Cyber Security

Critical NetScaler ADC, Gateway flaw may soon be exploi...

Citrix has fixed two vulnerabilities in NetScaler ADC and NetScaler Gateway, wit...

The AI safety conversation is focused on the wrong layer

Organizations have spent years accumulating fragmented identity systems: too man...

How a Large Bank Uses AI Digital Twins for Threat Hunting

JPMorgan Chase uses digital fingerprints and digital twins to spot online attack...

AiStrike cuts alert noise with Continuous Detection Eng...

AiStrike has launched Continuous Detection Engineering, a capability that transf...

Protos AI delivers agent-driven threat intelligence wit...

Protos Labs has announced the launch of a freemium edition of Protos AI, a platf...

Check Point unveils AI Defense Plane to govern and secu...

Check Point has announced the Check Point AI Defense Plane, a unified AI securit...

NVIDIA puts GPU orchestration in community hands

GPU-accelerated AI workloads now run on Kubernetes in the large majority of ente...

Microsoft details AI prompt abuse techniques targeting ...

Prompt abuse occurs when crafted inputs manipulate an AI system into producing u...

32% of top-exploited vulnerabilities are over a decade old

Exploitation timelines continued to compress in enterprise environments, with ne...

Detectify uncovers hidden assets and risks across entir...

Detectify has launched IP Range Scanning, enabling continuous discovery and moni...

Microsoft Proposes Better Identity, Guardrails for AI A...

Companies need better controls to manage key threats rising from the growth of a...

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wall...

Cybersecurity researchers have uncovered a new set of malicious npm packages tha...

5 Learnings from the First-Ever Gartner Market Guide fo...

On February 25, 2026, Gartner published its inaugural Market Guide for Guardian ...

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI ...

Two more GitHub Actions workflows have become the latest to be compromised by cr...

The Hidden Cost of Cybersecurity Specialization: Losing...

Cybersecurity has changed fast. Roles are more specialized, and tooling is more ...

GitHub just made it much harder to ship a vulnerable pu...

GitHub is expanding its application security capabilities with AI-powered securi...