Connected cars are racing ahead, but security is stuck in neutral

Connected cars are already on Europe’s roads, loaded with software, sensors, and constant data connections. Drivers love the features these vehicles bring, from remote apps to smart navigation, but each new connection also opens a door to potential cyb… Continue reading Connected cars are racing ahead, but security is stuck in neutral

Cybersecurity research is getting new ethics rules, here’s what you need to know

Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the 2026 USENIX Security Symposium, all submissions must include a stakeholder-based ethics analysis. Other major v… Continue reading Cybersecurity research is getting new ethics rules, here’s what you need to know

InterceptSuite: Open-source network traffic interception tool

InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does su… Continue reading InterceptSuite: Open-source network traffic interception tool

LinkedIn expands company verification, mandates workplace checks for certain roles

LinkedIn is rolling out new verification rules to make it easier to confirm that people and companies are who they claim to be. The company will now require workplace verification when someone adds or updates a leadership or recruiter role on their pro… Continue reading LinkedIn expands company verification, mandates workplace checks for certain roles

macOS vulnerability allowed Keychain and iOS app decryption without a password

Today at Nullcon Berlin, a researcher disclosed a macOS vulnerability (CVE-2025-24204) that allowed attackers to read the memory of any process, even with System Integrity Protection (SIP) enabled. The issue stems from Apple mistakenly granting the /us… Continue reading macOS vulnerability allowed Keychain and iOS app decryption without a password

Can AI agents catch what your SOC misses?

A new research project called NetMoniAI shows how AI agents might reshape network monitoring and security. Developed by a team at Texas Tech University, the framework brings together two ideas: distributed monitoring at the edge and AI-driven analysis … Continue reading Can AI agents catch what your SOC misses?

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior

A team of researchers from Frondeur Labs, DistributedApps.ai, and OWASP has developed a new machine learning framework designed to help defenders anticipate attacker behavior across the stages of the Cyber Kill Chain. The work explores how machine lear… Continue reading KillChainGraph: Researchers test machine learning framework for mapping attacker behavior

New framework aims to outsmart malware evasion tricks

Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they may finally have an answer. In a new paper, academics from Inria and the CISPA Helmholtz Center for Information Security… Continue reading New framework aims to outsmart malware evasion tricks

Finding connection and resilience as a CISO

With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and what isn’t. Yet strong peer networks and candid exchanges are critical for resi… Continue reading Finding connection and resilience as a CISO