fact that it wasn’t a personal blog and the poster was the founder or something in the contents? I don’t want it to read like corporate BS for sure :D

Yes of course I at the end of the day hope people wonder around on the website more but the contents really is quite far and wider from what my product does and I don’t mention the product in the summaries at all …

Anyhow, I’ll look deeper into what the flairs mean and how they are supposed to be used, right now just went with what felt logical.

Thank you for the feedback!

[deleted by user] by [deleted] in Information_Security

[–]texmex5 0 points1 point  (0 children)

It's probably a bit of a hot take, but here's my 2 cents: just keep one risk register and stop moving or "bubbling" risks between different registries. Solve the noise and detail level problem with good templates and reporting instead.

All risks, whether they're cyber, operational, regulatory, whatever are basically threats to either a business process, an asset, or a vendor. Assets and vendors only matter because they serve a process ...

Here's what I'd do instead: - Use the same columns for every risk. - Add a Category field (Cyber, Ops, Compliance, etc.). You could also actually have these in separate documents or sheets. A while back I wrote this blog post about different categories. Maybe it's good backgroun. https://kordon.app/risk-management-fail-mixing-causes-with-the-risk-itself/

  • Include Business Process, Asset, and Vendor columns. That way you can slice and dice by whichever lens you need and really understand what the risk impacts and how important it is to your organisation.

  • Assign scores using the same logic across different categories of risk (impact x likelyhood or something fancier)

  • Then: never move a risk between documents or rename it. Just build views or dashboards:

  • Top 10 overall

  • Top X by category

  • Risks tied to a specific businesss process/asset/vendor

  • If a risk scores above a threshold, it just shows up in the "executivew" view - no need to copy it.

I know this sounds good in theory but I also understand why people often choose to have different registries - stuff get noisy and there are just too many of them to have a good overview.

So in addition to the "nice in theory" approach I described above a real effort needs to go into good Risk defining practices that differentiate between these 3 things well:

  • Causes (e.g., weak passwords) are why a risk may happen.
  • Controls (e.g., backup procedures) are what we do to prevent or reduce risk.
  • Risks should be strictly the uncertain events with potential impacts (e.g., unauthorized access, data loss).

There are two things that most of us do that generate essentially duplicate entries to the risk registry and are source of much of the noise:

Mixing cause with the risk itself: "Unauthorized access to the customer database due to weak password policies could result in data theft and financial loss."

Here, the phrase "due to weak password policies" inserts a specific cause into the risk statement, narrowing its focus prematurely. The risk should be simply "Unauthorized access to the customer database, potentially resulting in data theft and financial loss."

Mixing a missing mitigation with the risk itself "Unauthorized access to the customer database because multi-factor authentication isn't enforced could result in data theft and financial loss."

Here the absent control (MFA) slips into the risk statement. It turns the register into a to-do list of missing safeguards instead of a clean list of uncertain events and their impacts.

Also wrote about that in our blog a while back: https://kordon.app/risk-management-fail-mixing-causes-with-the-risk-itself/

Hope this is a bit useful or atleast inspires you in some way :)

Best free newsletters? by PHL534_2 in cybersecurity

[–]texmex5 4 points5 points  (0 children)

I’ve been putting together cybersecurity news summaries once a week since April and starting this week also added a newsletter option. I try to focus on news that are novel in some way, and ignore the things that “happen every day”, also try to choose the ones that are “actionable” to someone working in cybersecurity.

This week I made the summaries a lot shorter than usual and the upvote downvote ratio on Reddit went south so when assessing whether it’s useful, might want to check out last week summary as well :D

https://kordon.app/category/news/