CISO Talk by James Azar

CISO Talk by James Azar

Home
Notes
Chat
Sponsors
CyberHub Podcast
Goodbye Privacy
Archive
Newsletters
About
This week in Cybersecurity #47
Invited In, Not Broken In: How Attackers Are Winning Through Trust, Speed, and Your Own Tools, Your weekend catch-up on the most critical cybersecurity…
Mar 27 • James Azar
LeakBase Admin Arrested in 14-Country Takedown, Device Code Phishing Hits 340 Orgs, TP-Link Flaw
China-Linked Actors Breach Southeast Asian Military Systems, Team PCP Supply Chain Attack Expands to Docker Hub and VS Code, Attackers Achieving Initial…
Mar 26 • James Azar
16:11
Pro-Iran Hackers Claim Lockheed Martin Breach, HackerOne Data Stolen, FCC Bans Chinese Routers
Hacktivist Claims, Bug Bounty Exposure, DeFi Chaos, and Supply Chain Attacks Signal a New Era of Cyber Risk
Mar 25 • James Azar
17:43
FBI: Iran Hackers Use Telegram as C2, Crunchyroll Probes 6.8M Breach, Tycoon 2FA Back Online
50K YouTube Subscribers Milestone, Mazda Supplier Breach, Semiconductor Ransomware, Handala Returns Within Days of FBI Takedown, and North Korean Actors…
Mar 24 • James Azar
16:45
FBI Seizes Handala Websites and DOJ Accuses Iran's MOIS Behind Stryker Wiper Attack, Oracle Pushes Emergency Fix for Critical Identity…
Stryker Fallout Continues as FBI Takes Down Iranian Infrastructure, AstraZeneca Breached by Lapsus$, Russian Hackers Target Signal Users, and Trivy…
Mar 23 • James Azar
15:26
AI Hype Isn’t New — But the Stakes Are
What decades of bad predictions teach us about AI, disruption, and the future of cybersecurity
Mar 21 • James Azar
This Week in Cybersecurity #46
Trust Is the New Attack Vector: Breaches, Botnets, and a Week That Hit Every Layer. Your weekend catch-up on the most critical cybersecurity stories of…
Mar 20 • James Azar
Aura Breached by ShinyHunters Exposing 900K Records, Treasury Sanctions North Korea IT Worker Network That Generated $800M Funding WMD…
Identity Protection Company Aura Exposes 900K Marketing Contacts, Cisco Firewall Zero-Day Exploited by Ransomware, Fancy Bear Stolen Credentials Server…
Mar 19 • James Azar
16:41
Iran Hackers Hold US Network Footholds, GlassWorm Hits 400+ Repos, EU Sanctions China and Iran
Iranian Cyber Operators Maintaining Persistent Access for Future Attacks, Rondo Box Botnet Exploits 174 Vulnerabilities at Scale, Google Warns…
Mar 18 • James Azar
17:37
Stryker Hack Used Intune to Wipe 200K Devices, China Espionage Hits Asian Militaries, Wing FTP 0-Day
Iranian Wiper Attack Without Malware, Chinese Military Espionage, Executive Phishing Campaigns, and Supply Chain Web Exploits Signal a Dangerous…
Mar 17 • James Azar
16:47
Emergency Chrome 146 Update Patches Two Exploited Zero-Days, INTERPOL Operation Synergia III Sinkholes 45K Malicious Ips, Poland Nuclear…
Starbucks and Loblaw Data Breaches Expose Employee and Customer Data, FortiGate Firewalls Actively Exploited, Third Incident Responder Pleads Guilty in…
Mar 16 • James Azar
18:38
When Destruction Becomes the Objective
The Stryker attack may mark the moment destructive cyber operations moved from the battlefield into the economic bloodstream.
Mar 15 • James Azar
© 2026 James Azar · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture