by Kim Singletary | Apr 29, 2026 | Blog
Published April 29, 2026 Anthropic’s Project Glasswing signals a structural shift in vulnerability discovery. AI models are finding and enabling the exploitation of software flaws faster than human teams can respond. Anthropic’s Project Glasswing signals an...
by Kim Singletary | Apr 24, 2026 | Blog
Published April 24, 2026 Microsoft has recently warned of an increase in real‑world cyberattacks abusing Microsoft Teams external chat to impersonate IT helpdesk personnel. In these incidents, attackers pose as trusted internal support staff and persuade users to...
by Kim Singletary | Apr 15, 2026 | Blog
This post documents a blind time-based SQL injection in the PostCalendar module discoveredin OpenEMR 8.0.0. The SQL Injection is exploitable by an authenticated admin user and illustrates how a single determined attacker with a valid session can move from nuisance to... by Kim Singletary | Feb 9, 2026 | Guide
by Kim Singletary | Oct 29, 2025 | Expert Advice
If I could share one cybersecurity tip it would be to establish strong relationships and channels of communication with vendors, including SaaS/application vendors, hardware and medical device vendors, and service providers. Maintaining open communication with vendors...