Insights

How AI Agents Automate CVE Vulnerability Research

The CVE Researcher is a multi-agent AI pipeline that automates vulnerability research, detection template generation, and exploitation analysis. Built on Google’s Agent Development Kit...

How to understand and avoid Advanced Persistent Threats

By definition, an advanced persistent threat (APT) is a prolonged, targeted attack on a specific victim with the intention to compromise their system and gain information...

Emulating the Systematic LokiLocker Ransomware

LokiLocker is a Ransomware-as-a-Service (Raas) that has been active since at least mid-August 2021 targeting Windows systems. The ransomware is developed in .NET and...

OpenClaw Security Risk: OAuth and SaaS Identity

OpenClaw runs on an employee’s machine. But the access it creates lives inside Slack, Salesforce, Google Workspace, GitHub, and other business-critical SaaS applications. This...

Life in the Swimlane with Chris Mallow, Partner Solutions Architect

Feb 26, 2026 Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners to learn more about their...

NATO approves iPhone and iPad to handle classified info

As part of that effort, BSI conducted a comprehensive series of assessments and tests, including deep security analysis, to make sure that the security capabilities Apple has already put in...

Trending News

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...

PromptSpy ushers in the era of Android threats using GenAI

ESET researchers uncovered the first known case of Android malware abusing generative AI for context-aware user interface manipulation. While machine learning has been used to...

Is Poshmark safe? How to buy and sell without getting scammed

Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can...

Is it OK to let your children post selfies online?

Kids Online When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech....

Naming and shaming: How ransomware groups tighten the screws on victims

Ransomware When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle 12 Feb...

Taxing times: Top IRS scams to look out for in 2026

It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy. Phil Muncaster 10 Feb 2026...