CybersecKyle
CybersecKyle
Kyle
I love everything tech. You can check out more about me on my website. I blog about cybersecurity, technology trends, and best practices in IT. I even share the occasional tech review every now and then.
Latest Posts
Over the last few days we learned that millions of people have been happily browsing the web with what amounts to a remote-controlled spyware agent sitting inside their browser. Not a zero-day in some obscure driver, not a sketchy EXE...
Could you be running a tiny slice of someone else’s botnet without realizing it? If you own a Superbox (or any “lifetime free TV” Android streaming box), the honest answer is: maybe. Recent research into Superbox and similar devices,...
Due to the Thanksgiving holiday here in the US, it was a short week which was very welcomed. Here’s a quick rundown of what went down last week. 💻 Good ’ol Work Nothing much happened at work last week. It was a pretty quiet week overall,...
When a White House press release starts talking about a “Manhattan Project–scale” effort for AI, anybody in security should feel a little twinge behind the eyeballs. The new executive order launching the Genesis Mission is being sold as...
I almost forgot to publish these weekly notes! I got busy yesterday with actually working. 😃 Better late than never, I suppose. Last week was pretty manageable again. Work stayed steady, which gave me a good window to keep catching up on...
The Shai-Hulud npm worm is back, and the sequel is nastier. Security teams are tracking a new wave branded by the attackers themselves as “Sha1-Hulud: The Second Coming.” It builds directly on the original Shai-Hulud npm supply chain...
The Cybersecurity Weekly Roundup is back! I have been on a brief hiatus from writing these weekily summaries, but I am resuming them. I summarize the most important cybersecurity news stories, focusing on practical takeaways for security...
This article is the second in a multiple part series of the CybersecKyle Security How-To Series, a step-by-step collection that starts with everyday safety and ramps up to blue team skills. New to the series? Start here. Why this matters...
This past week wasn’t too bad. Work was steady and not too hectic, which is always a nice thing. This keeps my stress and anxiety at a manageable level. Personally, things were pretty good too. I choose to relax and focus on me and my...
Last week Google quietly gave Chrome a “helpful” upgrade: enhanced autofill that can now store and fill in your driver’s license number, passport number, and vehicle details like license plate and VIN. As someone who lives in browser...
Affiliate disclosure: This article contains affiliate links. If you choose to purchase through these links, I may receive a commission. This helps support my work and does not affect the price you pay. I only recommend products I use and...
Texas just enacted SB 2420, the “App Store Accountability Act,” which imposes age-verification and parental-consent duties on app stores and developers. On paper, the goal is to protect kids. In practice, it creates large new targets of...
This article covers the changes in NIST’s July 2025 revision of the Digital Identity Guidelines for authentication (SP 800-63B-4), why they matter, and how to update your policies and controls accordingly. It is aimed at security...
Last week had a bit of everything. Work stayed calm, I carved out time to tune up my site, and my back and neck reminded me who’s boss. That part was not fun. 💻 Work Quiet week overall, which let me chip away at schoolwork during the day...
This article is part of the CybersecKyle Security How-To Series, a step-by-step collection that starts with everyday safety and ramps up to blue team skills. New to the series? Start here. Why this matters Most breaches start with weak...