Cyber agencies produce ‘long overdue’ best practices for securing Microsoft Exchange Server
Cyber agencies from three countries including the US have issued a list of security best practices […]
Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw
Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability that’s been […]
Claude AI vulnerability exposes enterprise data through code interpreter exploit
A newly disclosed vulnerability in Anthropic’s Claude AI assistant has revealed how attackers can weaponize the […]
OpenAI launches Aardvark to detect and patch hidden bugs in code
OpenAI has unveiled Aardvark, a GPT-5-powered autonomous agent designed to act like a human security researcher […]
The unified linkage model: A new lens for understanding cyber risk
When Okta’s support credentials were stolen in 2023, the breach didn’t stop at the identity provider. […]
Bug-Bounty-Programm trifft KI – ein zweischneidiges Schwert
KI-gestütztes Bug Hunting verspricht viele Vorteile. Ob sich diese auch in der Praxis verwirklichen, ist eine […]
Agentic AI: What now, what next?
Download the November 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
Aembit Introduces Identity and Access Management for Agentic AI
Aembit today announced the launch of Aembit Identity and Access Management (IAM) for Agentic AI, a […]
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]
AI-powered bug hunting shakes up bounty industry — for better or worse
AI-powered bug hunting has changed the calculus of what makes for an effective bounty program by […]