Patch and Pray Failed: FIRESTARTER Proves Cisco Devices Can Stay Owned
John Z Black
Apr 23, 2026
Security Operations & Resilience
#cisco
#firestarter
#persistence
#malware
#cisa
#federal
#incident-response
#patch-management
A federal agency followed the rules, patched the CVE, and still got owned. FIRESTARTER is a specialized Cisco backdoor designed to survive the remediation cycle. It’s time to stop assuming a patch equals a clean network.
Read More
The Ephemeral Illusion: Why the Cloud Sandbox is not a Safe Zone
John Z Black
Apr 22, 2026
Security Operations & Resilience
#cloud-security
#azure
#aws-lambda
#sandbox-escape
#serverless
#containers
#iam
We have been told that serverless environments are secure because they are temporary. New research on Azure and AWS Lambda proves that attackers are learning how to live in the layer underneath.
Read More
Researchers Turned a Fiber Optic Cable Into a Listening Device. Your RF Scanner Won't Find It.
John Z Black
Apr 14, 2026
Security Operations & Resilience
#fiber-optic
#eavesdropping
#physical-security
#wiretap
#surveillance
#ndss-2026
#acoustic-sensing
New research from NDSS 2026 demonstrates that standard fiber optic cables can reconstruct conversations in adjacent rooms using off-the-shelf commercial equipment. No network access. No credentials. No software. And it bypasses both RF scanners and ultrasonic jammers, the two most common counter-surveillance tools.
Read More
CISA Has Already Assessed Almost Every World Cup Stadium. The Cyber Defense Operation Is Running.
John Z Black
Apr 13, 2026
Security Operations & Resilience
#world-cup-2026
#cisa
#event-security
#critical-infrastructure
#ddos
#fifa
#milan-olympics
CISA has completed cybersecurity assessments at nearly every World Cup 2026 stadium and team base camp. A White House task force is operational. The Milan Winter Olympics just gave the whole framework a live stress test with real Russian-linked attacks. This isn't a plan anymore.
Read More
OpenAI Rotated Its macOS Signing Certs After the Axios Attack. No Proof of Key Theft. They Rotated Anyway.
John Z Black
Apr 13, 2026
Security Operations & Resilience
#supply-chain
#openai
#code-signing
#macos
#ci/cd
#axios
#certificate-revocation
A malicious Axios npm package executed inside OpenAI's GitHub Actions signing workflow. Their investigation found no evidence keys were stolen. They revoked and rotated the certificates anyway. That decision is the interesting part.
Read More
The Math Does Not Work Anymore: Why Patching Faster Is No Longer Enough
John Z Black
Apr 12, 2026
Security Operations & Resilience
#vulnerability-management
#qualys
#cisa-kev
#bug-bounty
#ai-security
#patch-management
#risk-management
Qualys analyzed a billion CISA KEV remediation records and found attackers are weaponizing critical vulns an average of seven days before patches exist. The human-scale remediation model has hit a structural ceiling.
Read More
MFA Isn't the Final Barrier Anymore. It Hasn't Been for a While.
John Z Black
Apr 10, 2026
Security Operations & Resilience
#mfa
#phishing
#aitm
#fido2
#chrome-dbsc
#venom-phaas
#unc6783
#infostealers
#identity-security
Three research teams this week documented MFA failures at login, at the helpdesk layer, and post-session. The answer isn't more MFA. It's hardware-bound authentication.
Read More
Google Says You Have Until 2029 to Get Ready for Post-Quantum Encryption. That's Three Years.
John Z Black
Apr 7, 2026
Security Operations & Resilience
#post-quantum
#pqc
#encryption
#google
#nist
#cryptography
#quantum-computing
Google moves its internal post-quantum cryptography deadline to 2029, signaling that everyone else should already be planning.
Read More
CrowdStrike and Microsoft Are Sharing Data Now. Yes, Really.
John Z Black
Apr 5, 2026
Security Operations & Resilience
#crowdstrike
#microsoft
#defender
#siem
#partnership
#falcon
CrowdStrike's Falcon SIEM can now ingest Microsoft Defender telemetry, and Formula 1 is somehow responsible.
Read More
RSAC 2026: AI Dominated, Washington Bailed, and Facial Recognition Got Wrecked on Stage
John Z Black
Apr 3, 2026
Security Operations & Resilience
#rsac
#ai
#biometrics
#cisa
#openai
#ciso
RSAC 2026's biggest story was who didn't show up. CISA, FBI, and NSA all pulled out. Meanwhile, AI was everywhere, a researcher beat facial recognition live, and OpenAI launched a $100K bug bounty.
Read More
Google Says Q Day Is 2029. Three Billion Android Devices Are Already Changing.
John Z Black
Mar 27, 2026
Security Operations & Resilience
#post-quantum
#cryptography
#quantum-computing
#android
#enterprise-security
#pqc
#rsa
Google moved its internal Q Day deadline to 2029. Android 17 is already being rebuilt around post-quantum standards. If you're waiting on this, you're already late.
Read More
M-Trends 2026: The 22-Second Stat Everyone Is Misreading
John Z Black
Mar 24, 2026
Security Operations & Resilience
#m-trends
#mandiant
#ransomware
#incident-response
#dwell-time
#initial-access-brokers
#recovery-denial
Mandiant's M-Trends 2026 report is getting misquoted everywhere. The 22-second ransomware handoff is real -- but it's not what you think, and the dwell time stat buried in the report is scarier.
Read More
RSAC 2026 Opens Monday: Here's What the Cybersecurity Industry Will Be Talking About All Week
John Z Black
Mar 22, 2026
Security Operations & Resilience
#rsac
#rsac2026
#agentic-ai
#conference
#microsoft
#booz-allen
#cyber-policy
#ai-security
RSAC 2026 opens Monday at Moscone Center. Agentic AI, human manipulation, and post-breach resilience are the dominant themes -- here's what to watch and why this year feels different.
Read More
Security Below the OS: Why Device Integrity Is Becoming a Boardroom Topic
John Z Black
Mar 21, 2026
Security Operations & Resilience
#firmware
#supply-chain
#eclypsium
#device-security
#hardware
#iot
#enterprise-risk
Eclypsium raised $25M for firmware security. A compromised security scanner and ongoing IoT campaigns add context. Enterprise security that stops at the OS is leaving a meaningful gap below it.
Read More
Trivy Incident Reality Check: Your Security Tool Can Become Your Attack Path
John Z Black
Mar 21, 2026
Security Operations & Resilience
#trivy
#github-actions
#supply-chain-security
#ci/cd
#secrets-management
The Trivy incident is a blunt reminder that CI security tools need the same zero-trust controls as production systems.
Read More
Security Funding Is Getting Specific, and That Is the Signal
John Z Black
Mar 21, 2026
Security Operations & Resilience
#security-funding
#market-signals
#cellular-security
#supply-chain-security
#brand-protection
Capital is clustering around persistent pain points like cellular risk, device trust, and brand abuse, which is useful planning intelligence.
Read More
After Stryker: Why Incident Response Now Starts in the Management Plane
John Z Black
Mar 20, 2026
Security Operations & Resilience
#incident-response
#intune
#control-plane-security
#extortion
#law-enforcement-coordination
#iran-linked-threats
The Stryker fallout, Intune warnings, and leak-site disruption show a hard truth: incident response now lives or dies on control-plane integrity and coordinated external action.
Read More
Robots Are Moving Into Sensitive Environments. Security Gets Decided at Procurement.
John Z Black
Mar 19, 2026
Security Operations & Resilience
#robotics
#procurement
#cyber-physical
#supply-chain
#civil-liberties
#enterprise-security
#governance
U.S. robotics firms are pushing Congress for procurement barriers against Chinese suppliers. Robot dogs are already patrolling data centers. The security posture is decided before install day, during sourcing and contract language.
Read More
The Next Enterprise Exposure Wave: Old Management Surfaces, New Root Paths
John Z Black
Mar 18, 2026
Security Operations & Resilience
#management-plane
#ip-kvm
#telnet
#linux
#root-access
#hardening
#attack-surface
An unpatched telnetd with unauthenticated root RCE. Nine critical IP-KVM flaws. A Linux privilege escalation tied to systemd timing. Different CVEs, same underlying problem: forgotten management plumbing.
Read More