Kevin Poireault's profile photo

Kevin Poireault

London

Tech reporter @InfosecurityMag • @coupecircuit_ | 🌍⚽🥊

Articles

  • 5 days ago | infosecurity-magazine.com | Kevin Poireault

    Google has begun integrating Gemini Nano, its on-device large language model (LLM), into the latest version of the Chrome browser to combat online spam, scams and phishing campaigns. As it released its latest version of its browser, Chrome 137, Google announced that it was experimenting with the on-device LLM as an additional layer of protection in the Enhanced Protection mode of the new browser version’s Safe Browsing service.

  • 5 days ago | infosecurity-magazine.com | Kevin Poireault

    Edge devices have become prime targets for cyber threat actors, particularly routers that are no longer receiving security updates and patches, leaving them vulnerable to exploitation. The FBI recently published a report sharing new findings about threat actors exploiting known vulnerabilities to compromise obsolete routers, also dubbed as end-of-life (EOL) routers in the cyber community.

  • 6 days ago | infosecurity-magazine.com | Kevin Poireault

    LockBit, one of the most notorious and prolific cybercrime groups, has been compromised, handing law enforcement and threat intelligence experts a trove of critical insider information. On May 7, a cyber threat actor known as “Rey” on X discovered that LockBit’s dark web affiliate panels had been defaced and replaced with a message and a download link to a leaked SQL database.

  • 6 days ago | infosecurity-magazine.com | Kevin Poireault

    After years of generative AI adoption, the buzz has waned and attackers and defenders alike are working hard to integrate AI-powered tools into real-world use cases. Reducing the barrier to entry for script kiddies and enabling new capabilities for high-skilled black hat hackers means AI is on every defender’s mind. AI-generated cyber-attacks were cited as the primary threat to orgnaizations in the Infosecurity Europe Cybersecurity Trends Report 2025.

  • 6 days ago | infosecurity-magazine.com | Kevin Poireault

    Endpoint Detection and Response (EDR) solutions have become standard cybersecurity products in most organizations, yet they are not infallible.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
1K
Tweets
5K
DMs Open
Yes
Kevin Poireault
Kevin Poireault @kpoireault
7 May 25

RT @lorenzofb: NEW: CrowdStrike announced that it will lay off around 500 workers as part of "a strategic plan" to "to evolve its operatio…

Kevin Poireault
Kevin Poireault @kpoireault
6 May 25

RT @BushidoToken: New Blog! Ransomware Tool Matrix Project Updates: May 2025 • Old Guard: Qilin, BlackSuit, RansomEXX, Medusa, BianLian, H…

Kevin Poireault
Kevin Poireault @kpoireault
29 Apr 25

RT @JohnHultquist: The French government confirms Olympics related activity tied to APT28 in lead up to Paris games. The era of Russian Oly…