Roger A. Grimes

Roger A. Grimes, CPA, CISSP, CEH, MCSE, CISA, CISM, CNE, yada, yada, Data-Driven Defense Evangelist for KnowBe4, Inc., is the author of 14 books and over 1400 articles on computer security, specializing in host security and preventing hacker and malware attacks. Roger is a frequent speaker at national computer security conferences and was the weekly security columnist at InfoWorld and CSO magazines between 2005 - 2019. He has worked at some of the world’s largest computer security companies, including, Foundstone, McAfee, and Microsoft. Roger is frequently interviewed and quoted in the media including Newsweek, CNN, NPR, and WSJ. His presentations are fast-paced and filled with useful facts and recommendations.

2025-07-03

Linux Users Urged to Patch Critical Sudo Vulnerabilities. Allows unauthenticated users to get to root. One vuln has been present for over a decade. Can we, for forever, put to bed the whole "many eyes" theory that open source software is inherently stronger because it can be inspected more for bugs? Can and is is a vast ocean.

infosecurity-magazine.com/news

2025-07-03

Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale. It's not the first, but it's another in a long-line of tools that allow scammers to quickly create personalized fake logon pages on the fly

thehackernews.com/2025/07/verc

2025-07-03

Scammed Brit thought Jennifer Aniston was in love with him —and needed help paying her Apple bill. Sure, why not??

nypost.com/2025/07/02/us-news/

2025-07-03

We are on schedule to have another recorded year of CVE's, just like most years. We had 40,200 vulns last year. We have nearly 24,000 so far this year, at just past half-of-the-year. cvedetails.com/browse-by-date.

2025-07-03

“The number of pieces of magic we still need is declining.” -engineer when describing the improvements in Ocean-2

Great quote I heard while watching a YouTube video on Ocean-2 (a new green energy device that uses sea power) youtube.com/watch?v=Q7Pmgq2JKbI (at the 9:58 mark)

I just loved it. It speaks to engineers solving tough problems on their way to a larger goal

2025-07-02
2025-07-01
2025-07-01

@Cali I don't discount that conclusion

2025-07-01
2025-07-01

Several US-based North Korean fake employee laptop farms shut down, revealing over a hundred fake employees working at US companies.

justice.gov/opa/pr/justice-dep

2025-07-01

@fedops You can, but it's not necessary. Use strong unique passwords or phishing-resistant MFA per site/serivce...that's enough

2025-07-01

@blindcoder At least once a year...so that a stolen or guessed password doesn't stay good forever.

2025-07-01

@mms Stephen Wolfram, Sean Carroll, Steve Gibson...I know lot more.

2025-07-01

@welkin7 We wish. They should be, but aren't. It's terrible cybersecurity. It's people in the loop not taking their job seriously as they should be, led by management that doesn't take it seriously as they should (or severely unresourced so they can't do it right).

2025-06-30

Sean Carroll, a popular and respected theoretical physicist, starting at 46:11, in a longer debate on string theory, says AI will not be able to meet general intelligence in the way we are making and using them now. He's not alone.

youtube.com/watch?v=5m7LnLgvMn

2025-06-27
2025-06-26

Pretty wild! Malware includes text strings to attempt to fool AI-enabled forensic tools. Yep, that's now a thing.

research.checkpoint.com/2025/a

2025-06-25

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst