General
20 articles
Critical Langflow AI bug exploited within 20 hours added to CISA list
Experts warn that the timeframe between disclosure and exploitation will continue to shrink, so teams must prepare.
Metasploit Wrap-Up 03/27/2026
Better NTLM Relaying Functionality This week’s release brings an improvement to the SMB NTLM relay server. In the past, it’s support has been expanded with m...
Friday Squid Blogging: Bioluminescent Bacteria in Squid
The Hawaiian bobtail squid has bioluminescent bacteria.
IBM's Srinivas Tummalapenta: Building the cyber risk intelligence layer
Padraic O’Reilly and Srinivas Tummalapenta explore how cybersecurity is evolving from fragmented data collection to a unified cyber risk intelligence layer.
SC Awards Finalist: Best Professional Certification Program - ISACA - Mary Carmichael - SCA26 #1
IBM's Evelyn Anderson: Enabling autonomous cyber risk programs
Matt Alderman and Evelyn Anderson explore how autonomous security programs are reshaping cyber governance.
Hack the Box's Gibb Witham: Measuring cyber readiness in the age of AI
Gibb Witham explains why organizations must move beyond assumed AI capability toward measurable, validated cyber readiness for both humans and AI systems.
SC Awards Finalist: Best Application Security Solution - RoonCyber - Gene Fay - SCA26 #1
European Parliament rejects extension of CSAM scanning rules for tech platforms
The 311 members of Parliament who voted against an extension did so despite strong support from law enforcement, children’s rights groups, German Chancellor ...
SC Awards Finalist: Best Enterprise Security Solution - Island - Michael Leland - SCA26 #1
Google Sets 2029 Deadline as Quantum Computers Threaten Encryption
Google fast-tracks post-quantum cryptography with a 2029 deadline as researchers warn quantum computers could break current encryption sooner than expected.
SC Awards Finalist: Best Identity Management Solution - Teleport - Diana Jovin - SCA26 #1
ArmorCode's Mark Lambert: AI exposure management and governing shadow AI
Mark Lambert discusses the company's new AI Exposure Management (AIEM) solution.
Microsoft's Arunesh Chandra: The browser in the AI era
Arunesh Chandra discusses why security and IT teams are rethinking the role of the browser.
Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data
The FBI said it was aware of hackers targeting Patel’s personal email, and that no government information was taken. The post Iranian hackers, Handala, claim...
UK weighs new limits on political donations as reports warn of hard-to-trace foreign interference
The parliamentary report warns that hostile actors are conducting sustained and increasingly sophisticated campaigns to interfere in democratic processes, ex...
Lloyds Bank reveals how IT bug exposed transaction data
Lloyds Banking Group has identified the glitch that led to some of its customers being able to see details of other customers’ transactions on March 12. It r...
Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits
Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based attacks and urge the...
Menlo's Ramin Farassat: Why the browser is the front line for agentic AI
Ramin Farassat discusses how a new approach to browser security is required to provide architectural immunity.