Hexnode CEO: MacBook Neo forces IT to rethink its budget laptop strategy
I spoke with Pavithran just before that launch. Apple Business will almost certainly help the MacBook Neo open up more...
I spoke with Pavithran just before that launch. Apple Business will almost certainly help the MacBook Neo open up more...
The speed of AI adoption is unlike any tech shift we’ve seen before. While the transition to SaaS and...
Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure Pierluigi Paganini March 19, 2026 The Interlock ransomware...
Electric power infrastructure is becoming more connected than ever before. Organizations responsible for operating the Bulk Electric System (BES) are...
Russia-linked APT28 exploited MSHTML zero-day CVE-2026-21513 before patch Pierluigi Paganini March 02, 2026 Russia-linked APT28 reportedly exploited MSHTML zero-day CVE-2026-21513...
Beyond the CLI: 5 Governance Questions Every CISO Must Ask Before Deploying Claude Code As CISOs, we’ve spent the last...
Before launching their Comet browser, Perplexity hired us to test the security of their AI-powered browsing features. Using adversarial...
We’ve all seen this before: a developer deploys a new cloud workload and grants overly broad permissions just to keep...
Long before Taco Tuesday became part of the pop-culture vernacular, Tuesdays were synonymous with security — and for anyone in...
Reynolds ransomware uses BYOVD to disable security before encryption Pierluigi Paganini February 11, 2026 Researchers discovered Reynolds ransomware, which uses...
Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure Pierluigi Paganini February 03, 2026 Hackers exploit...
Before heading off to battle, King Arthur gives Lancelot the key to Guinevere’s chastity belt with solemn instructions: If Arthur...
I’ve seen this movie before. That’s why a recent LinkedIn post by Ilya Kabanov stopped me mid-doomscroll. Kabanov described how...