Identity & Access Management

How Did a Dell Zero-Day Go Unpatched for Two Years?

Security

How Did a Dell Zero-Day Go Unpatched for Two Years?

Today, we're speaking with Malik Haidar, a cybersecurity expert with deep experience tracking and dismantling threats within major corporations. We're delving into a recent incident involving a sophisticated Chinese-nexus threat cluster, a critical z

Analytics Intelligence Is Your Dell System a Backdoor for Chinese Hackers?

A critical security flaw discovered in a widely used Dell enterprise product has become the focal point of a sophisticated cyberespionage campaign, transforming what many considered a trusted failsafe into a potential gateway for state-sponsored threat actors. The active exploitation of this

Is Your Dell System a Backdoor for Chinese Hackers?
Security What Is Next for the Gallagher and M.C. Dean Alliance?

With a career built on defending multinational corporations from the digital frontlines, cybersecurity strategist Malik Haidar has a unique perspective on the convergence of physical and digital threats. He joins us to dissect the evolution of a decade-long partnership between Gallagher Security

What Is Next for the Gallagher and M.C. Dean Alliance?
Business Perspectives Malicious AI Extensions Compromise 260,000 Chrome Users

Introduction The promise of artificial intelligence to streamline daily tasks has led to a surge in browser extensions designed to bring this power directly to the user, yet this convenience has been dangerously exploited. A widespread cyberattack campaign, dubbed AiFrame, has weaponized this

Malicious AI Extensions Compromise 260,000 Chrome Users
Business Perspectives Over-Privileged AI Drives 4.5x Higher Incident Rates

I'm joined today by Malik Haidar, a cybersecurity expert who has spent his career on the front lines, defending major corporations from evolving digital threats. We're here to unpack a critical and often overlooked aspect of our rapid push into artificial intelligence: the immense

Over-Privileged AI Drives 4.5x Higher Incident Rates
Security Are Stolen Credentials Fueling OT Ransomware?

A significant escalation in cyberattacks targeting the world’s industrial backbone has exposed a critical vulnerability not in complex software exploits, but in the very credentials trusted to keep operations secure. In 2025, the number of ransomware groups specializing in industrial targets surged

Are Stolen Credentials Fueling OT Ransomware?
Security Trend Analysis: Evolving Ransomware Tactics

The digital extortion that once locked personal photos for a few hundred dollars has metastasized into a sophisticated criminal enterprise capable of bringing global supply chains to a standstill, demanding multi-million-dollar payments from the world’s largest corporations. This dramatic t

Trend Analysis: Evolving Ransomware Tactics
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address