Vibe coding has cybersecurity asking what AI can — and can’t — replaceLaura FrenchMay 11, 2026Cyber pros balance hype, skepticism and uncertainty as AI coding disrupts industry norms.
Trust or fail: AI unlocks the value of unstructured data but raises new challenges for AI successPaul WagenseilApril 28, 2026
Controlling AI at machine speed: Detecting risk, protecting systems, and reversing mistakesPaul WagenseilApril 24, 2026
Privilege risk is in the lifecycle: A CISO discussion on modernizing identity controlPaul WagenseilApril 20, 2026
IdentitySailPoint GitHub repo hit by third-party cyberattackSteve ZurierMay 11, 2026SailPoint says GitHub repo breach exposed no customer data or production systems.
Vulnerability ManagementFederal agencies ordered to patch Ivanti EPMM zero-day in 3 daysLaura FrenchMay 8, 2026The actively exploited flaw enables remote admin users to execute arbitrary code.
Vulnerability Management‘Dirty Frag’ Linux zero-day exposes most distributions to LPESteve ZurierMay 8, 2026Dirty Frag Linux zero-day exposes most distributions to root privilege escalation.
Vulnerability ManagementPalo Alto Networks says patch for exploited PAN-OS firewall bug forthcomingSteve ZurierMay 7, 2026Palo Alto confirms that its PAN-OS firewalls were actively exploited by a zero-day for more than a month.
RansomwareIranian threat group used Chaos ransomware as a ‘false flag,’ researchers sayLaura FrenchMay 7, 2026The purported ransomware attack did not encrypt files and used infrastructure tied to MuddyWater.
IdentityMost security pros say managing identity has become a major challengeSteve ZurierMay 6, 2026Nearly 9 in 10 security leaders struggle with identity sprawl as AI and NHIs expose governance gaps.
IdentityCloudZ RAT plugin targets Windows Phone Link for possible OTP theftLaura FrenchMay 6, 2026The Pheno plugin monitors active Phone Link connections to eavesdrop on texts and notifications.
Vulnerability ManagementCritical 9.8 Weaver E-cology vulnerability actively exploitedSteve ZurierMay 5, 2026Critical Weaver E-cology bug exploited for RCE, exposing core enterprise workflows and secrets.