Cyber Security

Cloudbrink adds AI innovations to its platform to prote...

Cloudbrink has expanded security and performance benefits for AI agents and onli...

Yubico extends hardware passkey deployment options

Yubico announced a significant expansion of YubiKey as a Service, introducing ne...

Teleport’s Agentic Identity Framework protects AI agent...

Teleport has unveiled the Teleport Agentic Identity Framework, an AI-centered fr...

Pondurance RansomSnare blocks file encryption and data ...

Pondurance launched RansomSnare, a new module for its MDR service that halts ran...

Volante’s Multi-cloud Resiliency Service keeps payments...

Volante Technologies announced the launch of its Multi-cloud Resiliency Service,...

WhatsApp rolls out new security feature to protect user...

To add an extra layer of protection to its end-to-end encryption, WhatsApp has b...

Android just got smarter at stopping snatch-and-run pho...

Google announced updates to the Android theft protection features that expand ex...

CERT UEFI Parser: Open-source tool exposes UEFI archite...

CERT UEFI Parser, a new open-source security analysis tool from the CERT Coordin...

Why prevention-first secrets security will define enter...

Once a secret enters Git, it’s expensive to remediate. But the real problem runs...

Grammarly and QuillBot are among widely used Chrome ext...

A new study shows that some of the most widely used AI-powered browser extension...

Audits for AI systems that keep changing

Security and risk teams often rely on documentation and audit artifacts that ref...

Fortinet Patches CVE-2026-24858 After Active FortiOS SS...

Fortinet has begun releasing security updates to address a critical flaw impacti...

Fortinet starts patching exploited FortiCloud SSO zero-...

Fortinet has begun releasing FortiOS versions that fix CVE-2026-24858, a critica...

AI & the Death of Accuracy: What It Means for Zero-...

AI "model collapse," where LLMs over time train on more and more AI-generated da...

Vibe-Coded 'Sicarii' Ransomware Can't Be Decrypted

A new ransomware strain that entered the scene last year has poorly designed cod...

Critical Telnet Server Flaw Exposes Forgotten Attack Su...

While telnet is considered obsolete, the network protocol is still used by hundr...