Confidence in AI-powered cyber must be earned, not assumed

In security, familiar testing and validation approaches are not enough when it comes to AI. The question is not just whether an AI-powered tool works but how it actually... Read more »

Microsoft patches 80+ vulnerabilities, six flagged as “more likely” to be exploited

On March 2026 Patch Tuesday, Microsoft addressed 80+ vulnerabilities affecting its software and cloud services. Of these, two were publicly disclosed, but not actively exploited. Privilege escalation vulnerabilities abound... Read more »

Strong security balances consolidation and best-of-breed capabilities

The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and ‘integration theater, and how to protect unified platforms. Read more »

Child rapist could have profiled victims through unaudited access to NHS databases

NHS analyst’s conviction for child sexual abuse offences raises concerns over unaudited access to patient data Read more »

YouTube draws a line on deepfakes involving politicians and journalists

With deepfakes becoming more common, YouTube has expanded access to its AI-driven likeness detection system to a pilot group of government officials, journalists and political candidates. The step follows... Read more »

KadNap bot compromises 14,000+ devices to route malicious traffic

KadNap malware infects 14,000+ edge devices, mainly Asus routers, turning them into a stealth proxy botnet used to route malicious internet traffic. KadNap malware infects more than 14,000 edge... Read more »

Armis improves vulnerability accuracy and speed with unified real-time visibility

Armis has announced Armis Centrix for Vulnerability Management Detection and Response. The solution enables security teams to identify and validate vulnerabilities across all organizational assets in real time. Armis’... Read more »

Virtana enables full-stack root cause analysis beyond legacy APM

Virtana has launched an Application Observability offering that traces performance issues from application code through infrastructure, networks, storage, and AI workloads to deliver evidence-based root cause analysis without manual... Read more »

Forescout replaces manual audits with automated, always-on compliance validation

Forescout Technologies has announced Automated Security Controls Assessment, a new Forescout 4D Platform capability that continuously evaluates trust, control effectiveness and compliance posture across an organization’s attack surface. Replacing... Read more »

OPSWAT delivers AI-powered perimeter defense with unified zero-day verdicts

OPSWAT has introduced MetaDefender Aether, an AI-powered decision engine for fast zero-day detection, purpose-built for the perimeter. Unlike sandbox or antivirus solutions designed for endpoint protection, MetaDefender Aether intercepts... Read more »
Subscribe to our Newsletter