Flaws in Popular Software Development App Extensions Allow Data Exfiltration
Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched
20 articles
Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched
Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.
Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech soverei...
Prompt Security from SentinelOne turns hidden agent activity into clear, actionable governance intelligence with the release of OneClaw.
Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bug...
Police in The Netherlands say they have arrested a 40-year-old man on suspicion of hacking..
SentinelOne secures AI from infrastructure to agents, delivering visibility, governance, and control at scale.
Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development
iOS 26.
Secure the Agentic Endpoint. Traditional security misses the risk of AI agents.
Teleport study reveals that organizations running over-privileged AI have a 76% incident rate
Unit 42 Managed XSIAM 2.0 delivers a 24/7 managed SOC with continuous detection, investigation, and full-cycle remediation.
When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
March 10, 2026: This post has been updated to note that Amazon Q Detector Library describes the detectors used during code reviews to identify security and q...
Security researchers have challenged end-to-end encryption claims from popular commercial password managers
NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations
Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations
Learn how network intelligence gives security teams control over threat investigation with global visibility—no more drowning in generic, passive threat feeds.
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk