Smashing Security podcast #453: The Epstein Files didn’t hide this hacker very well
Supposedly redacted Jeffrey Epstein files can still reveal exactly who they’re talking about – especially when AI, LinkedIn, and a...
Supposedly redacted Jeffrey Epstein files can still reveal exactly who they’re talking about – especially when AI, LinkedIn, and a...
Paris raid on X focuses on child abuse material allegations Pierluigi Paganini February 04, 2026 French prosecutors raided X offices...
AI is now embedded in day-to-day work. Individuals and teams are using the technology to summarize reports, write emails, analyze...
Dan Cole, senior vice president of product management at Sophos, unpacks how cybersecurity strategy is shifting from a prevention-first mindset...
Snir Ben Shimol, CEO and co-founder of Zest Security, talks about why vulnerability and exposure management has become one of...
AI Didnt Break Cybersecurity I keep hearing the same sentence lately, from boards, executives, and even seasoned security leaders: “AI...
AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple...
Image: Windows//Unsplash Microsoft has begun previewing a new Windows 11 update that brings smarter AI features, tighter phone-to-PC continuity, and...
A survey of 506 cybersecurity leaders and practitioners working for organizations with more than 500 employees, published today, finds that...
Image generated by Google Gemini The interim leader of the US’s top civilian cyber defense agency uploaded sensitive government contracting...
Image generated by Google Gemini Google has dropped a security upgrade that could save your data when criminals strike. The...
In episode 85 of The AI Fix, Graham discovers that Silicon Valley has the solution to your pet’s mental health...
The race to standardize agentic commerce just accelerated dramatically. Google’s Universal Commerce Protocol (UCP) is positioning itself as connective tissue...
North Korea–linked KONNI uses AI to build stealthy malware tooling Pierluigi Paganini January 26, 2026 Check Point links an active...
For years, cybersecurity strategy revolved around a simple goal: keep attackers out. That mindset no longer matches reality. Today’s threat...