
Javvad Malik
Blogger at J4vv4D
Co-Host at The Host Unknown Podcast
I'm over here now::: https://t.co/xOr9asCJHv
Articles
-
3 weeks ago |
yorkshirepost.co.uk | Javvad Malik
While these moves look great on paper, there's always a downside with digital advancements: cyberattacks. Although the April 2025 blackouts in Portugal, France and Spain weren't confirmed as a cyberattack, it perfectly illustrates the cascading vulnerabilities in our interconnected power systems.
-
3 weeks ago |
blog.knowbe4.com | Javvad Malik
You know what's interesting about data breaches? Everyone focuses on credit card numbers and financial data, but the reality is that every piece of information has value to someone. The Legal Aid breach perfectly illustrates this point, with over two million pieces of information accessed including details about domestic abuse victims, family cases, and criminal proceedings.
-
3 weeks ago |
computerweekly.com | Javvad Malik
Remember the scramble for USB blockers because staff kept plugging in mysterious flash drives? Or the sudden surge in blocking cloud storage because employees were sharing sensitive documents through personal Dropbox accounts? Today, we face a similar scenario with unauthorised AI use, but this time, the stakes are potentially higher. The challenge isn't just about data leakage anymore, although that remains a significant concern.
-
1 month ago |
journaldunet.com | Javvad Malik
Décrits comme révolutionnaires et disruptifs, les agents IA sont devenus le nouveau pilier de l'innovation en 2025. Comme pour toute technologie de pointe, cette évolution n'est pas sans compromis. Ce nouveau mélange d’intelligence et d’autonomie inaugurera-t-il réellement une nouvelle ère d’efficacité ? Ou bien la capacité des agents IA à agir de manière indépendante élargit-elle la surface d’attaque pour les cybermenaces, les rendant potentiellement risqués ?
-
1 month ago |
techradar.com | Javvad Malik
(Image credit: Shutterstock / ZinetroN)The Ministry of Defence (MOD) recently published a document on 'Secure by Design' challenges that represents something we rarely see in government cybersecurity: a transparent acknowledgment of the complexities involved in implementing security from first principles. Secure by design is a fundamental approach that embeds security into systems from the very beginning of the design process as opposed to treating it as a bolt-on feature later in development.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 16K
- Tweets
- 41K
- DMs Open
- No

With Google's Veo 3 and similar advancing rapidly, you can now produce high quality short videos, complete with realistic dialogue and sound design. If the content is engaging and the production quality is high, do you care whether it was created by a human or an AI? Is conte…

#OSINTCHALLENGE you'll never guess where I am. Look at that sunshine!

A great post by my wonderful colleague Rebecca Bailey on what to do about repeat clickers. Based on research, interviews, and providing some genuine insights into what makes repeater clickers... click. https://t.co/eZC0mVmxVl