One stolen credential is all it takes to compromise everything

Attackers often gain access through routine workflows like email logins, browser sessions, and SaaS integrations. A single stolen credential can give them a quick path to move across systems... Read more »

Qodo unveils AI-driven governance system for code quality control

Qodo has unveiled an intelligent Rules System for AI governance that replaces static, manually maintained rule files with a governance layer that automatically generates rules from real code patterns... Read more »

CYBERSPAN brings AI-driven, agentless network detection to MSSP environments

IntelliGenesis has announced the availability of CYBERSPAN for managed security service providers (MSSPs). The AI-driven network detection and response platform, originally developed to protect small and mid-sized contractors in... Read more »

Keenadu backdoor found preinstalled on Android devices, powers Ad fraud campaign

Kaspersky uncovered Keenadu, an Android backdoor used for ad fraud that can even take full control of devices. Kaspersky has identified a new Android malware called Keenadu. It can... Read more »

Lasso’s Intent Deputy secures AI agents through real-time behavioral intent analysis

Lasso Security launched Intent Deputy, a behavioral intent framework designed to secure AI agents at runtime. It delivers real-time insight into AI behavior by interpreting intent, decision flow, and... Read more »

Microsoft Defender update lets SOC teams manage, vet response tools

Microsoft introduced library management in Microsoft Defender to help security analysts working with live response manage scripts and tools they use to triage, investigate and remediate threats. The library... Read more »

Claude Sonnet 4.6 launches with improved coding and expanded developer tools

Anthropic released Claude Sonnet 4.6, marking its second major AI launch in less than two weeks. Scores prior to Claude Sonnet 4.5 (Source: Anthropic) According to Anthropic, Sonnet 4.6... Read more »

AWS coding agents gain new plugin support across development tools

AI coding assistants have become a routine part of many development workflows, helping engineers write, test, and deploy code from IDEs or command line interfaces. One recent change in... Read more »

The defense industrial base is a prime target for cyber disruption

Cyber threats against the defense industrial base (DIB) are intensifying, with adversaries shifting from traditional espionage toward operations designed to disrupt production capacity and compromise supply chains. In this... Read more »

Everyone uses open source, but patching still moves too slowly

Enterprise security teams rely on open source across infrastructure, development pipelines, and production applications, even when they do not track it as a separate category of technology. Open source... Read more »
Subscribe to our Newsletter