{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Edward Kiledjian","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/ekiledjian","_microblog":{"about":"https://micro.blog/about/api","id":"1555731","username":"ekiledjian","bio":"Since 2016, I've served as the Global CISO and SVP for Cybersecurity, Privacy, Compliance, and Resilience at OpenText—navigating and securing the company through a period of extraordinary growth. In just eight years, OpenText's revenue has surged over 3x and our workforce has expanded from 8,900 to nearly 23,000 across 40+ countries. I've had the privilege of building the cybersecurity and privacy foundation that scaled with this transformation, enabling business expansion while strengthening resilience and trust.\n\nMy leadership focus is simple: align security with strategy. I design and operate programs that go beyond defence—driving compliance as a business enabler, embedding risk into decision-making, and delivering measurable outcomes. From cloud transformation and zero trust to quantum readiness and global regulatory alignment (FedRAMP, ISO, SOC, DORA), my teams deliver security that protects, scales, and differentiates.\n\nI'm a builder—of secure systems, diverse global teams, and forward-looking capabilities. Whether briefing the board, supporting complex sales, or mentoring the next generation of security leaders, I lead with clarity, accountability, and purpose. I believe great security doesn't slow you down—it powers what's next.\n\nContact: [TheBlog@privateidentity.online](mailto:TheBlog@privateidentity.online)","pronouns":"","is_following":false,"is_you":false,"following_count":1,"discover_count":0},"author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://avatars.micro.blog/avatars/2025/35/1555731.jpg"},"items":[{"id":"87428917","content_html":"<p><a href=\"https://www.cyberdaily.au/security/13412-exclusive-cuddly-toy-maker-charlie-bears-allegedly-hacked\">Exclusive: Cuddly toy maker Charlie Bears allegedly hacked - Cyber Daily</a></p>\n<p>The LockBit ransomware operation has allegedly hacked Charlie Bears, a popular cuddly toy maker, listing the company as a victim on its darknet leak site. The leaked data includes employee information, training documents, inventories,...</p> <a href=\"https://threatintel.cc/2026/04/01/exclusive-cuddly-toy-maker-charlie.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/01/exclusive-cuddly-toy-maker-charlie.html","date_published":"2026-04-01T23:07:19+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-01 23:07","date_timestamp":1775084839,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87428866","content_html":"<p><a href=\"https://securityaffairs.com/190221/security/attackers-hijack-axios-npm-account-to-spread-rat-malware.html\">Attackers hijack Axios npm account to spread RAT malware</a></p>\n<p>Attackers hijacked the Axios npm account to distribute RAT malware by publishing malicious package updates. Developers who installed compromised versions (1.14.1 and 0.30.4) should assume their systems are compromised, as the malware targets Linux,...</p> <a href=\"https://threatintel.cc/2026/04/01/attackers-hijack-axios-npm-account.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/01/attackers-hijack-axios-npm-account.html","date_published":"2026-04-01T23:06:34+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-01 23:06","date_timestamp":1775084794,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87428840","content_html":"<p><a href=\"https://www.france24.com/en/no-iranian-hackers-didn-t-leak-a-video-of-the-fbi-s-kash-patel-dancing\">No, Iranian hackers didn’t leak a video of the FBI’s Kash Patel dancing - Truth or Fake - France 24</a></p>\n<p>The Truth or Fake show debunks a viral Bollywood dance video falsely linked to a hack of FBI Director Kash Patel’s emails by an Iranian-linked group. The video, unrelated to Patel, has been circulating online...</p> <a href=\"https://threatintel.cc/2026/04/01/no-iranian-hackers-didnt-leak.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/01/no-iranian-hackers-didnt-leak.html","date_published":"2026-04-01T23:05:50+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-01 23:05","date_timestamp":1775084750,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87428798","content_html":"<p><a href=\"https://techcrunch.com/2026/03/31/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/\">Mercor says it was hit by cyberattack tied to compromise of open source LiteLLM project | TechCrunch</a></p>\n<p>AI recruiting startup Mercor has confirmed a cyberattack linked to a compromise of the open source project LiteLLM, potentially affecting thousands of companies. The extortion hacking group Lapsus$ has...</p> <a href=\"https://threatintel.cc/2026/04/01/mercor-says-it-was-hit.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/01/mercor-says-it-was-hit.html","date_published":"2026-04-01T23:05:04+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-01 23:05","date_timestamp":1775084704,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87356646","content_html":"<p>Why Gas Prices Drop in the Evening: <a href=\"https://kiledjian.com/2026/03/31/why-gas-prices-drop-in.html\">kiledjian.com</a></p>","summary":"If you live in Ontario, you have likely noticed it: the price at your local station in the morning looks one way, and by the time you drive past after work, it is often several cents per litre lower. It is not a promotion, not a glitch and not your imagination. In competitive Ontario markets, it is ...","url":"https://kiledjian.com/2026/03/31/why-gas-prices-drop-in.html","date_published":"2026-03-31T23:13:49+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-31 23:13","date_timestamp":1774998829,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"87175556","content_html":"<p><a href=\"https://www.iphoneincanada.ca/2026/03/28/rogers-and-fido-confirm-data-breach-affecting-customer-information/\">Rogers and Fido Confirm Data Breach Affecting Customer Information | iPhone in Canada</a></p>\n<p>Rogers and Fido have confirmed a data breach that resulted in unauthorized access to customer information, including names, contact details, and account numbers. The companies stated that more sensitive data like social...</p> <a href=\"https://threatintel.cc/2026/03/28/rogers-and-fido-confirm-data.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/28/rogers-and-fido-confirm-data.html","date_published":"2026-03-29T03:36:19+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-29 03:36","date_timestamp":1774755379,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87105833","content_html":"<p><a href=\"https://www.cybersecurity-insiders.com/apt-iran-hackers-steal-over-375tb-of-data-from-lockheed-martine/\">APT Iran hackers steal over 375TB of data from Lockheed Martine - Cybersecurity Insiders</a></p>\n<p>Hackers, identified as APT Iran, have reportedly stolen over 375TB of data from Lockheed Martin, a major US defense and aerospace firm. The attackers are allegedly demanding around $400 million to $600 million for the...</p> <a href=\"https://threatintel.cc/2026/03/27/apt-iran-hackers-steal-over.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/27/apt-iran-hackers-steal-over.html","date_published":"2026-03-27T21:49:30+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-27 21:49","date_timestamp":1774648170,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87074326","content_html":"<p><a href=\"https://github.com/backbay-labs/thrunt-god\">GitHub - backbay-labs/thrunt-god: Threat hunting command system for agentic IDEs · GitHub</a></p>\n<p>The thrunt-god GitHub repository introduces a threat hunting command system designed for agentic IDEs, facilitating a five-phase process: Signal, Hunt, Swarm, Receipt, and Publish. It offers commands for managing hunts,...</p> <a href=\"https://threatintel.cc/2026/03/27/github-backbaylabsthruntgod-threat-hunting-command.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/27/github-backbaylabsthruntgod-threat-hunting-command.html","date_published":"2026-03-27T13:30:26+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-27 13:30","date_timestamp":1774618226,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87074259","content_html":"<p><a href=\"https://unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org/\">Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government</a></p>\n<p>Unit 42 researchers have uncovered a cyberespionage campaign targeting a Southeast Asian government, involving three distinct threat clusters: Stately Taurus, CL-STA-1048, and CL-STA-1049. These clusters utilize various...</p> <a href=\"https://threatintel.cc/2026/03/27/converging-interests-analysis-of-threat.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/27/converging-interests-analysis-of-threat.html","date_published":"2026-03-27T13:29:20+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-27 13:29","date_timestamp":1774618160,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87072276","content_html":"<p><a href=\"https://siliconangle.com/2026/03/26/wikipedia-cracks-contributors-using-ai-generate-content/\">Wikipedia cracks down on contributors using AI to generate content - SiliconANGLE</a></p>\n<p>Wikipedia has updated its policies to prohibit contributors from using AI to generate or rewrite content, citing concerns about verifiable sources and core content policies. While limited use for tasks like typo correction and...</p> <a href=\"https://threatintel.cc/2026/03/27/wikipedia-cracks-down-on-contributors.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/27/wikipedia-cracks-down-on-contributors.html","date_published":"2026-03-27T12:40:37+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-27 12:40","date_timestamp":1774615237,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87072278","content_html":"<p><a href=\"https://www.govinfosecurity.com/breach-roundup-tycoon2fa-phishing-platform-rebounds-a-31220\">Breach Roundup: Tycoon2FA Phishing Platform Rebounds</a></p>\n<p>The Tycoon2FA phishing platform has quickly resumed operations after a law enforcement takedown, while Trio-Tech International faces a material breach after ransomware data exposure. The FBI and CISA warn of Russian phishing campaigns targeting messaging...</p> <a href=\"https://threatintel.cc/2026/03/27/breach-roundup-tycoonfa-phishing-platform.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/27/breach-roundup-tycoonfa-phishing-platform.html","date_published":"2026-03-27T12:40:02+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-27 12:40","date_timestamp":1774615202,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87072280","content_html":"<p><a href=\"https://siliconangle.com/2026/03/26/google-cohere-launch-new-audio-models/\">Google, Cohere launch new audio AI models - SiliconANGLE</a></p>\n<p>Google and Cohere have launched new AI models for audio processing. Google’s Gemini 3.1 Flash Live can automate customer service and understand multimodal input, while Cohere’s Cohere Transcribe offers highly accurate speech-to-text capabilities in...</p> <a href=\"https://threatintel.cc/2026/03/27/google-cohere-launch-new-audio.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/27/google-cohere-launch-new-audio.html","date_published":"2026-03-27T12:38:57+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-27 12:38","date_timestamp":1774615137,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87030766","content_html":"<p><a href=\"https://cybernews.com/security/zenbusiness-shinyhunters-data-breach-mark-cuban/\">Hackers threaten Mark Cuban-backed firm with major data leak​ | Cybernews</a></p>\n<p>The ShinyHunters group has threatened to release several terabytes of data stolen from ZenBusiness, an online LLC formation platform, unless a ransom is paid. The breach, which may include customer and employee information, could put...</p> <a href=\"https://threatintel.cc/2026/03/26/hackers-threaten-mark-cubanbacked-firm.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/hackers-threaten-mark-cubanbacked-firm.html","date_published":"2026-03-26T20:45:02+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 20:45","date_timestamp":1774557902,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87030708","content_html":"<p><a href=\"https://www.techradar.com/pro/security/ajax-suffers-major-own-goal-as-data-breach-hits-personal-info-of-300-000-fans\">Ajax suffers major own goal as data breach hits personal info of 300,000 fans | TechRadar</a></p>\n<p>Ajax football club experienced a significant data breach affecting the personal information of 300,000 fans, exposed through a vulnerability in their app. An ethical hacker demonstrated that this flaw allowed...</p> <a href=\"https://threatintel.cc/2026/03/26/ajax-suffers-major-own-goal.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/ajax-suffers-major-own-goal.html","date_published":"2026-03-26T20:43:08+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 20:43","date_timestamp":1774557788,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87030636","content_html":"<p><a href=\"https://voennoedelo.com/en/posts/id14405-cyber-serp-hack-breaches-ukraine-state-encryption-system\">Cyber Serp Hack Breaches Ukraine State Encryption System</a></p>\n<p>The hacking group Cyber Serp claims to have breached Ukraine’s state encryption system, allegedly accessing encryption keys, source code, and digital signature registries. This system, developed by Saifer, is used by government agencies, banks, and...</p> <a href=\"https://threatintel.cc/2026/03/26/cyber-serp-hack-breaches-ukraine.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/cyber-serp-hack-breaches-ukraine.html","date_published":"2026-03-26T20:42:22+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 20:42","date_timestamp":1774557742,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87030585","content_html":"<p><a href=\"https://www.techradar.com/pro/security/11-million-students-possibly-at-risk-after-classroom-software-used-by-millions-hacked\">11 million students possibly at risk after classroom software used by millions hacked | TechRadar</a></p>\n<p>The student information system Infinite Campus was hacked by the ShinyHunters group, resulting in the theft of names and staff contact information of school personnel. While customer data was unaffected, the...</p> <a href=\"https://threatintel.cc/2026/03/26/million-students-possibly-at-risk.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/million-students-possibly-at-risk.html","date_published":"2026-03-26T20:41:24+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 20:41","date_timestamp":1774557684,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87030586","content_html":"<p><a href=\"https://securityaffairs.com/189994/cyber-crime/russian-authorities-arrest-alleged-leakbase-admin-behind-stolen-data-marketplace.html\">Russian authorities arrest alleged LeakBase admin behind stolen data marketplace</a></p>\n<p>Russian authorities have arrested a Taganrog resident suspected of administering LeakBase, a major stolen data marketplace operating since 2021. This arrest is part of a broader international operation, Operation Leak,...</p> <a href=\"https://threatintel.cc/2026/03/26/russian-authorities-arrest-alleged-leakbase.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/russian-authorities-arrest-alleged-leakbase.html","date_published":"2026-03-26T20:40:13+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 20:40","date_timestamp":1774557613,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87025761","content_html":"<p><a href=\"https://blog.talosintelligence.com/tp-link-canva-hikvision-vulnerabilities/\">TP-Link, Canva, HikVision vulnerabilities</a></p>\n<p>Cisco Talos has disclosed 19 vulnerabilities in Canva Affinity related to EMF file processing, 10 vulnerabilities in TP-Link routers including buffer overflows and credential leaks, and a stack-based buffer overflow vulnerability in HikVision face recognition...</p> <a href=\"https://threatintel.cc/2026/03/26/tplink-canva-hikvision-vulnerabilities-cisco.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/tplink-canva-hikvision-vulnerabilities-cisco.html","date_published":"2026-03-26T19:26:09+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 19:26","date_timestamp":1774553169,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87025710","content_html":"<p><a href=\"https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/\">CISA: New Langflow flaw actively exploited to hijack AI workflows</a></p>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) is warning of active exploitation of a critical vulnerability (CVE-2026-33017) in the Langflow framework, which allows for remote code execution and hijacking of AI workflows. Hackers...</p> <a href=\"https://threatintel.cc/2026/03/26/cisa-new-langflow-flaw-actively.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/cisa-new-langflow-flaw-actively.html","date_published":"2026-03-26T19:24:54+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 19:24","date_timestamp":1774553094,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87025576","content_html":"<p><a href=\"https://www.govinfosecurity.com/vector-databases-put-enterprise-ai-data-at-risk-a-31203\">Why Vector Databases Put Enterprise AI Data at Risk</a></p>\n<p>The article “Why Vector Databases Put Enterprise AI Data at Risk” highlights that vector databases, while consolidating enterprise AI data, create a significant security risk by concentrating sensitive information into a single point. Nicolas Dupont, CEO of...</p> <a href=\"https://threatintel.cc/2026/03/26/why-vector-databases-put-enterprise.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/why-vector-databases-put-enterprise.html","date_published":"2026-03-26T19:23:21+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 19:23","date_timestamp":1774553001,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87025566","content_html":"<p><a href=\"https://www.scmp.com/tech/article/3347580/chinas-dji-sues-rival-insta360-alleged-patent-infringement-ahead-new-drone-launch\">China’s DJI sues rival Insta360 for alleged patent infringement ahead of new drone launch | South China Morning Post</a></p>\n<p>Chinese drone giant DJI has sued its rival Insta360 for alleged patent infringement, claiming some patents involve inventions by former employees. Insta360 disputes this, stating the...</p> <a href=\"https://threatintel.cc/2026/03/26/chinas-dji-sues-rival-insta.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/26/chinas-dji-sues-rival-insta.html","date_published":"2026-03-26T19:21:29+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-26 19:21","date_timestamp":1774552889,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86879615","content_html":"<p><a href=\"https://www.ookla.com/articles/apple-iphone-air-c1x-modem-q4-2025\">The Air Apparent: Apple’s Custom Silicon Comes of Age | Ookla®</a></p>\n<p>The iPhone Air with its new C1X modem achieves download parity with Qualcomm’s X80 and excels in latency, positioning Apple’s custom silicon as a competitive force. While strong in design-conscious markets, the iPhone Air’s adoption varies...</p> <a href=\"https://threatintel.cc/2026/03/24/the-air-apparent-apples-custom.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/24/the-air-apparent-apples-custom.html","date_published":"2026-03-24T19:32:15+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-24 19:32","date_timestamp":1774380735,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86850548","content_html":"<blockquote>\n<p>Iran Hits Amazon Web Services Building In Bahrain, Triggers Power Disruption &amp; Structural Damages</p>\n</blockquote>\n<p>Amazon Web Services' Bahrain data centre experienced disruptions and structural damage due to drone activity, raising concerns about the vulnerability of digital infrastructure to physical conflict. This incident follows a similar strike on an AWS facility in the UAE earlier this month, which caused widespread outages affecting numerous services and businesses.</p>\n","summary":"","url":"https://threatintel.cc/2026/03/24/iran-hits-amazon-web-services.html","date_published":"2026-03-24T11:57:04+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-24 11:57","date_timestamp":1774353424,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86849513","content_html":"<p>Personas in AI, friend or foe? <a href=\"https://kiledjian.com/2026/03/24/personas-in-ai-friend-or.html\">kiledjian.com</a></p>","summary":"","url":"https://kiledjian.com/2026/03/24/personas-in-ai-friend-or.html","date_published":"2026-03-24T11:29:00+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-24 11:29","date_timestamp":1774351740,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":["https://infosec.exchange/@edwardk/116283925609139768","https://bsky.app/profile/did:plc:beyhoumfysldffkbyo2fnn3c/post/3mhshz7h3mz2i"]}},{"id":"86847497","content_html":"<p><a href=\"https://www.reuters.com/technology/openai-plans-desktop-superapp-simplify-user-experience-wsj-reports-2026-03-19/\">OpenAI plans desktop ‘superapp’ to streamline user experience | Reuters</a></p>\n<p>OpenAI is planning a desktop “superapp” that will combine its ChatGPT app, coding platform Codex, and browser to simplify user experience and streamline efforts. This move aims to consolidate resources and improve quality as the company...</p> <a href=\"https://threatintel.cc/2026/03/24/openai-plans-desktop-superapp-to.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/03/24/openai-plans-desktop-superapp-to.html","date_published":"2026-03-24T10:42:15+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-03-24 10:42","date_timestamp":1774348935,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"74890839","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/Walker@infosec.exchange\" class=\"u-url mention\">@Walker</a></span> I agree burnout is a real problem in infosec teams. I know many CISOs that left cyber and became CIOs. They said it is much easier</p>\n","url":"https://micro.blog/ekiledjian/74890839","date_published":"2025-10-02T23:55:35+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2025-10-02 23:55","date_timestamp":1759449335,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"61673138","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/nicholasdomanico@infosec.exchange\" class=\"u-url mention\">@nicholasdomanico</a></span> you’re probably not wrong</p>\n","url":"https://micro.blog/ekiledjian/61673138","date_published":"2025-04-07T13:51:42+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2025-04-07 13:51","date_timestamp":1744033902,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"53083222","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/PJ_Evans@mas.to\" class=\"u-url mention\">@PJ<span>_</span>Evans</a></span> I am not sure it is the selling sofware they are targeting. Think of what this would do to global piracy?</p>\n","url":"https://micro.blog/ekiledjian/53083222","date_published":"2024-12-23T19:23:19+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2024-12-23 19:23","date_timestamp":1734981799,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}}]}