<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cybersecurity Landscape on Osmond van Hemert</title><link>https://www.osmondvanhemert.nl/series/cybersecurity-landscape/</link><description>Recent content in Cybersecurity Landscape on Osmond van Hemert</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© Osmond van Hemert. All rights reserved.</copyright><lastBuildDate>Thu, 15 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.osmondvanhemert.nl/series/cybersecurity-landscape/index.xml" rel="self" type="application/rss+xml"/><item><title>Post-Quantum Cryptography — The Migration Clock Is Ticking</title><link>https://www.osmondvanhemert.nl/posts/260115-nist-post-quantum-crypto-migration/</link><pubDate>Thu, 15 Jan 2026 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/260115-nist-post-quantum-crypto-migration/</guid><description>NIST&amp;rsquo;s post-quantum cryptography standards are finalized, and the migration timeline is no longer theoretical — it&amp;rsquo;s operational.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/260115-nist-post-quantum-crypto-migration/featured.jpg"/></item><item><title>Secure by Design — CISA's Push Is Finally Gaining Real Traction</title><link>https://www.osmondvanhemert.nl/posts/251009-cisa-secure-by-design-traction/</link><pubDate>Thu, 09 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/251009-cisa-secure-by-design-traction/</guid><description>CISA&amp;rsquo;s Secure by Design initiative is moving from voluntary pledges to measurable industry impact, and software vendors are starting to feel the pressure.</description></item><item><title>EU ChatControl Is Back — And It's Still a Terrible Idea for Encryption</title><link>https://www.osmondvanhemert.nl/posts/250925-eu-chatcontrol-encryption-threat/</link><pubDate>Thu, 25 Sep 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/250925-eu-chatcontrol-encryption-threat/</guid><description>The EU&amp;rsquo;s latest push to scan encrypted messages reignites the fundamental debate about whether governments can mandate backdoors without destroying security for everyone.</description></item><item><title>CUPS Overflows — A Critical Linux Printing Vulnerability Nobody Saw Coming</title><link>https://www.osmondvanhemert.nl/posts/240926-cups-vulnerability-linux-printing-security/</link><pubDate>Thu, 26 Sep 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240926-cups-vulnerability-linux-printing-security/</guid><description>A chain of vulnerabilities in CUPS, the Linux printing system, enables remote code execution — and highlights how forgotten infrastructure becomes a security liability.</description></item><item><title>NIST Finalizes Post-Quantum Cryptography Standards — Time to Start Planning</title><link>https://www.osmondvanhemert.nl/posts/240815-nist-post-quantum-cryptography/</link><pubDate>Thu, 15 Aug 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240815-nist-post-quantum-cryptography/</guid><description>NIST has published its first three finalized post-quantum cryptography standards. Here&amp;rsquo;s what developers need to know and do.</description></item><item><title>The CrowdStrike Outage — When a Security Update Takes Down the World</title><link>https://www.osmondvanhemert.nl/posts/240718-crowdstrike-global-outage/</link><pubDate>Thu, 18 Jul 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240718-crowdstrike-global-outage/</guid><description>A faulty CrowdStrike Falcon sensor update has caused one of the largest IT outages in history, bricking millions of Windows machines worldwide.</description></item><item><title>regreSSHion — A Wake-Up Call Hiding in Plain Sight</title><link>https://www.osmondvanhemert.nl/posts/240704-regresshion-openssh-vulnerability/</link><pubDate>Thu, 04 Jul 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240704-regresshion-openssh-vulnerability/</guid><description>CVE-2024-6387 reveals a critical remote code execution flaw in OpenSSH, and it&amp;rsquo;s a regression from a fix made back in 2006.</description></item><item><title>Microsoft Delays Recall — When Security Concerns Actually Win</title><link>https://www.osmondvanhemert.nl/posts/240613-microsoft-recall-delayed-security/</link><pubDate>Thu, 13 Jun 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240613-microsoft-recall-delayed-security/</guid><description>Microsoft pulls Windows Recall from the upcoming Copilot+ PC launch after security researchers demonstrate alarming vulnerabilities in the feature&amp;rsquo;s data storage.</description></item><item><title>RSA Conference 2024 — AI Meets Cybersecurity, For Better and Worse</title><link>https://www.osmondvanhemert.nl/posts/240502-rsa-conference-2024-ai-security/</link><pubDate>Thu, 02 May 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240502-rsa-conference-2024-ai-security/</guid><description>RSA Conference 2024 kicks off in San Francisco with AI dominating every conversation. But beneath the marketing buzz, there are real security challenges emerging that practitioners need to face.</description></item><item><title>Terrapin Attack — SSH Isn't As Bulletproof As We Thought</title><link>https://www.osmondvanhemert.nl/posts/231221-terrapin-ssh-attack-vulnerability/</link><pubDate>Thu, 21 Dec 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/231221-terrapin-ssh-attack-vulnerability/</guid><description>Researchers disclose the Terrapin attack against SSH, demonstrating that even our most trusted protocols can harbor subtle cryptographic weaknesses.</description></item><item><title>Google Rolls Out Passkeys — The Beginning of the End for Passwords</title><link>https://www.osmondvanhemert.nl/posts/230504-google-passkeys-passwords-future/</link><pubDate>Thu, 04 May 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/230504-google-passkeys-passwords-future/</guid><description>Google enables passkey sign-in for all Google Accounts, marking the most significant push yet toward a passwordless future built on FIDO2 and WebAuthn.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/230504-google-passkeys-passwords-future/featured.jpg"/></item><item><title>The US National Cybersecurity Strategy — Software Liability Is Coming</title><link>https://www.osmondvanhemert.nl/posts/230309-us-national-cybersecurity-strategy-2023/</link><pubDate>Thu, 09 Mar 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/230309-us-national-cybersecurity-strategy-2023/</guid><description>The Biden administration&amp;rsquo;s new cybersecurity strategy shifts liability toward software vendors, and developers need to pay attention.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/230309-us-national-cybersecurity-strategy-2023/featured.jpg"/></item><item><title>26 Million Requests Per Second — Cloudflare and the Mantis Botnet</title><link>https://www.osmondvanhemert.nl/posts/220707-cloudflare-mantis-record-ddos/</link><pubDate>Thu, 07 Jul 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220707-cloudflare-mantis-record-ddos/</guid><description>Cloudflare mitigated the largest HTTPS DDoS attack ever recorded at 26 million requests per second. The Mantis botnet represents a new generation of volumetric threats.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220707-cloudflare-mantis-record-ddos/featured.jpg"/></item><item><title>Heroku's Security Breach — A Wake-Up Call for Platform Trust</title><link>https://www.osmondvanhemert.nl/posts/220421-heroku-security-breach-supply-chain/</link><pubDate>Thu, 21 Apr 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220421-heroku-security-breach-supply-chain/</guid><description>Heroku&amp;rsquo;s OAuth token breach exposes the fragile trust chain in platform-as-a-service dependencies and what it means for developers.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220421-heroku-security-breach-supply-chain/featured.jpg"/></item><item><title>Lapsus$ Breaches Okta and Microsoft — The Identity Provider Nightmare</title><link>https://www.osmondvanhemert.nl/posts/220324-lapsus-group-okta-microsoft-breach/</link><pubDate>Thu, 24 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220324-lapsus-group-okta-microsoft-breach/</guid><description>The Lapsus$ hacking group has breached both Okta and Microsoft, exposing critical weaknesses in identity provider security and third-party access management.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220324-lapsus-group-okta-microsoft-breach/featured.jpg"/></item><item><title>HermeticWiper and the New Reality of Cyber Warfare</title><link>https://www.osmondvanhemert.nl/posts/220224-hermeticwiper-ukraine-cyber-warfare/</link><pubDate>Thu, 24 Feb 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220224-hermeticwiper-ukraine-cyber-warfare/</guid><description>As conflict erupts in Ukraine, destructive wiper malware targeting critical infrastructure signals a new chapter in state-sponsored cyber operations.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220224-hermeticwiper-ukraine-cyber-warfare/featured.jpg"/></item><item><title>OWASP Top 10 2021 — The Security Landscape Has Shifted</title><link>https://www.osmondvanhemert.nl/posts/210923-owasp-top-10-2021-update/</link><pubDate>Thu, 23 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210923-owasp-top-10-2021-update/</guid><description>The OWASP Top 10 gets its first update since 2017, and the changes reflect how fundamentally our attack surface has evolved.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/210923-owasp-top-10-2021-update/featured.jpg"/></item><item><title>OMIGOD — When Your Cloud Provider Installs Vulnerable Agents Without Telling You</title><link>https://www.osmondvanhemert.nl/posts/210916-azure-omigod-vulnerability-cloud-agents/</link><pubDate>Thu, 16 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210916-azure-omigod-vulnerability-cloud-agents/</guid><description>The OMIGOD vulnerabilities in Azure&amp;rsquo;s silently-installed OMI agent expose a troubling pattern: cloud providers deploying software on your VMs without your knowledge or consent.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/210916-azure-omigod-vulnerability-cloud-agents/featured.jpg"/></item><item><title>Signal's Explosive Growth — What WhatsApp's Privacy Blunder Means for Messaging</title><link>https://www.osmondvanhemert.nl/posts/210121-signal-surge-whatsapp-privacy/</link><pubDate>Thu, 21 Jan 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210121-signal-surge-whatsapp-privacy/</guid><description>WhatsApp&amp;rsquo;s updated privacy policy drives millions to Signal, highlighting the growing demand for privacy-respecting open-source alternatives.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/210121-signal-surge-whatsapp-privacy/featured.jpg"/></item><item><title>NSA and CISA Sound the Alarm on Known Vulnerabilities — And We Should Listen</title><link>https://www.osmondvanhemert.nl/posts/201022-nsa-cisa-china-advisory/</link><pubDate>Thu, 22 Oct 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/201022-nsa-cisa-china-advisory/</guid><description>A joint NSA/CISA advisory details 25 CVEs actively exploited by Chinese state-sponsored actors. The uncomfortable truth: most are well-known and patchable.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/201022-nsa-cisa-china-advisory/featured.jpg"/></item><item><title>The Pandemic IoT Boom — More Devices, More Risk, Same Old Problems</title><link>https://www.osmondvanhemert.nl/posts/200618-iot-growth-pandemic-security/</link><pubDate>Thu, 18 Jun 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/200618-iot-growth-pandemic-security/</guid><description>Home IoT device sales have surged during lockdowns, and every one of those devices just joined a corporate network via VPN. The security implications are significant.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/200618-iot-growth-pandemic-security/featured.jpg"/></item><item><title>Apple and Google's Exposure Notification API — Privacy Engineering at Scale</title><link>https://www.osmondvanhemert.nl/posts/200430-apple-google-exposure-notification-api/</link><pubDate>Thu, 30 Apr 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/200430-apple-google-exposure-notification-api/</guid><description>Apple and Google collaborate on a Bluetooth-based exposure notification system that puts privacy-preserving architecture front and center.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/200430-apple-google-exposure-notification-api/featured.jpg"/></item><item><title>Zoom's Security Reckoning — When Rapid Growth Exposes Technical Debt</title><link>https://www.osmondvanhemert.nl/posts/200326-zoom-security-crisis/</link><pubDate>Thu, 26 Mar 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/200326-zoom-security-crisis/</guid><description>Zoom&amp;rsquo;s explosive pandemic-driven growth is exposing serious security and privacy issues. The &amp;lsquo;Zoombombing&amp;rsquo; phenomenon is just the tip of the iceberg.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/200326-zoom-security-crisis/featured.jpg"/></item><item><title>The Crypto AG Revelation — When Your Encryption Vendor Is the Intelligence Agency</title><link>https://www.osmondvanhemert.nl/posts/200213-cia-crypto-ag-backdoor/</link><pubDate>Thu, 13 Feb 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/200213-cia-crypto-ag-backdoor/</guid><description>The Washington Post reveals the CIA secretly owned Crypto AG for decades, selling compromised encryption to governments worldwide. The supply chain trust implications are staggering.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/200213-cia-crypto-ag-backdoor/featured.jpg"/></item><item><title>The NSA Found a Critical Windows Crypto Bug — And That's Actually Good News</title><link>https://www.osmondvanhemert.nl/posts/200109-nsa-cve-2020-0601-windows-cryptoapi/</link><pubDate>Thu, 09 Jan 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/200109-nsa-cve-2020-0601-windows-cryptoapi/</guid><description>The NSA disclosed CVE-2020-0601, a critical vulnerability in Windows CryptoAPI&amp;rsquo;s certificate validation. The fact that they reported it instead of hoarding it marks a notable shift.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/200109-nsa-cve-2020-0601-windows-cryptoapi/featured.jpg"/></item></channel></rss>