{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Edward Kiledjian","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/ekiledjian","_microblog":{"about":"https://micro.blog/about/api","id":"1555731","username":"ekiledjian","bio":"Since 2016, I've served as the Global CISO and SVP for Cybersecurity, Privacy, Compliance, and Resilience at OpenText—navigating and securing the company through a period of extraordinary growth. In just eight years, OpenText's revenue has surged over 3x and our workforce has expanded from 8,900 to nearly 23,000 across 40+ countries. I've had the privilege of building the cybersecurity and privacy foundation that scaled with this transformation, enabling business expansion while strengthening resilience and trust.\n\nMy leadership focus is simple: align security with strategy. I design and operate programs that go beyond defence—driving compliance as a business enabler, embedding risk into decision-making, and delivering measurable outcomes. From cloud transformation and zero trust to quantum readiness and global regulatory alignment (FedRAMP, ISO, SOC, DORA), my teams deliver security that protects, scales, and differentiates.\n\nI'm a builder—of secure systems, diverse global teams, and forward-looking capabilities. Whether briefing the board, supporting complex sales, or mentoring the next generation of security leaders, I lead with clarity, accountability, and purpose. I believe great security doesn't slow you down—it powers what's next.\n\nContact: [TheBlog@privateidentity.online](mailto:TheBlog@privateidentity.online)","pronouns":"","is_following":false,"is_you":false,"following_count":1,"discover_count":0},"author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://avatars.micro.blog/avatars/2025/35/1555731.jpg"},"items":[{"id":"90244868","content_html":"<p><a href=\"https://www.msn.com/en-gb/money/technology/huge-data-breach-as-major-travel-site-is-hacked-here-s-what-you-need-to-do-now/ar-AA20LhiT\">Huge data breach as major travel site is hacked - here’s what you need to do now</a></p>\n<p>The travel platform Booking.com has confirmed a data breach that exposed customer information, including names, emails, and booking details, to an unauthorized third party. The company has since updated reservation PINs and...</p> <a href=\"https://threatintel.cc/2026/05/15/huge-data-breach-as-major.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/15/huge-data-breach-as-major.html","date_published":"2026-05-15T17:43:37+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"17:43","date_timestamp":1778867017,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90244751","content_html":"<p><a href=\"https://mybroadband.co.za/news/security/647594-anc-hit-by-data-breach-2-million-private-member-records-exposed.html\">ANC hit by data breach: 2 million private member records exposed – MyBroadband</a></p>\n<p>The ANC hit by data breach article reports that the cybercriminal group Black X exposed 2 million records containing sensitive private member information online. This dataset, which surfaced in August 2025, includes details such...</p> <a href=\"https://threatintel.cc/2026/05/15/anc-hit-by-data-breach.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/15/anc-hit-by-data-breach.html","date_published":"2026-05-15T17:42:03+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"17:42","date_timestamp":1778866923,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90168416","content_html":"<p><a href=\"https://securityaffairs.com/191997/data-breach/identity-security-firm-sailpoint-discloses-github-repository-breach.html\">Identity security firm SailPoint discloses GitHub repository breach</a></p>\n<p>Identity security firm SailPoint disclosed a GitHub repository breach that occurred on April 20 due to a third-party application vulnerability. The company confirmed that no customer data or production environments were impacted by the...</p> <a href=\"https://threatintel.cc/2026/05/14/identity-security-firm-sailpoint-discloses.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/14/identity-security-firm-sailpoint-discloses.html","date_published":"2026-05-14T16:41:42+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-14 16:41","date_timestamp":1778776902,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90168419","content_html":"<p><a href=\"https://thehackernews.com/2026/05/teampcp-compromises-checkmarx-jenkins.html?m=1\">TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</a></p>\n<p>The cybercrime group TeamPCP compromised the Checkmarx Jenkins AST plugin by exploiting credentials obtained from a previous supply chain attack. Checkmarx has since released a patched version of the plugin to address the...</p> <a href=\"https://threatintel.cc/2026/05/14/teampcp-compromises-checkmarx-jenkins-ast.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/14/teampcp-compromises-checkmarx-jenkins-ast.html","date_published":"2026-05-14T16:40:59+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-14 16:40","date_timestamp":1778776859,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90168421","content_html":"<p><a href=\"https://hackread.com/chinatwill-typhoon-fake-apple-yahoo-sites-espionage/\">China-Linked Twill Typhoon Uses Fake Apple and Yahoo Sites for Espionage</a></p>\n<p>The China-linked group Twill Typhoon conducts espionage by utilizing fake Apple and Yahoo websites and the FDMTP malware framework to maintain long-term access to organizations. These attackers employ DLL sideloading and legitimate...</p> <a href=\"https://threatintel.cc/2026/05/14/chinalinked-twill-typhoon-uses-fake.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/14/chinalinked-twill-typhoon-uses-fake.html","date_published":"2026-05-14T16:38:31+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-14 16:38","date_timestamp":1778776711,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90168370","content_html":"<p><a href=\"https://m.economictimes.com/news/international/us/who-is-nitrogen-group-what-does-foxconn-do-and-what-data-was-hacked-ransomware-hackers-claim-breach-at-foxconn/articleshow/131087936.cms\">nitrogen group: Who is Nitrogen group, what does Foxconn do and what data was hacked? Ransomware hackers claim breach at Foxconn - The Economic Times</a></p>\n<p>The Nitrogen ransomware group has claimed responsibility for a cyberattack on Foxconn, asserting they exfiltrated over eight terabytes of data including...</p> <a href=\"https://threatintel.cc/2026/05/14/nitrogen-group-who-is-nitrogen.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/14/nitrogen-group-who-is-nitrogen.html","date_published":"2026-05-14T16:37:25+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-14 16:37","date_timestamp":1778776645,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90168110","content_html":"<p><a href=\"https://techcrunch.com/2026/05/13/ransomware-hackers-claim-breach-at-foxconn-a-major-electronics-manufacturer-for-apple-google-and-nvidia/\">Ransomware hackers claim breach at Foxconn, a major electronics manufacturer for Apple, Google, and Nvidia | TechCrunch</a></p>\n<p>The ransomware gang Nitrogen has claimed responsibility for a cyberattack on Foxconn, asserting they stole over 11 million files from the electronics giant. Foxconn confirmed the breach...</p> <a href=\"https://threatintel.cc/2026/05/14/ransomware-hackers-claim-breach-at.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/14/ransomware-hackers-claim-breach-at.html","date_published":"2026-05-14T16:35:18+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-14 16:35","date_timestamp":1778776518,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90168053","content_html":"<p><a href=\"https://www.pcmag.com/explainers/your-data-was-leaked-heres-what-hackers-hope-you-dont-do-next\">Your Data Was Leaked. Here’s What Hackers Hope You Don’t Do Next | PCMag</a></p>\n<p>Your Data Was Leaked. Here’s What Hackers Hope You Don’t Do Next is a guide on mitigating data breaches and identity theft by using unique, strong passwords managed by dedicated software. To protect yourself, you should proactively...</p> <a href=\"https://threatintel.cc/2026/05/14/your-data-was-leaked-heres.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/14/your-data-was-leaked-heres.html","date_published":"2026-05-14T16:33:49+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-14 16:33","date_timestamp":1778776429,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90038795","content_html":"<p><a href=\"https://www.macrumors.com/2026/05/11/ios-26-5-security-fixes/\">Apple’s iOS 26.5 Update Patches More Than 50 Security Flaws - MacRumors</a></p>\n<p>Apple’s iOS 26.5 and iPadOS 26.5 updates resolve over 50 security vulnerabilities, including issues related to WebKit, kernel performance, and system applications. Users are encouraged to install these patches promptly to protect their...</p> <a href=\"https://threatintel.cc/2026/05/12/apples-ios-update-patches-more.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/12/apples-ios-update-patches-more.html","date_published":"2026-05-12T20:54:03+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-12 20:54","date_timestamp":1778619243,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"90019940","content_html":"<p><a href=\"https://thehackernews.com/2026/05/instructure-reaches-ransom-agreement.html\">Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak</a></p>\n<p>Instructure, the parent company of Canvas, has reached an agreement with the ShinyHunters extortion group to prevent the leak of 3.65TB of stolen data, which impacted nearly 9,000 organizations. The company paid a ransom,...</p> <a href=\"https://threatintel.cc/2026/05/12/instructure-reaches-ransom-agreement-with.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/12/instructure-reaches-ransom-agreement-with.html","date_published":"2026-05-12T16:38:03+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-12 16:38","date_timestamp":1778603883,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89936764","content_html":"<p><a href=\"https://www.abc.net.au/news/2026-05-11/tas-universities-regain-access-to-canvas-hacker-deadline/106666744\">Deadline set by cybercriminal group looms as some institutions regain Canvas access - ABC News</a></p>\n<p>Some Australian universities and education departments are regaining access to the Canvas learning platform after a global outage caused by the ShinyHunters hacking group, who have set a deadline of Tuesday to...</p> <a href=\"https://threatintel.cc/2026/05/11/deadline-set-by-cybercriminal-group.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/11/deadline-set-by-cybercriminal-group.html","date_published":"2026-05-11T19:06:25+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-11 19:06","date_timestamp":1778526385,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89922039","content_html":"<p><a href=\"https://om.co/2026/05/04/say-hello-to-the-internet-of-ai/\">Say Hello to the Internet of AI – On my Om</a></p>\n<p>The “Internet of AI” is an emerging network architecture optimized for artificial intelligence, characterized by a shift in traffic patterns within data centers from north-south to east-west, and significant hyperscaler investment in private fiber networks and...</p> <a href=\"https://threatintel.cc/2026/05/11/say-hello-to-the-internet.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/11/say-hello-to-the-internet.html","date_published":"2026-05-11T13:01:36+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-11 13:01","date_timestamp":1778504496,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89893446","content_html":"<p><a href=\"https://heavy.com/sports/pro-wrestling/wwe-star-no-suspension-viral-leak/\">WWE Star Will Not be Suspended For Lewd Photo Leaks</a></p>\n<p>Despite a lewd photo leak of explicit images and videos shared online without her consent, WWE star Jordynne Grace will not be suspended. The private images were illegally leaked by hackers and were not from her OnlyFans account, leading WWE to not penalize...</p> <a href=\"https://threatintel.cc/2026/05/10/wwe-star-will-not-be.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/10/wwe-star-will-not-be.html","date_published":"2026-05-10T18:09:47+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-10 18:09","date_timestamp":1778436587,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89815264","content_html":"<p><a href=\"https://cybersecuritynews.com/hackers-leverage-hugging-face-and-clawhub/\">Hackers Leveraged Hugging Face and ClawHub With 575+ Malicious Skills to Deploy Malware</a></p>\n<p>Hackers are exploiting Hugging Face and ClawHub, popular AI platforms, to distribute malware like trojans, cryptominers, and infostealers by disguising them as legitimate AI tools and agent extensions. This campaign...</p> <a href=\"https://threatintel.cc/2026/05/08/hackers-leveraged-hugging-face-and.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/hackers-leveraged-hugging-face-and.html","date_published":"2026-05-08T16:43:45+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:43","date_timestamp":1778258625,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89815194","content_html":"<p><a href=\"https://securityaffairs.com/191859/cyber-crime/zara-data-breach-197000-customers-exposed-in-third-party-security-incident.html\">Zara Data Breach: 197,000 Customers Exposed in Third-Party Security Incident</a></p>\n<p>A third-party security incident involving a former technology provider exposed the data of nearly 197,000 Zara customers, including emails and purchase history. The ShinyHunters extortion group claimed responsibility for the breach,...</p> <a href=\"https://threatintel.cc/2026/05/08/zara-data-breach-customers-exposed.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/zara-data-breach-customers-exposed.html","date_published":"2026-05-08T16:41:36+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:41","date_timestamp":1778258496,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89815148","content_html":"<p><a href=\"https://cybersecuritynews.com/new-zichatbot-malware-uses-zulip-rest-apis/\">New ZiChatBot Malware Uses Zulip REST APIs as Command and Control Server</a></p>\n<p>A new malware named ZiChatBot is exploiting Zulip’s REST APIs for its command and control server, making it harder to detect. This malware was distributed through malicious Python packages on PyPI and targets both Windows and Linux...</p> <a href=\"https://threatintel.cc/2026/05/08/new-zichatbot-malware-uses-zulip.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/new-zichatbot-malware-uses-zulip.html","date_published":"2026-05-08T16:40:33+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:40","date_timestamp":1778258433,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89815080","content_html":"<p><a href=\"https://www.cybersecuritydive.com/news/anthropics-claude-compromise-mexican-water-utility/819710/\">Anthropic’s Claude used in attempted compromise of Mexican water utility | Cybersecurity Dive</a></p>\n<p>An unknown threat group abused Anthropic’s Claude AI to aid in a sophisticated takeover attempt against a Mexican water utility, highlighting how AI tools can empower untrained actors. The incident, part of a larger...</p> <a href=\"https://threatintel.cc/2026/05/08/anthropics-claude-used-in-attempted.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/anthropics-claude-used-in-attempted.html","date_published":"2026-05-08T16:39:06+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:39","date_timestamp":1778258346,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89815039","content_html":"<p><a href=\"https://github.com/thechosenone-shall-prevail/cold-relay\">GitHub - thechosenone-shall-prevail/cold-relay: Cold Relay is a single-binary Active Directory security assessment tool that collects Windows authentication evidence across LDAP, Kerberos, SMB, DNS, GPO, delegation, certificate services, and more turning evidence into deterministic findings with an offline...</a></p> <a href=\"https://threatintel.cc/2026/05/08/123800.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/123800.html","date_published":"2026-05-08T16:38:00+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:38","date_timestamp":1778258280,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89814980","content_html":"<p><a href=\"https://www.theregister.com/security/2026/05/07/60-of-md5-password-hashes-are-crackable-in-under-an-hour/5234954\">60% of MD5 password hashes are crackable in under an hour</a></p>\n<p>A recent study found that 60% of MD5 password hashes can be cracked in under an hour using a single GPU, with 48% cracked in under a minute, highlighting the vulnerability of passwords protected only by fast hashing algorithms. Experts emphasize that...</p> <a href=\"https://threatintel.cc/2026/05/08/of-md-password-hashes-are.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/of-md-password-hashes-are.html","date_published":"2026-05-08T16:36:18+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:36","date_timestamp":1778258178,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89814940","content_html":"<p><a href=\"https://www.404media.co/the-biggest-student-data-privacy-disaster-in-history-canvas-hack-shows-the-danger-of-centralized-edtech/\">‘The Biggest Student Data Privacy Disaster in History’: Canvas Hack Shows the Danger of Centralized EdTech</a></p>\n<p>A Canvas hack by ransomware group ShinyHunters has resulted in the theft of billions of messages and the data of over 275 million individuals, including student names, email addresses, and student ID...</p> <a href=\"https://threatintel.cc/2026/05/08/the-biggest-student-data-privacy.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/the-biggest-student-data-privacy.html","date_published":"2026-05-08T16:35:28+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:35","date_timestamp":1778258128,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89814879","content_html":"<p><a href=\"https://www.somersetrecon.com/blog/2026/4/27/quacc-automated-open-source-vulnerability-discovery\">Quacc++ | Open Source Vulnerability Research Tool Powered by Semgrep &amp; Grep.app — Somerset Recon</a></p>\n<p>Quacc++ is an automated bug hunting tool that combines grep.app for searching public GitHub repositories with Semgrep for static code analysis to discover vulnerabilities. It scans repositories for specific...</p> <a href=\"https://threatintel.cc/2026/05/08/quacc-open-source-vulnerability-research.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/quacc-open-source-vulnerability-research.html","date_published":"2026-05-08T16:34:03+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:34","date_timestamp":1778258043,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89814790","content_html":"<p><a href=\"https://www.bleepingcomputer.com/news/security/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users/\">NVIDIA confirms GeForce NOW data breach affecting Armenian users</a></p>\n<p>NVIDIA has confirmed a data breach affecting GeForce NOW users, specifically impacting those in Armenia. The breach was caused by a compromise of infrastructure operated by a regional partner, GFN.am, and did not affect NVIDIA’s own networks....</p> <a href=\"https://threatintel.cc/2026/05/08/nvidia-confirms-geforce-now-data.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/nvidia-confirms-geforce-now-data.html","date_published":"2026-05-08T16:31:34+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:31","date_timestamp":1778257894,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89814698","content_html":"<p><a href=\"https://www.cbc.ca/news/canada/toronto/ontario-universities-canvas-breach-9.7192287\">U of T, OCAD among Ontario universities impacted by Canvas cyber breach | CBC News</a></p>\n<p>Thousands of schools, including University of Toronto and OCAD University, were impacted by a cybersecurity incident involving the Canvas learning software. While names, emails, and student numbers may have been affected,...</p> <a href=\"https://threatintel.cc/2026/05/08/u-of-t-ocad-among.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/08/u-of-t-ocad-among.html","date_published":"2026-05-08T16:29:21+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-08 16:29","date_timestamp":1778257761,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89785164","content_html":"<p>[Hackers hack victims hacked by other hackers</p>\n<p>| TechCrunch](<a href=\"https://techcrunch.com/2026/05/07/hackers-hack-victims-hacked-by-other-hackers/\">https://techcrunch.com/2026/05/07/hackers-hack-victims-hacked-by-other-hackers/</a>)</p>\n","summary":"","url":"https://threatintel.cc/2026/05/07/hackers-hack-victims-hacked-by.html","date_published":"2026-05-07T23:00:55+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-07 23:00","date_timestamp":1778194855,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"89778226","content_html":"<p><a href=\"https://blocknow.com/coinbase-stock-layoffs-700-jobs-ai-restructuring-2026/\">Coinbase Cuts 700 Jobs Before Q1 Earnings in AI Pivot</a></p>\n<p>Coinbase is cutting 700 employees, or 14% of its workforce, as CEO Brian Armstrong pivots the company towards AI and leaner management structures, citing cost reductions and weak market conditions. This move occurs just before the company’s Q1 earnings...</p> <a href=\"https://threatintel.cc/2026/05/07/coinbase-cuts-jobs-before-q.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/05/07/coinbase-cuts-jobs-before-q.html","date_published":"2026-05-07T19:22:00+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-05-07 19:22","date_timestamp":1778181720,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"74890839","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/Walker@infosec.exchange\" class=\"u-url mention\">@Walker</a></span> I agree burnout is a real problem in infosec teams. I know many CISOs that left cyber and became CIOs. They said it is much easier</p>\n","url":"https://micro.blog/ekiledjian/74890839","date_published":"2025-10-02T23:55:35+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2025-10-02 23:55","date_timestamp":1759449335,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"61673138","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/nicholasdomanico@infosec.exchange\" class=\"u-url mention\">@nicholasdomanico</a></span> you’re probably not wrong</p>\n","url":"https://micro.blog/ekiledjian/61673138","date_published":"2025-04-07T13:51:42+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2025-04-07 13:51","date_timestamp":1744033902,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"53083222","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/PJ_Evans@mas.to\" class=\"u-url mention\">@PJ<span>_</span>Evans</a></span> I am not sure it is the selling sofware they are targeting. Think of what this would do to global piracy?</p>\n","url":"https://micro.blog/ekiledjian/53083222","date_published":"2024-12-23T19:23:19+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2024-12-23 19:23","date_timestamp":1734981799,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}}]}