Insights

ConFoo 2026: Guardrails for Agentic AI, Prompts, and Supply Chains

Montreal has a guardrail baked into its skyline. The “mountain restriction" keeps most buildings from rising higher than the cross on top of Mount...

USENIX Security ’25 (Enigma Track) – Trusted Hardware For Al Workloads: Extending Confidential Computing To Enable Al Adoption

Author, Creator & Presenter: Shannon Egan, Deep Science VenturesAs companies race to adopt AI in new use cases, hardware vendors and cloud providers are...

Quiz sites trick users into enabling unwanted browser notifications

Our support team flagged a number of customers who suspected their device might be infected with malware, but Malwarebytes scans came up empty. When...

An AI-Powered Poly-Crisis Is Here, and It Is Rewriting Cyber Postures. Are You Breach Ready Yet?

Unless you have been living under a rock over the past few days, you would have seen that AI-powered adversaries are significantly altering how...

New Attack Against Wi-Fi

It’s called AirSnitch: Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a...

7 Most Influential Women in Cybersecurity You Should Follow in 2026

On April 18, 2016, the US Department of Defense did something it had never done in its history. It invited hackers in. 13 minutes...

Trending News

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...