32% of top-exploited vulnerabilities are over a decade old
Exploitation timelines continued to compress in enterprise environments, with newly disclosed flaws reaching active use almost immediately and older weaknesses remaining …
Microsoft details AI prompt abuse techniques targeting AI assistants
Prompt abuse occurs when crafted inputs manipulate an AI system into producing unintended behavior, such as attempting to access sensitive information or overriding built-in …
NVIDIA puts GPU orchestration in community hands
GPU-accelerated AI workloads now run on Kubernetes in the large majority of enterprise environments. Managing those workloads at scale has required specialized tooling that, …
Check Point unveils AI Defense Plane to govern and secure enterprise AI systems
Check Point has announced the Check Point AI Defense Plane, a unified AI security control plane designed to help enterprises govern how AI is connected, deployed, and operated …
Protos AI delivers agent-driven threat intelligence without vendor lock-in
Protos Labs has announced the launch of a freemium edition of Protos AI, a platform that deploys specialized AI agents augmenting cyber threat intelligence (CTI) analyst teams …
AiStrike cuts alert noise with Continuous Detection Engineering
AiStrike has launched Continuous Detection Engineering, a capability that transforms how security operations teams manage detections, shifting from reactive alert triage to …
GitHub-hosted malware campaign uses split payload to evade detection
A large-scale malware delivery campaign has been targeting developers, gamers, and general users through fake tools hosted on GitHub, Netskope researchers have warned. These …
SecurityScorecard automates third-party risk management with TITAN AI
SecurityScorecard has introduced TITAN AI to automate third-party risk management, replacing manual processes with continuous, AI-driven intelligence. TITAN AI is built on top …
Lumu enhances Defender to detect compromise across network, cloud, endpoint, and identity
Lumu has upgraded its Lumu Defender NDR solution, extending Continuous Compromise Assessment beyond the network to include endpoints, cloud environments, and user behavior for …
Tuskira replaces centralized detection model with real-time, distributed approach
Tuskira has released its Federated Detection Engine, a new capability within its Agentic SecOps platform that enables real-time threat detection across cloud, identity, …
Zenity advances context-aware security for AI agents
Zenity has unveiled continuous, contextual security for AI agents, a new approach that transforms how enterprise AI systems are secured and sets the foundation for Guardian …
Coro automates security operations with end-to-end threat detection and response
Coro has expanded AI-driven security operations capabilities that automate the full lifecycle of threat detection and response, enabling organizations to identify, …
Featured news
Resources
Don't miss
- Why AI changed the threat model for travel technology
- AI red teaming agents change how LLMs get tested
- Verizon DBIR: Vulnerability exploitation is the dominant initial access vector
- TeamPCP breached GitHub’s internal codebase via poisoned VS Code extension
- Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585)