Insights

Chainguard Assemble 2026 and the Security Factory Mindset

New York knows how to turn rough ground into something human-friendly. For example, the Liz Christy Garden began in 1973 as the city’s first...

BSidesSLC 2025 – Getting Things Fixed – Keynote On Security Wins (And Fails)

Author, Creator & Presenter: Scott Piper – Principal Cloud Security Researcher at Wiz Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s...

That “job brief” on Google Forms could infect your device

We’ve identified a campaign using business-related lures, such as job interviews, project briefs, and financial document, to distribute malware, including the PureHVNC Remote Access...

Inside AutoSecT: How AI Agents Are Transforming Software Composition Analysis

Most SCA tools do one thing: they tell you when something’s vulnerable. AutoSecT has expanded its scope by incorporating AI-driven Software Composition Analysis, which...

GUEST ESSAY: Executives trust AI security even as security teams confront blind spots, new risks

By Daniel Bardenstein In our recent report, Beyond the Black Box, we found a striking gap: 80% of executives believe their organizations have strong...

Securing Third-Party Procurement Platforms with Enterprise SSO

Introduction Procurement is no longer a back-office function handled through spreadsheets and manual approvals. Modern enterprise teams depend on a growing stack of third-party...

Trending News

EDR killers explained: Beyond the drivers

In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...

Face value: What it takes to fool facial recognition

ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...

Cyber fallout from the Iran war: What to have on your radar

The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...

Sednit reloaded: Back in the trenches

Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...