Insights
Chainguard Assemble 2026 and the Security Factory Mindset
New York knows how to turn rough ground into something human-friendly. For example, the Liz Christy Garden began in 1973 as the city’s first...
BSidesSLC 2025 – Getting Things Fixed – Keynote On Security Wins (And Fails)
Author, Creator & Presenter: Scott Piper – Principal Cloud Security Researcher at Wiz Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s...
That “job brief” on Google Forms could infect your device
We’ve identified a campaign using business-related lures, such as job interviews, project briefs, and financial document, to distribute malware, including the PureHVNC Remote Access...
Inside AutoSecT: How AI Agents Are Transforming Software Composition Analysis
Most SCA tools do one thing: they tell you when something’s vulnerable. AutoSecT has expanded its scope by incorporating AI-driven Software Composition Analysis, which...
GUEST ESSAY: Executives trust AI security even as security teams confront blind spots, new risks
By Daniel Bardenstein In our recent report, Beyond the Black Box, we found a striking gap: 80% of executives believe their organizations have strong...
Securing Third-Party Procurement Platforms with Enterprise SSO
Introduction Procurement is no longer a back-office function handled through spreadsheets and manual approvals. Modern enterprise teams depend on a growing stack of third-party...
Trending News
EDR killers explained: Beyond the drivers
In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...
Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...
Cyber fallout from the Iran war: What to have on your radar
The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...
Sednit reloaded: Back in the trenches
Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
How SMBs use threat research and MDR to build a defensive edge
Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...
