This spy tool has been quietly stealing data for years

ESET researchers have traced the resurgence of Sednit through a modern toolkit built around two complementary implants, BeardShell and Covenant, each relying on a separate cloud provider to ensure operational resilience. This dual-implant architecture … Continue reading This spy tool has been quietly stealing data for years

Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: BlacksmithAI: Open-source AI-powered penetration testing framework BlacksmithAI is an open-source penetration testing framework that uses multiple AI agen… Continue reading Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast

March 2026 Patch Tuesday forecast: Is AI security an oxymoron?

Developers and analysts are using more AI tools to produce code and to test both the performance and security of the finished products. They are also embedding AI functionality in their products directly. But just how secure are these AI tools and rout… Continue reading March 2026 Patch Tuesday forecast: Is AI security an oxymoron?

Engineering trust: A security blueprint for autonomous AI agents

AI agents have evolved from just chatbots, answering questions to executing actions using various integrated tools, often autonomously, and as such the traditional security models have become less efficient. I have seen that firsthand as a security lea… Continue reading Engineering trust: A security blueprint for autonomous AI agents

The vulnerability that turns your AI agent against you

Zenity Labs disclosed PleaseFix, a family of critical vulnerabilities affecting agentic browsers, including Perplexity Comet, that allow attackers to hijack AI agents, access local files, and steal credentials within authenticated user sessions. The vu… Continue reading The vulnerability that turns your AI agent against you

Why workforce identity is still a vulnerability, and what to do about it

Most organizations believe they have workforce identity under control. New hires are verified. Accounts are provisioned. Multi-factor authentication is enforced. Audits are passed. Then a breach happens, often through an account that was “properly secu… Continue reading Why workforce identity is still a vulnerability, and what to do about it

Secure by Design: Building security in at the beginning

Secure by Design is not a single tool, product, or one‑time activity. It is a holistic approach that requires security to be deliberately embedded from the very beginning, at the point where systems, software, and services are conceived and designed. R… Continue reading Secure by Design: Building security in at the beginning

Keepnet launches AI incident response agents that redefine post-delivery email threat containment

Keepnet, the AI-powered Extended Human Risk Management (xHRM) platform, today announced the launch of its AI-Driven Email Incident Response Agents — autonomous AI agents that analyze, decide, act, and continuously learn to contain employee-reported ema… Continue reading Keepnet launches AI incident response agents that redefine post-delivery email threat containment