The Glasswing Warning: What Companies Outside the Inner Circle Must Do Now Rakesh Shah May 19, 2026 The Mythos threat is arriving at exactly the wrong moment for most enterprises. Read More
Reframing MFA Bypass: Four Identity Gaps Attackers Exploit Mouhamad Mbacke May 18, 2026 The misnomer of ‘MFA Bypass’ keeps MFA at the center of a problem it cannot solve alone. Read More
Research: Microsoft Edge Loads Stored Passwords in Cleartext Jordyn Alger May 7, 2026 A researcher found that Microsoft Edge will load saved passwords into memory in plaintext, even when they are not being used. Read More
Will This World Password Day Be the Last? Jordyn Alger May 7, 2026 Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change. Read More
Synthetic Identities Are Redefining Trust in Biometric Systems Joe Ferrigno May 7, 2026 Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs. Read More
The Coming Wave of Large-Scale Al-Enabled Cyberattacks James Turgal May 4, 2026 The first truly major AI-enabled cyberattack will look different from the incidents that dominate headlines today.Read More
The Browser Blind Spot Your Privacy Program Is Missing Gareth Bowker May 1, 2026 Most privacy programs still have one gap in common: the browser. Read More
What Claude and OpenClaw Vulnerabilities Reveal About AI Agents Elad Luz April 24, 2026 Claude and OpenClaw vulnerabilities reveal why AI agents must be governed like privileged identities. Read More
Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption Kevin Greene April 23, 2026 While vulnerability management and patching remain necessary, they are not sufficient to address the new reality that Mythos represents.Read More
How Should Effective AI Red Teams Operate? Jordyn Alger April 23, 2026 Dr. Peter Garraghan speaks with Security magazine about AI-specific red teaming. Read More