AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations

Google and its Mandiant threat intelligence unit have released AuraInspector, an open-source tool aimed at auditing data access paths in Salesforce Experience Cloud applications. The tool focuses on the Aura framework, which underpins many Salesforce u… Continue reading AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations

Parrot OS shares its 2026 plans for security tools and platform support

Parrot OS is a Debian-based Linux distribution built for cybersecurity work. Security practitioners use it for penetration testing, digital forensics, malware analysis, and privacy-focused research. The operating system bundles security tools, developm… Continue reading Parrot OS shares its 2026 plans for security tools and platform support

Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains

Security teams are dealing with pressures tied to AI use, geopolitical instability, and expanding cybercrime that reach beyond technical controls, according to findings from the World Economic Forum’s Global Cybersecurity Outlook 2026. AI drives risk g… Continue reading Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains

What insurers expect from cyber risk in 2026

Technology shifts, policy decisions, and attacker behavior are changing at the same time, and their effects increasingly overlap. Insurers, brokers, and security teams are feeling that pressure across underwriting, claims, and risk management. A new gl… Continue reading What insurers expect from cyber risk in 2026

Claude connects to more healthcare data under security oversight

Healthcare teams are evaluating a range of AI tools for workflows tied to coverage, coding, care coordination, and trials. Anthropic announced expanded healthcare and life sciences offerings for its Claude model with a set of connectors, task skills, a… Continue reading Claude connects to more healthcare data under security oversight

Debian 13.3 is now available with targeted corrections, updates

Debian 13.3 is the third maintenance update for the stable Debian 13 distribution, codenamed “trixie”. It updates package content to address security and other issues reported since the last point update. This release includes more than 100 adjustments… Continue reading Debian 13.3 is now available with targeted corrections, updates

Downtime pushes resilience planning into security operations

CISOs describe a shift in how they define success. New research from Absolute Security shows broad agreement that resilience outweighs security goals centered on prevention alone. Security leaders increasingly define their role around keeping the busin… Continue reading Downtime pushes resilience planning into security operations

Product showcase: TrackerControl lets Android users see who’s tracking them

TrackerControl is an open-source Android application designed to give users visibility into and control over the hidden data within mobile apps. Many apps routinely communicate with third-party services that collect information about usage. TrackerCont… Continue reading Product showcase: TrackerControl lets Android users see who’s tracking them

Security teams are paying more attention to the energy cost of detection

Security teams spend a lot of time explaining why detection systems need more compute. Cloud bills rise, models retrain more often, and new analytics pipelines get added to existing stacks. Those conversations usually stay focused on coverage and accur… Continue reading Security teams are paying more attention to the energy cost of detection