Insights
How AI Agents Automate CVE Vulnerability Research
The CVE Researcher is a multi-agent AI pipeline that automates vulnerability research, detection template generation, and exploitation analysis. Built on Google’s Agent Development Kit...
How to understand and avoid Advanced Persistent Threats
By definition, an advanced persistent threat (APT) is a prolonged, targeted attack on a specific victim with the intention to compromise their system and gain information...
Emulating the Systematic LokiLocker Ransomware
LokiLocker is a Ransomware-as-a-Service (Raas) that has been active since at least mid-August 2021 targeting Windows systems. The ransomware is developed in .NET and...
OpenClaw Security Risk: OAuth and SaaS Identity
OpenClaw runs on an employee’s machine. But the access it creates lives inside Slack, Salesforce, Google Workspace, GitHub, and other business-critical SaaS applications. This...
Life in the Swimlane with Chris Mallow, Partner Solutions Architect
Feb 26, 2026 Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners to learn more about their...
NATO approves iPhone and iPad to handle classified info
As part of that effort, BSI conducted a comprehensive series of assessments and tests, including deep security analysis, to make sure that the security capabilities Apple has already put in...
Trending News
Faking it on the phone: How to tell if a voice call is AI or not
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...
PromptSpy ushers in the era of Android threats using GenAI
ESET researchers uncovered the first known case of Android malware abusing generative AI for context-aware user interface manipulation. While machine learning has been used to...
Is Poshmark safe? How to buy and sell without getting scammed
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can...
Is it OK to let your children post selfies online?
Kids Online When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech....
Naming and shaming: How ransomware groups tighten the screws on victims
Ransomware When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle 12 Feb...
Taxing times: Top IRS scams to look out for in 2026
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy. Phil Muncaster 10 Feb 2026...
