AI browser extensions more likely to have known vulnerabilities, report saysLaura FrenchApril 13, 2026AI extensions are also more likely to have cookie, scripting and tabs permissions.
Capability-centric governance redefines access control for legacy systemsTuhin Banerjee April 10, 2026
Blind spots at scale: The hidden risks of identity visibility gaps and shadow AIPaul WagenseilApril 10, 2026
AI benefits/risksBessent, Powell met privately with top bankers over impact of Claude Mythos on cybersecuritySteve ZurierApril 10, 2026Security pros say companies that spend less money than most large banks on cyber should take this as a warning to get moving.
PhishingLinux Foundation leader impersonated in Slack phishing campaignLaura FrenchApril 10, 2026The campaign targets open-source developers to steal credentials and deploy malware.
Cloud SecurityActor tied to Raccoon targets ‘several dozen’ companies by exploiting BPOs and helpdesksSteve ZurierApril 9, 2026Google says UNC6783 leverages social engineering and phishing campaigns to gain entry to the BPOs.
AI/MLClaude Mythos Preview identifies 27-year-old bug, finds ‘thousands’ of zero-days in weeksLaura FrenchApril 9, 2026Anthropic launched “Project Glasswing” to restrict the availability of the new model to selected organizations.
Critical Infrastructure SecurityUS: Iran-linked actors are actively exploiting our critical infrastructureSteve ZurierApril 8, 2026Joint advisory says likely targets include the energy, water, and transportation sectors, as well as the defense industrial base.
Vulnerability ManagementDocker fixes AuthZ bypass bug that created containers with excessive privilegesLaura FrenchApril 8, 2026A crafted HTTP request can make restricted containers invisible to AuthZ plugins.
IdentityID Dataweb outlines the need for continuous identity threat detection Steve ZurierApril 7, 2026The industry needs tools that can verify users throughout the entire identity lifecycle without disrupting daily business processes.
Threat IntelligenceNorth Korea recruits Iranian workers for IT job fraudLaura FrenchApril 7, 2026Internal records reveal how North Korean facilitators scout and coach workers.