<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security Unlocked</title><link>https://securityunlocked.com/</link><description>Recent content on Security Unlocked</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://securityunlocked.com/index.xml" rel="self" type="application/rss+xml"/><item><title>Defenders Under Siege: How Adversaries Turned Security Tools Into Weapons This Week</title><link>https://securityunlocked.com/articles/defenders-under-siege-how-adversaries-turned-security-tools-into-weapons-this-week/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/defenders-under-siege-how-adversaries-turned-security-tools-into-weapons-this-week/</guid><description>Three incidents this week reveal the same strategic pattern: attackers turning trusted defensive infrastructure into weapons. Microsoft Defender zero-days, the Trivy scanner compromise that breached the European Commission, and UNC6783&amp;rsquo;s live-chat social engineering all exploit a cognitive constant: defenders don&amp;rsquo;t question the tools they depend on.</description></item><item><title>Threat Economics: Week of April 13-19, 2026</title><link>https://securityunlocked.com/ti-economics/threat-economics-week-of-april-13-19-2026/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/ti-economics/threat-economics-week-of-april-13-19-2026/</guid><description>Weekly market intelligence: Linx Security&amp;rsquo;s $50M identity bet, $4.62B in Q2 cybersecurity funding, and why NIS2 enforcement and CIRCIA deadlines are about to reshape enterprise buying criteria.</description></item><item><title>The Protocol Is Doing Its Job</title><link>https://securityunlocked.com/briefs/the-protocol-is-doing-its-job/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/briefs/the-protocol-is-doing-its-job/</guid><description>MCP&amp;rsquo;s trust architecture makes any exposed management interface a pre-authenticated command shell by design, not by accident, and two RCE vulnerabilities in the same week reveal a deployment curve that has outrun both audit methodology and detection playbooks.</description></item><item><title>Anthropic's Best Week and Worst Week Were the Same Week</title><link>https://securityunlocked.com/articles/anthropics-best-week-and-worst-week-were-the-same-week/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/anthropics-best-week-and-worst-week-were-the-same-week/</guid><description>Anthropic unveiled an AI that finds decades-old zero-days while shipping three injection flaws in its own CLI, exposing the gap between offensive capability and defensive practice.</description></item><item><title>Threat Economics: Week of April 6-12, 2026</title><link>https://securityunlocked.com/ti-economics/threat-economics-week-of-april-6-12-2026/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/ti-economics/threat-economics-week-of-april-6-12-2026/</guid><description>Weekly market intelligence: Anthropic&amp;rsquo;s $100M Glasswing commitment, the FBI&amp;rsquo;s $21B cybercrime figure, and why developer security tooling is the next VC cycle.</description></item><item><title>Mythos Finds Zero-Days. npm Found Three More.</title><link>https://securityunlocked.com/briefs/mythos-finds-zero-days.-npm-found-three-more./</link><pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/briefs/mythos-finds-zero-days.-npm-found-three-more./</guid><description>The same week Anthropic unveiled an AI that autonomously finds zero-days, its own CLI shipped a CVSS 9.8 command injection, exposed by a debugging artifact that had been sitting in an npm package since March 31.</description></item><item><title>Trust Is the Exploit</title><link>https://securityunlocked.com/briefs/trust-is-the-exploit/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/briefs/trust-is-the-exploit/</guid><description>From a six-month DPRK social engineering operation to mass exploitation of developer ecosystems, this week&amp;rsquo;s threat landscape reveals that the most reliable attack surface is the trust we extend by default.</description></item><item><title>The Mental Model Is the Vulnerability</title><link>https://securityunlocked.com/briefs/the-mental-model-is-the-vulnerability/</link><pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/briefs/the-mental-model-is-the-vulnerability/</guid><description>Five AI infrastructure disclosures in one day share the same root cause: the gap between what users believe their security settings do and what the framework actually executes.</description></item><item><title>Trust Is the Attack Surface</title><link>https://securityunlocked.com/briefs/trust-is-the-attack-surface/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/briefs/trust-is-the-attack-surface/</guid><description>Every major incident this week exploited institutional or interpersonal trust rather than technical vulnerabilities. The adversary&amp;rsquo;s target is not the system. It is the relationship.</description></item><item><title>Are Hacktivists Going Out of Business? Or Just Out of Style</title><link>https://securityunlocked.com/articles/are-hacktivists-going-out-of-business-or-just-out-of-style/</link><pubDate>Fri, 09 Jan 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/are-hacktivists-going-out-of-business-or-just-out-of-style/</guid><description>Hacktivism hasn&amp;rsquo;t disappeared; it has been absorbed into the cybercrime economy and repurposed as cover for state-sponsored operations, forcing defenders to rethink how they assess ideologically motivated threats.</description></item><item><title>Predicting the Six Biggest Impacts AI Will Have on OT Cybersecurity</title><link>https://securityunlocked.com/mentions/predicting-the-six-biggest-impacts-ai-will-have-on-ot-cybersecurity/</link><pubDate>Wed, 07 Jan 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/mentions/predicting-the-six-biggest-impacts-ai-will-have-on-ot-cybersecurity/</guid><description>Quoted on treating AI agents as insider threats and the emerging legal liability for autonomous AI decisions in enterprise environments.</description></item><item><title>Predicting the Six Biggest Impacts AI Will Have on OT Cybersecurity</title><link>https://securityunlocked.com/mentions/predicting-the-six-biggest-impacts-ai-will-have-on-ot-cybersecurity/</link><pubDate>Wed, 07 Jan 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/mentions/predicting-the-six-biggest-impacts-ai-will-have-on-ot-cybersecurity/</guid><description>Quoted on why enterprises need to start treating AI systems as insider threats, the coming wave of AI liability lawsuits, and the machine identity crisis facing security teams.</description></item><item><title>2026 Security Predictions: Are You Prepared?</title><link>https://securityunlocked.com/mentions/2026-security-predictions-are-you-prepared/</link><pubDate>Tue, 02 Dec 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/mentions/2026-security-predictions-are-you-prepared/</guid><description>Quoted on why enterprises must adopt nation-state-grade defenses as APT groups increasingly target private-sector companies for economic disruption, IP theft, and geopolitically aligned espionage.</description></item><item><title>What National Cybersecurity Awareness Month Means in 2025</title><link>https://securityunlocked.com/mentions/what-national-cybersecurity-awareness-month-means-in-2025/</link><pubDate>Fri, 03 Oct 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/mentions/what-national-cybersecurity-awareness-month-means-in-2025/</guid><description>Quoted on why enabling multi-factor authentication remains the single highest-impact action individuals can take against credential-based attacks.</description></item><item><title>AI Agents Are Mapping Your Organization</title><link>https://securityunlocked.com/articles/ai-agents-are-mapping-your-organization/</link><pubDate>Fri, 08 Aug 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/ai-agents-are-mapping-your-organization/</guid><description>Automated reconnaissance agents now profile entire organizations in minutes, compiling dossiers from public sources faster and more comprehensively than ever before, reshaping how defenders must think about information exposure.</description></item><item><title>When Yesterday's Emails Never Happened: Conversation Hijacking Attacks</title><link>https://securityunlocked.com/articles/when-yesterdays-emails-never-happened-conversation-hijacking-attacks/</link><pubDate>Tue, 17 Jun 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/when-yesterdays-emails-never-happened-conversation-hijacking-attacks/</guid><description>AI-fabricated email threads now bypass traditional security controls entirely by exploiting workplace authority dynamics and psychological familiarity, eliminating malicious indicators while weaponizing legitimate communication patterns.</description></item><item><title>When Confusion Becomes a Weapon: Economic Uncertainty and Cyber Risk</title><link>https://securityunlocked.com/articles/when-confusion-becomes-a-weapon-economic-uncertainty-and-cyber-risk/</link><pubDate>Wed, 23 Apr 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/when-confusion-becomes-a-weapon-economic-uncertainty-and-cyber-risk/</guid><description>Economic turbulence weaponizes organizational chaos through social engineering campaigns that exploit distraction and degraded attention. while paradoxically prompting security budget cuts exactly when attacks intensify.</description></item><item><title>Strategic AI Alliances and the Geopolitics of Today's Internet</title><link>https://securityunlocked.com/articles/strategic-ai-alliances-and-the-geopolitics-of-todays-internet/</link><pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/strategic-ai-alliances-and-the-geopolitics-of-todays-internet/</guid><description>As nations weaponize AI and enforce data sovereignty requirements, the borderless internet has fractured into competing digital blocs, forcing enterprises to navigate fragmented compliance regimes while adversaries exploit jurisdictional gaps.</description></item><item><title>US Cybersecurity Efforts for Spacecraft Are Up in the Air</title><link>https://securityunlocked.com/mentions/us-cybersecurity-efforts-for-spacecraft-are-up-in-the-air/</link><pubDate>Thu, 06 Feb 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/mentions/us-cybersecurity-efforts-for-spacecraft-are-up-in-the-air/</guid><description>Quoted on the lack of progress in spacecraft cybersecurity standards and why the delay is concerning given supply chain breaches targeting government systems.</description></item><item><title>Why Your Desire for Free TV Could Cost You</title><link>https://securityunlocked.com/articles/why-your-desire-for-free-tv-could-cost-you/</link><pubDate>Tue, 04 Feb 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/why-your-desire-for-free-tv-could-cost-you/</guid><description>Pirated streaming platforms weaponize user impatience through layered deception, fake CAPTCHAs, disguised malware installers, and obfuscated command execution, turning entertainment shortcuts into persistent device compromise.</description></item><item><title>Scam Yourself Attacks: The New Evolution of Social Engineering</title><link>https://securityunlocked.com/articles/scam-yourself-attacks-the-new-evolution-of-social-engineering/</link><pubDate>Tue, 21 Jan 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/scam-yourself-attacks-the-new-evolution-of-social-engineering/</guid><description>Scam-Yourself attacks manipulate users into triggering their own compromise through familiar interfaces and psychological triggers, making the victim an unwitting accomplice in their own breach.</description></item><item><title>Hack the Hacker's Mind: Weaponizing Cognitive Biases in Cyber Defense</title><link>https://securityunlocked.com/articles/hack-the-hackers-mind-weaponizing-cognitive-biases-in-cyber-defense/</link><pubDate>Thu, 16 Jan 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/hack-the-hackers-mind-weaponizing-cognitive-biases-in-cyber-defense/</guid><description>Adversarial Cognitive Engineering flips traditional defense models by exploiting predictable patterns in attacker decision-making, using deception operations to waste attacker resources rather than merely detecting intrusions after they occur.</description></item><item><title>Evolving Cyber Resilience: From Tool Sprawl to Ecosystem Balance</title><link>https://securityunlocked.com/articles/evolving-cyber-resilience-from-tool-sprawl-to-ecosystem-balance/</link><pubDate>Fri, 10 Jan 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/evolving-cyber-resilience-from-tool-sprawl-to-ecosystem-balance/</guid><description>Modern security ecosystems have grown so complex they create vulnerabilities through sheer disorganization. Resilience requires treating security architecture like biological systems that adapt through classification, evolution, and purposeful simplification.</description></item><item><title>The Dual-Edged Sword of AI in Cybersecurity</title><link>https://securityunlocked.com/articles/the-dual-edged-sword-of-ai-in-cybersecurity/</link><pubDate>Tue, 07 Jan 2025 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/the-dual-edged-sword-of-ai-in-cybersecurity/</guid><description>AI amplifies both defensive and offensive capabilities asymmetrically, raising the ceiling for defenders while lowering the floor for attackers and creating a fundamentally new threat multiplier that organizations cannot address through traditional approaches alone.</description></item><item><title/><link>https://securityunlocked.com/drafts/josh_taylor_writing_guide/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/drafts/josh_taylor_writing_guide/</guid><description>&lt;h1 id="josh-taylor-writing-guide"&gt;Josh Taylor Writing Guide&lt;/h1&gt;
&lt;h2 id="voice-and-positioning"&gt;Voice and Positioning&lt;/h2&gt;
&lt;p&gt;Write as a cybersecurity strategist, SOC leader, doctoral
researcher, and published analyst. Combine strategic clarity,
technical credibility, psychological insight, and measured
authority. Sound like someone who has operated in real
environments and studied the field deeply. Never sound like
a vendor brochure, generic marketer, or academic performing
impressiveness.&lt;/p&gt;
&lt;h2 id="audience-and-tone-modes"&gt;Audience and Tone Modes&lt;/h2&gt;
&lt;p&gt;Before writing, confirm:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who is the audience?&lt;/li&gt;
&lt;li&gt;Executive, Practitioner, or Research-informed tone?&lt;/li&gt;
&lt;li&gt;Publication venue — neutral outlet or Fortra-aligned?&lt;/li&gt;
&lt;li&gt;Should Fortra be mentioned explicitly?&lt;/li&gt;
&lt;li&gt;Is there a current event or trend to anchor the piece?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Tone modes:&lt;/p&gt;</description></item><item><title>Privacy Policy | Security Unlocked</title><link>https://securityunlocked.com/privacy-policy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/privacy-policy/</guid><description>How we collect, use, and protect your information.</description></item><item><title>Terms of Use | Security Unlocked</title><link>https://securityunlocked.com/terms-of-use/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/terms-of-use/</guid><description>The rules for using Security Unlocked.</description></item></channel></rss>