🔐 Security

Product showcase: Cogent Community democratizes vulnera...

Cogent Community helps security teams analyze vulnerabilities, understand exploi...

Zenity delivers runtime protection for OpenAI’s AgentKi...

Zenity runtime protection for OpenAI’s AgentKit provides enterprise-grade enforc...

Cybersecurity M&A Roundup: 45 Deals Announced in Octobe...

Significant cybersecurity M&A deals announced by Jamf, LevelBlue, Ping Identity,...

Claude AI APIs Can Be Abused for Data Exfiltration | Cu...

An attacker can inject indirect prompts to trick the model into harvesting user ...

Cyber-espionage campaign mirroring Sandworm TTPs hit Ru...

A spear-phishing campaign aimed to compromise Russian and Belarusian military pe...

Chinese APT Uses ‘Airstalk’ Malware in Supply Chain Att...

PowerShell and .NET variants of the malware abuse AirWatch’s MDM API to establis...

In Other News: WhatsApp Passkey-Encrypted Backups, Russ...

Other noteworthy stories that might have slipped under the radar: several intere...

Chinese APT Uses ‘Airstalk’ Malware in Supply Chain Att...

PowerShell and .NET variants of the malware abuse AirWatch’s MDM API to establis...

In Other News: WhatsApp Passkey-Encrypted Backups, Russ...

Other noteworthy stories that might have slipped under the radar: several intere...

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody | Cur...

A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to...

A new way to think about zero trust for workloads | Cu...

A new zero trust workload authentication framework uses short-lived tokens to re...

Heisenberg: Open-source software supply chain health ch...

The open-source tool Heisenberg helps developers spot risky dependencies early, ...