Escape lands $18 million funding to scale AI-driven offensive security automation

Escape has raised $18 million in Series A funding to automate the entire security lifecycle with AI agents. The round, led by Balderton Capital with participation from Uncorrelated Ventures... Read more »

Law enforcement disrupted Tycoon 2FA phishing-as-a-service platform

Authorities disrupted the Tycoon 2FA phishing-as-a-service platform used to send millions of phishing emails to over 500,000 orgs worldwide. The joint effort, led by Microsoft, Europol, and industry partners,... Read more »

SailPoint expands AI-powered identity security with adaptive identity framework

SailPoint announced significant advancements to its AI-powered SailPoint Platform, introducing the first in a series of capabilities that advance its adaptive identity vision, an approach designed to address the... Read more »

Datadog MCP server delivers live observability to AI agents and IDEs

Datadog has announced the general availability of its MCP Server. For developers embedding AI agents into development and operational workflows, the Datadog MCP Server provides access to live observability... Read more »

OneTrust expands AI governance with real-time monitoring and guardrail enforcement

OneTrust has announced the expansion of its solution to include real‑time monitoring and enforcement capabilities across agents, models, and data. Designed for data, risk, and AI teams, these enhancements... Read more »

Singulr AI’s Agent Pulse delivers enforceable runtime governance and visibility for AI agents

Singulr AI has announced the launch of Agent Pulse, extending its Unified AI Control Plane to autonomous AI agents and model context protocol (MCP) servers. Agent Pulse delivers enforceable... Read more »

Airbus CSO on supply chain blind spots, space threats, and the limits of AI red-teaming

Pascal Andrei, CSO at Airbus, knows that the aerospace and defense sector is facing a threat environment that is evolving faster than most organizations can track. From sub-tier suppliers... Read more »

The people behind cyber extortion are often in their forties

Many cybercrime investigations end with arrests or indictments that reveal little about the people behind the operations. When authorities do disclose demographic details, the pattern that emerges does not... Read more »

Bug bounties are broken, and the best security pros are moving on

Penetration testing engagements are organized as scheduled contracts with defined scope, set testing windows, and direct communication channels with client teams. Cobalt’s 2026 Pentester Profile Report describes growing preference... Read more »

Cybersecurity jobs available right now: March 10, 2026

Associate Director Application Security BioNTech | Germany | On-site – View job details As an Associate Director Application Security, you will lead application security strategy, standardize security processes, and... Read more »
Subscribe to our Newsletter