Manufacturing facilities are dynamic, fast-paced environments where safety, quality, and compliance need to be managed with precision. From keeping employees safe on the production floor to maintaining compliance with OSHA, …
Safety & Security
In the next short audio episode, I discuss the myth of “reasonably practicable” within occupational health and safety (OHS) and the moral implications it carries. Safety is …
Google announces Sec-Gemini v1, a new experimental cybersecurity model
Today, we’re announcing Sec-Gemini v1, a new experimental AI model focused on advancing cybersecurity AI frontiers. As outlined a year ago, defenders face the daunting task of securing against all …
Alert: Exploit available to threat actors for SAP S/4HANA critical vulnerability
“This vulnerability could fill in an important gap in an attacker’s arsenal to attack these systems,” he added. “They will still need some credentials, but they could be low-level credentials …
The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security
The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many …
Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
Sep 03, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart contracts for the Ethereum blockchain to …
Managing safety with spreadsheets, email chains, and scattered documents isn’t just frustrating—it’s risky. If you’ve ever lost track of a deadline, missed an inspection, or felt overwhelmed by manual processes, …
For those of you who follow my blog posts but are not prepared to pay a SafetyAtWorkBlog subscription (you know who you are 😁), I have produced a daily audio …
Posted by Jasika Bawa, Andy Lim, and Xinghui Lu, Google Chrome Security Tech support scams are an increasingly prevalent form of cybercrime, characterized by deceptive tactics aimed at extorting money …
Chinese hacking group Salt Typhoon expansion prompts multinational advisory
“The fundamental issue here is that key pieces of our critical infrastructure, for example network technologies like core routers, remain far too easy to compromise and gain persistence on,” said …