{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Edward Kiledjian","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/ekiledjian","_microblog":{"about":"https://micro.blog/about/api","id":"1555731","username":"ekiledjian","bio":"Since 2016, I've served as the Global CISO and SVP for Cybersecurity, Privacy, Compliance, and Resilience at OpenText—navigating and securing the company through a period of extraordinary growth. In just eight years, OpenText's revenue has surged over 3x and our workforce has expanded from 8,900 to nearly 23,000 across 40+ countries. I've had the privilege of building the cybersecurity and privacy foundation that scaled with this transformation, enabling business expansion while strengthening resilience and trust.\n\nMy leadership focus is simple: align security with strategy. I design and operate programs that go beyond defence—driving compliance as a business enabler, embedding risk into decision-making, and delivering measurable outcomes. From cloud transformation and zero trust to quantum readiness and global regulatory alignment (FedRAMP, ISO, SOC, DORA), my teams deliver security that protects, scales, and differentiates.\n\nI'm a builder—of secure systems, diverse global teams, and forward-looking capabilities. Whether briefing the board, supporting complex sales, or mentoring the next generation of security leaders, I lead with clarity, accountability, and purpose. I believe great security doesn't slow you down—it powers what's next.\n\nContact: [TheBlog@privateidentity.online](mailto:TheBlog@privateidentity.online)","pronouns":"","is_following":false,"is_you":false,"following_count":1,"discover_count":0},"author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://avatars.micro.blog/avatars/2025/35/1555731.jpg"},"items":[{"id":"88994190","content_html":"<p><a href=\"https://nationalpost.com/news/canada/toronto-police-seize-sms-blasters-cybercrime-canada\">Toronto police seize ‘SMS blasters,’ a new cybercrime weapon in Canada | National Post</a></p>\n<p>Toronto police have arrested three men and seized SMS blasters, a new type of cybercrime weapon not previously seen in Canada. These devices mimic legitimate cell towers to send fraudulent text messages, leading to...</p> <a href=\"https://threatintel.cc/2026/04/25/toronto-police-seize-sms-blasters.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/25/toronto-police-seize-sms-blasters.html","date_published":"2026-04-25T17:46:58+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"17:46","date_timestamp":1777139218,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88955733","content_html":"<p><a href=\"https://fortune.com/2026/04/23/anthropic-mythos-leak-dario-amodei-ceo-cybersecurity-hackers-exploits-ai/\">A group of users leaked Anthropic’s AI model Mythos by reportedly guessing where it was located | Fortune</a></p>\n<p>The AI model Mythos, developed by Anthropic and considered too dangerous to release widely, was reportedly leaked by users who guessed its location, raising cybersecurity concerns. This incident...</p> <a href=\"https://threatintel.cc/2026/04/24/a-group-of-users-leaked.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/24/a-group-of-users-leaked.html","date_published":"2026-04-24T20:54:39+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-24 20:54","date_timestamp":1777064079,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88941791","content_html":"<p><a href=\"https://cybersecuritynews.com/udemy-data-breach/\">Udemy Data Breach - ShinyHunters Claims Compromise of 1.4M User Records</a></p>\n<p>The cybercriminal group ShinyHunters claims to have breached Udemy, compromising over 1.4 million user records containing PII and internal data. The group has given Udemy a deadline to respond before publicly releasing the stolen...</p> <a href=\"https://threatintel.cc/2026/04/24/131111.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/24/131111.html","date_published":"2026-04-24T17:11:11+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-24 17:11","date_timestamp":1777050671,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88941792","content_html":"<p><a href=\"https://cybersecuritynews.com/udemy-data-breach/\">Udemy Data Breach - ShinyHunters Claims Compromise of 1.4M User Records</a></p>\n<p>The cybercriminal group ShinyHunters claims to have breached Udemy, compromising over 1.4 million user records containing PII and internal data. The group has given Udemy a deadline to respond before publicly releasing the stolen...</p> <a href=\"https://threatintel.cc/2026/04/24/udemy-data-breach-shinyhunters-claims.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/24/udemy-data-breach-shinyhunters-claims.html","date_published":"2026-04-24T17:11:04+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-24 17:11","date_timestamp":1777050664,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88941650","content_html":"<p><a href=\"https://hackread.com/french-police-arrest-hexdex-hacker-data-leak-leaks/\">French Police Arrest HexDex Hacker Over Mass Data Theft and Leaks</a></p>\n<p>French police have arrested a 20-year-old hacker known as HexDex for allegedly mass data theft and leaks targeting sports organizations, government entities, and private companies. The investigation, which began in late 2025, led to the...</p> <a href=\"https://threatintel.cc/2026/04/24/french-police-arrest-hexdex-hacker.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/24/french-police-arrest-hexdex-hacker.html","date_published":"2026-04-24T17:09:04+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-24 17:09","date_timestamp":1777050544,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88875802","content_html":"<p><a href=\"https://www.itpro.com/business/business-strategy/the-first-hurdle-is-the-hardest-in-generative-ai-adoption-and-businesses-keep-falling\">The first hurdle is the hardest in generative AI adoption – and businesses keep falling | IT Pro</a></p>\n<p>Despite rapid AI adoption, many businesses struggle with implementation, falling into “pilot purgatory” due to issues like skills gaps, legacy systems, and a lack of advanced use cases. While employees report...</p> <a href=\"https://kiledjian.com/2026/04/23/the-first-hurdle-is-the.html\">kiledjian.com</a>","summary":"","url":"https://kiledjian.com/2026/04/23/the-first-hurdle-is-the.html","date_published":"2026-04-23T19:24:08+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:24","date_timestamp":1776972248,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":["https://infosec.exchange/@edwardk/116455660872374415","https://bsky.app/profile/did:plc:beyhoumfysldffkbyo2fnn3c/post/3mk6qjjpwa52a"]}},{"id":"88875539","content_html":"<p><a href=\"https://cybersecuritynews.com/ai-assisted-lazarus-campaign-targets/\">AI-Assisted Lazarus Campaign Targets Developers With Backdoored Coding Challenges</a></p>\n<p>The Lazarus Group, a North Korean state-sponsored threat actor, is employing an AI-assisted campaign to target software developers with backdoored coding challenges, aiming to steal cryptocurrency and NFTs. This sophisticated...</p> <a href=\"https://threatintel.cc/2026/04/23/152249.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/152249.html","date_published":"2026-04-23T19:22:49+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:22","date_timestamp":1776972169,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88875540","content_html":"<p><a href=\"https://cybersecuritynews.com/ai-assisted-lazarus-campaign-targets/\">AI-Assisted Lazarus Campaign Targets Developers With Backdoored Coding Challenges</a></p>\n<p>The Lazarus Group, a North Korean state-sponsored threat actor, is employing an AI-assisted campaign to target software developers with backdoored coding challenges, aiming to steal cryptocurrency and NFTs. This sophisticated...</p> <a href=\"https://threatintel.cc/2026/04/23/aiassisted-lazarus-campaign-targets-developers.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/aiassisted-lazarus-campaign-targets-developers.html","date_published":"2026-04-23T19:22:14+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:22","date_timestamp":1776972134,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88875390","content_html":"<p><a href=\"https://therecord.media/surveillance-companies-exploiting-telecom-systems-to-track-location\">Surveillance companies exploiting telecom system to spy on targets’ locations, research shows | The Record from Recorded Future News</a></p>\n<p>New research from Citizen Lab reveals that surveillance companies are exploiting telecom infrastructure, including SS7 and Diameter protocols, to secretly track individuals'...</p> <a href=\"https://threatintel.cc/2026/04/23/surveillance-companies-exploiting-telecom-system.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/surveillance-companies-exploiting-telecom-system.html","date_published":"2026-04-23T19:20:25+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:20","date_timestamp":1776972025,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88875238","content_html":"<p><a href=\"https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/\">Trigona ransomware attacks use custom exfiltration tool to steal data</a></p>\n<p>The Trigona ransomware gang is employing a custom exfiltration tool, named uploader_client.exe, to steal data more efficiently and evade security detection. This tool facilitates faster data theft through simultaneous connections and...</p> <a href=\"https://threatintel.cc/2026/04/23/trigona-ransomware-attacks-use-custom.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/trigona-ransomware-attacks-use-custom.html","date_published":"2026-04-23T19:18:36+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:18","date_timestamp":1776971916,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88875177","content_html":"<p><a href=\"https://therecord.media/cisa-us-agency-breached-cisco-vulnerability-backdoor\">CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March | The Record from Recorded Future News</a></p>\n<p>A U.S. agency was breached by sophisticated hackers in September through a Cisco vulnerability, with the FIRESTARTER backdoor malware enabling persistent access until...</p> <a href=\"https://threatintel.cc/2026/04/23/cisa-us-agency-breached-through.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/cisa-us-agency-breached-through.html","date_published":"2026-04-23T19:17:19+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:17","date_timestamp":1776971839,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88875178","content_html":"<p><a href=\"https://www.govinfosecurity.com/cryptohack-roundup-us-sanctioned-grinex-hacked-a-31488\">Cryptohack Roundup: US-Sanctioned Grinex Hacked</a></p>\n<p>The Cryptohack Roundup details recent cybersecurity incidents in digital assets, including a $15 million hack of the US-sanctioned crypto exchange Grinex, which halted trading and withdrawals. It also covers the laundering of $80 million in ETH from the KelpDAO...</p> <a href=\"https://threatintel.cc/2026/04/23/cryptohack-roundup-ussanctioned-grinex-hacked.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/cryptohack-roundup-ussanctioned-grinex-hacked.html","date_published":"2026-04-23T19:16:25+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:16","date_timestamp":1776971785,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88874522","content_html":"<p><a href=\"https://databreaches.net/2026/04/22/not-for-sale-blueleaks-2-0-hacktivist-decides-not-to-sell-dataset-with-sensitive-data/\">NOT for Sale! BlueLeaks 2.0 Hacktivist decides not to sell dataset with sensitive data - DataBreaches.Net</a></p>\n<p>The hacktivist responsible for the BlueLeaks 2.0 breach of P3 Global Intel, known as Internet Yiff Machine (IYM), has decided not to sell the dataset of 8.3 million tips. Initially listed for sale due to...</p> <a href=\"https://threatintel.cc/2026/04/23/not-for-sale-blueleaks-hacktivist.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/not-for-sale-blueleaks-hacktivist.html","date_published":"2026-04-23T19:07:26+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:07","date_timestamp":1776971246,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88874282","content_html":"<p><a href=\"https://www.chosun.com/english/national-en/2026/04/23/AF5VW7IHQBANPIVNDBB3Z3XJXQ/\">Duo Leaks Sensitive Data of 430,000 Marriage Brokerage Clients</a></p>\n<p>The marriage brokerage company Duo leaked the sensitive data of 430,000 clients due to a hacker accessing an employee’s work PC, leading to a 1.2 billion won fine for security lapses. The leaked information included marital history, workplace,...</p> <a href=\"https://threatintel.cc/2026/04/23/duo-leaks-sensitive-data-of.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/duo-leaks-sensitive-data-of.html","date_published":"2026-04-23T19:05:58+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:05","date_timestamp":1776971158,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88874167","content_html":"<p><a href=\"https://news.az/news/dating-app-fined-after-massive-data-leak\">Dating app fined after massive data leak | News.az</a></p>\n<p>South Korean matchmaking company Duo has been fined 1.21 billion won (approximately $815,000) after a massive data leak exposed the sensitive personal information of over 420,000 users. The breach, which included phone numbers, addresses, education,...</p> <a href=\"https://threatintel.cc/2026/04/23/dating-app-fined-after-massive.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/dating-app-fined-after-massive.html","date_published":"2026-04-23T19:03:57+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:03","date_timestamp":1776971037,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88873986","content_html":"<p><a href=\"https://securityaffairs.com/191171/cyber-crime/ramp-uncovered-anatomy-of-russias-ransomware-marketplace.html\">RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace</a></p>\n<p>A leaked database from the RAMP dark web forum reveals the inner workings of Russia’s ransomware ecosystem, detailing 7,707 users and 340,000 IP records. The forum acted as a structured marketplace for selling access, recruiting affiliates, and...</p> <a href=\"https://threatintel.cc/2026/04/23/ramp-uncovered-anatomy-of-russias.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/ramp-uncovered-anatomy-of-russias.html","date_published":"2026-04-23T19:01:22+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 19:01","date_timestamp":1776970882,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88873834","content_html":"<p><a href=\"https://www.msn.com/en-us/news/technology/rockstar-games-has-confirmed-it-was-hit-by-third-party-data-breach/ar-AA20FDXs\">Rockstar Games has confirmed it was hit by third-party data breach</a></p>\n<p>Rockstar Games has confirmed a third-party data breach after the hacking group ShinyHunters claimed to have infiltrated their cloud servers, demanding payment to prevent the leak of accessed company information. Rockstar stated that a limited...</p> <a href=\"https://threatintel.cc/2026/04/23/rockstar-games-has-confirmed-it.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/rockstar-games-has-confirmed-it.html","date_published":"2026-04-23T18:59:43+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 18:59","date_timestamp":1776970783,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88873721","content_html":"<p><a href=\"https://www.bbc.com/news/articles/cpvxgl3n138o\">UK Biobank health data listed for sale in China, government confirms</a></p>\n<p>The UK Biobank health data of 500,000 participants was found listed for sale on Alibaba in China, though the government confirmed no purchases were made and the data was de-identified, not including names or addresses. This incident,...</p> <a href=\"https://threatintel.cc/2026/04/23/uk-biobank-health-data-listed.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/uk-biobank-health-data-listed.html","date_published":"2026-04-23T18:58:29+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 18:58","date_timestamp":1776970709,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88873722","content_html":"<p><a href=\"https://techcrunch.com/2026/04/22/cosmetics-giant-rituals-confirms-data-breach-of-customer-membership-records/\">Cosmetics giant Rituals confirms data breach of customer membership records | TechCrunch</a></p>\n<p>Cosmetics company Rituals has confirmed a data breach impacting customer membership records, including names, dates of birth, and contact information, affecting customers in Europe, the UK, and the US. The company is...</p> <a href=\"https://threatintel.cc/2026/04/23/cosmetics-giant-rituals-confirms-data.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/cosmetics-giant-rituals-confirms-data.html","date_published":"2026-04-23T18:57:33+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 18:57","date_timestamp":1776970653,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88858231","content_html":"<p><a href=\"https://www.govinfosecurity.com/pharma-giant-merck-google-cloud-sign-1b-agentic-ai-deal-a-31485\">Pharma Giant Merck and Google Cloud Sign $1B Agentic AI Deal</a></p>\n<p>Pharma giant Merck has signed a multi-year, up to $1 billion deal with Google Cloud to build an AI-enabled enterprise, deploying agentic AI across its operations to accelerate drug development. This collaboration is part of a growing trend of...</p> <a href=\"https://threatintel.cc/2026/04/23/pharma-giant-merck-and-google.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/23/pharma-giant-merck-and-google.html","date_published":"2026-04-23T14:55:42+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 14:55","date_timestamp":1776956142,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88858119","content_html":"<p><a href=\"https://www.govinfosecurity.com/unwary-chinese-hackers-hardcoded-credentials-into-backdoors-a-31487\">Unwary Chinese Hackers Hardcoded Credentials into Backdoors</a></p>\n<p>Researchers discovered a Chinese nation-state threat actor, dubbed GopherWhisper, that carelessly hardcoded command and control credentials into backdoors written in the Go programming language. The group used platforms like Slack and Discord for C2...</p> <a href=\"https://kiledjian.com/2026/04/23/unwary-chinese-hackers-hardcoded-credentials.html\">kiledjian.com</a>","summary":"","url":"https://kiledjian.com/2026/04/23/unwary-chinese-hackers-hardcoded-credentials.html","date_published":"2026-04-23T14:53:32+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-23 14:53","date_timestamp":1776956012,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":["https://infosec.exchange/@edwardk/116454598526494005","https://bsky.app/profile/did:plc:beyhoumfysldffkbyo2fnn3c/post/3mk6bgfszyh2e"]}},{"id":"88771969","content_html":"<p><a href=\"https://www.dw.com/en/uk-moves-to-ban-smoking-for-everyone-born-after-2008/a-76884561\">UK moves to ban smoking for everyone born after 2008</a></p>\n<p>The UK has passed a generational smoking ban, meaning individuals born after January 1, 2009, will never legally be able to purchase tobacco products. This landmark public health intervention, which also tightens regulations on vaping, will apply across...</p> <a href=\"https://kiledjian.com/2026/04/22/uk-moves-to-ban-smoking.html\">kiledjian.com</a>","summary":"","url":"https://kiledjian.com/2026/04/22/uk-moves-to-ban-smoking.html","date_published":"2026-04-22T11:27:54+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-22 11:27","date_timestamp":1776857274,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":["https://infosec.exchange/@edwardk/116448125883718486","https://bsky.app/profile/did:plc:beyhoumfysldffkbyo2fnn3c/post/3mk3fgu3nqy2x"]}},{"id":"88759679","content_html":"<p><a href=\"https://gbhackers.com/1370-microsoft-sharepoint-servers-at-risk-of-spoofing-attacks/\">1,370+ Microsoft SharePoint Servers at Risk of Spoofing Attacks Found Exposed Online</a></p>\n<p>Over 1,370 Microsoft SharePoint servers are exposed online to a spoofing vulnerability (CVE-2026-32201), which is actively exploited in the wild. This critical flaw, identified by The Shadowserver Foundation, allows...</p> <a href=\"https://threatintel.cc/2026/04/22/microsoft-sharepoint-servers-at-risk.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/22/microsoft-sharepoint-servers-at-risk.html","date_published":"2026-04-22T06:46:09+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-22 06:46","date_timestamp":1776840369,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88758664","content_html":"<p><a href=\"https://words.filippo.io/128-bits/\">Quantum Computers Are Not a Threat to 128-bit Symmetric Keys</a></p>\n<p>Filippo Valsorda’s latest essay is a useful corrective for security leaders: the real post-quantum urgency is in asymmetric cryptography, not in reflexively replacing AES-128. The technical and standards evidence is clear that Grover’s algorithm...</p> <a href=\"https://threatintel.cc/2026/04/22/quantum-computers-are-not-a.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/22/quantum-computers-are-not-a.html","date_published":"2026-04-22T06:19:55+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-22 06:19","date_timestamp":1776838795,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88756063","content_html":"<p><a href=\"https://www.bleepingcomputer.com/news/security/new-lotus-data-wiper-used-against-venezuelan-energy-utility-firms/\">New Lotus data wiper used against Venezuelan energy, utility firms</a></p>\n<p>A new data-wiping malware named Lotus has been identified, targeting energy and utility firms in Venezuela. The malware systematically destroys compromised systems by overwriting physical drives and eliminating recovery options, with its...</p> <a href=\"https://threatintel.cc/2026/04/22/new-lotus-data-wiper-used.html\">threatintel.cc</a>","summary":"","url":"https://threatintel.cc/2026/04/22/new-lotus-data-wiper-used.html","date_published":"2026-04-22T05:10:08+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2026-04-22 05:10","date_timestamp":1776834608,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"74890839","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/Walker@infosec.exchange\" class=\"u-url mention\">@Walker</a></span> I agree burnout is a real problem in infosec teams. I know many CISOs that left cyber and became CIOs. They said it is much easier</p>\n","url":"https://micro.blog/ekiledjian/74890839","date_published":"2025-10-02T23:55:35+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2025-10-02 23:55","date_timestamp":1759449335,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"61673138","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/nicholasdomanico@infosec.exchange\" class=\"u-url mention\">@nicholasdomanico</a></span> you’re probably not wrong</p>\n","url":"https://micro.blog/ekiledjian/61673138","date_published":"2025-04-07T13:51:42+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2025-04-07 13:51","date_timestamp":1744033902,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"53083222","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/PJ_Evans@mas.to\" class=\"u-url mention\">@PJ<span>_</span>Evans</a></span> I am not sure it is the selling sofware they are targeting. Think of what this would do to global piracy?</p>\n","url":"https://micro.blog/ekiledjian/53083222","date_published":"2024-12-23T19:23:19+00:00","author":{"name":"Edward Kiledjian","url":"http://www.kiledjian.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Favatars.micro.blog%2Favatars%2F2025%2F35%2F1555731.jpg","_microblog":{"username":"ekiledjian"}},"_microblog":{"date_relative":"2024-12-23 19:23","date_timestamp":1734981799,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}}]}