Subscribe
Sign in
Home
Notes
Chat
Cyber Hygiene
Hackonomics
Autonomous Cyber
Cybercrime Stories
Cyber FAQ
Humans of Cyber
About
Latest
Top
Discussions
Roblox Safety
Staying one step ahead
Mar 2
•
MrCyber
and
911Cyber
1
Therapy Notes Turned to Threats
Vastaamo 2020 breach exposed 33K therapy records, led to patient extortion, bankruptcy, fines, and landmark “psybersecurity” reforms.
Mar 1
•
911Cyber
February 2026
From Playtime to Panic
Kido 2025 breach exposed 8,000 children’s profiles in London, with extortion threats prompting police and ICO investigations.
Feb 27
•
911Cyber
🧠 Humans of Cyber | Thomas Graf
Cilium turns eBPF into a cloud-native data plane for networking, security, and observability, scaling Kubernetes beyond iptables.
Feb 25
•
911Cyber
Digital ID
The Invisible Surveillance We’re All Signing Up For
Feb 24
•
MrCyber
and
911Cyber
1
🧠 Humans of Cyber | Michael DeHaan
Ansible evolved from agentless SSH automation to AI-augmented, event-driven orchestration shaping the 2026 agentic era.
Feb 24
•
911Cyber
🧠 Humans of Cyber | Toni de la Fuente
Prowler: Open-source, agentless multi-cloud CSPM. From 2016 CLI tool to 2026 AI-driven platform with attack-path context & automated fixes.
Feb 23
•
911Cyber
🧠 Humans of Cyber | Brendan Dolan-Gavitt
PANDA enables architecture-neutral whole-system record and replay, redefining dynamic malware analysis in 2026.
Feb 22
•
911Cyber
🧠 Humans of Cyber | Nicholas C. Zakas
Origin, purpose, context, timeline, rationale, mechanics: ESLint’s evolution from JS linter to DevSecOps guardrail (2013–2026).
Feb 21
•
911Cyber
🧠 Humans of Cyber | Bill Burke
Keycloak centralizes identity with standards-based SSO, Quarkus performance, and cloud-native governance under CNCF stewardship.
Feb 20
•
911Cyber
🧠 Humans of Cyber | Solomon Hykes
Docker standardized containerization in 2013, transforming software delivery, DevOps automation, and infrastructure security worldwide.
Feb 19
•
911Cyber
The State of Autonomous Cyber: 2026
Cybersecurity is no longer a human-speed discipline.
Feb 18
•
MrCyber
and
911Cyber
1
3
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts