Shared Links (weekly) Dec. 28, 2025
For more like this, subscribe to the newsletter and get these links and more in your email.
Follow these topics: Weekly Links
WHEN THE BOTNET named Mirai first appeared in September, it announced its existence with dramatic flair. After flooding a prominent security journalist’s website with traffic from zombie Internet of Things devices, it managed to make much of the internet unavailable for millions of people by overwhelming Dyn, a company that provides a significant portion of…
Mental Health In Cybersecurity—51% Of Workers Take Meds, Me Included
Mandatory Student Spyware Is Creating a Perfect Storm of Human Rights Abuses
Humans still weakest link in cybersecurity– Not a surprise
Interference with Third-Party Production Leads to Sanctions for Google
Social media blamed for $1B in crypto scam losses in 2021– Don’t let an online stranger convince you to invest with them in crypto.
Remember to Object if a Party Producing ESI as 15 PDFs Equaling 35,000 Pages
I’m unsurprised by this and unsure why anyone would be surprised: Researchers find that the more people use AI at their job, the less critical thinking they use. I’ve pointed out before that the promise of AI taking over tasks and freeing employees up to do more strategic decision-making falls apart when considering how many…
Time to address mental health issues in the workplace, UN agencies urge
Why MFA matters: These attackers cracked admin accounts then used Exchange to send spam
Defendant Found Slacking: Default Judgment Issued for Discovery Abuses
How embracing a soft leadership style changes your ability to attract talent
Introverts are dreading a return to the noise, crowds and small talk of ‘normal’ life
Why Now Is the Best Time in 20 Years to Make a Job Move in E-Discovery
How to Manage Your Total Cost of Review: Keeping Collections on Target
– It’s simple really, collect less data and everything costs less.
Why do phishing attacks work? Blame the humans, not the technology
As The Talent Wars Ramp Up, How Poach-Proof Are Your Employees?
Technology, processes and people can close the cyber talent gap
Hacked companies had backup plans. But they didn’t print them out before the attack.
– the files were encrypted as part of the attack. Oops.