How AI Assistants are Moving the Security Goalposts
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate...
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate...
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can...
In December 2024, millions of users woke up to find that their "productivity tool" Chrome extensions had transformed overnight...
Tycoon 2FA, a major phishing kit and platform that allowed low-skilled cybercriminals to bypass multifactor authentication and conduct large-scale adversary-in-the-middle...
“And all Windows computers should already be restricted so that random, unsigned (not signed by the organization), PowerShell commands should...
In this day and age, it means how well your systems run artificial intelligence. We know that every single one...
Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various...
“Since co-founding Brinqa 17 years ago, the biggest lesson I have been taught is that talent is the hardest...
The average SOC manages 83 security tools from nearly 30 vendors. If that number surprises you, you’ve probably never...
A few weeks ago, I wrote that CISA looked like it was on life support. A few days later,...
Here's a statement that should make any security architect pause: In most enterprise environments today, machine identities – service...
Here's a statement that should make any security architect pause: In most enterprise environments today, machine identities – service...
Ravie LakshmananMar 05, 2026Vulnerability / Enterprise Security Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN...
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at...
The Art of War famously teaches that the most effective strategy is to defeat an adversary by turning the...