Edwin Kwan
  • Home
  • Speaker
  • Podcasts
    • Cyber Bites
    • AppSec Unlocked
    • It’s 5:05 Podcast
  • Journal
Select Page
Your Site Was Hacked, and You Never Knew About It: My Real-Life Encounter with a Supply Chain Attack

Your Site Was Hacked, and You Never Knew About It: My Real-Life Encounter with a Supply Chain Attack

Nov 1, 2024 | Articles, Podcast

Just yesterday, I received a LinkedIn message about an interesting job opportunity, complete with a link to the job ad. Before clicking, I took a quick look at the URL to ensure it was legitimate—something we all do in this line of work. The website appeared normal...

Fake Browser Update Malware Targets WordPress Sites via Malicious Plugins

Oct 31, 2024 | Podcast

https://www.bleepingcomputer.com/news/security/over-6-000-wordpress-sites-hacked-to-install-plugins-pushing-infostealers WordPress website owners beware! A new wave of attacks is targeting your sites to install malicious plugins that display fake software updates and...
Mandiant Report: Exploited Vulnerabilities Reach Record Lows in Time to Patch, But Zero-Days on the Rise

Mandiant Report: Exploited Vulnerabilities Reach Record Lows in Time to Patch, But Zero-Days on the Rise

Oct 30, 2024 | Podcast

https://cloud.google.com/blog/topics/threat-intelligence/time-to-exploit-trends-2023 A new report by cybersecurity firm Mandiant reveals a concerning trend: attackers are exploiting vulnerabilities faster than ever before, with zero-day attacks (exploits for unknown...

Massive UN Data Leak Exposes Personal Information of Violence Against Women Victims

Oct 29, 2024 | Podcast

https://www.vpnmentor.com/news/report-unwomen-breach A security researcher uncovered a massive data leak from the UN Trust Fund to End Violence against Women, jeopardizing the privacy of victims and staff. The UN Trust Fund’s database was misconfigured and...

AI Transcription Tool “Whisper” Creates Fabricated Text, Raising Concerns in Healthcare and Beyond

Oct 28, 2024 | Podcast

https://apnews.com/article/ai-artificial-intelligence-health-business-90020cdf5fa16c79ca2e5b6c4c9bbb14 Popular AI tool Whisper, lauded for its accuracy, has a major flaw: it invents entire sentences or phrases, raising concerns about its use in healthcare, closed...

Cyber Skills Gap Widens, Nearly 90% of Businesses Link Breaches to Lack of Expertise

Oct 26, 2024 | Podcast

https://www.fortinet.com/content/dam/fortinet/assets/reports/2024-cybersecurity-skills-gap-report.pdf Fortinet’s latest Global Cybersecurity Skills Gap Report paints a concerning picture: the cybersecurity skills gap is widening, and businesses are increasingly...

Half of Businesses Underestimate SaaS Security Risks, Culture Blamed

Oct 25, 2024 | Podcast

The State of SaaS Security Report 2024 A new report by AppOmni reveals a significant gap between perception and reality when it comes to SaaS security in enterprises. Key Findings: Nearly half (49%) of businesses underestimate the security risks associated with SaaS...

Malicious npm Packages Target Developers’ Ethereum Wallets with SSH Backdoor

Oct 24, 2024 | Podcast

https://blog.phylum.io/trojanized-ethers-forks-on-npm-attempting-to-steal-ethereum-private-keys Security researchers at Phylum have uncovered a series of malicious packages targeting Ethereum developers on the npm registry, the world’s most popular software...

Internet Archive Hit Again: Exposed Tokens Lead to Zendesk Email Breach

Oct 23, 2024 | Podcast

https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens The Internet Archive is facing renewed security woes after a threat actor exploited exposed GitLab authentication tokens to gain access to the...
Introduction to SSVC: Do You Need It and How Does It Work?

Introduction to SSVC: Do You Need It and How Does It Work?

Oct 22, 2024 | Articles, Podcast

In the ever-evolving landscape of cybersecurity, vulnerability management remains a critical challenge for organizations. While the Common Vulnerability Scoring System (CVSS) has been a staple for years, a new approach called Stakeholder-Specific Vulnerability...
« Older Entries
Next Entries »

Latest Posts

  • Malicious npm Packages Target Cursor Editor Users, Affecting Over 3,200 Developers
  • Secure Development Lifecycle Training
  • Pearson Educational Giant Suffers Major Cyberattack Through Exposed GitLab Token
  • Security Concerns Grow Over Electric Vehicles as Potential Surveillance Platforms
  • Microsoft Warns Default Kubernetes Helm Charts Create Security Vulnerabilities

Speaking Events

  • Future of Financial Services: Security Sydney & Melbourne 2024
  • UNSW Business School Panel Discussion
  • Guest on SecurePod Podcast
  • Inspiring the Next Generation of Cyber Security Professionals
  • Panelist Speaker at The Application Strategy Summit

More Content

  • Articles (26)
  • Podcast (551)
  • Posts (24)
  • Speaking (39)
  • X
  • RSS
Edwin Kwan