Critical Langflow AI bug exploited within 20 hours added to CISA list
Experts warn that the timeframe between disclosure and exploitation will continue to shrink, so teams must prepare.
Highly organized RaaS that leaked its own playbook in 2022. Responsible for attacks on the Irish Health Service and Costa Rican government.
Also known as: conti ransomware, conti gang, conti malware
Experts warn that the timeframe between disclosure and exploitation will continue to shrink, so teams must prepare.
A new AITM phishing campaign targets TikTok Business accounts to hijack them for malvertising, continuing tactics seen in earlier Google-themed scams. Push S...
Identity talks in San Francisco focused on new realities challenging traditional authentication schemes.
TeamPCP continues is supply chain compromise rampage, with telnyx on PyPI being the latest maliciously modified package. What happened?
Code keeps moving through pipelines, and credentials continue to surface alongside it. GitGuardian’s State of Secrets Sprawl 2026 puts the count at 28.
Chris Wallis explores whether AI can bridge the divide between finding vulnerabilities and understanding real-world attack context as exploit windows continu...
Travis Wong explores why measuring risk in dollars changes the conversation at the board level.
DataBahn.ai has announced Autonomous In-Stream Data Intelligence (AIDI), a new operating model for security data pipelines in which data is continuously inte...
Rajesh Khazanchi explores why breach readiness has become mission-critical for business continuity.
Officials at the Dutch Ministry of Finance disclosed that the ministry's primary internal systems have been taken offline as an investigation continues to de...
Veeam awarded for Veeam Data Platform, combining ransomware resilience with advanced recovery tools.
Reach Security wins for AI-driven CTEM platform enabling autonomous exposure detection and remediation.
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have st...
Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk from cyber threats, says the Ab...
The 200-day TLS certificates signals a structural change in cryptographic trust. Continuous enforcement is key.
Key Takeaways DevSecOps harmony exists when development and security teams operate on a shared definition of risk using consistent data, identifiers, and pri...
Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenar...
Key Takeaways Why Audit Readiness Still Feels Reactive? Security and Compliance teams generate continuous findings, evidence, and control data across multipl...
Cloudflare will be integrating Mastercard’s RiskRecon attack surface intelligence capabilities to help you eliminate Internet-facing blind spots while contin...