Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
Malware is evolving to evade sandboxes by pretending to be a real human behind the keyboard. The Picus Red Report 2026 shows 80% of top attacker techniques now focus on evasion and persistence, including geometry-based cursor tests and CPU timing checks.
A campaign by Russian-speaking cyberattackers hijacks workflows to deliver security-busting malware, allowing attackers to steal data without detection.
Codex Security, formerly Aardvark, has found hundreds of critical vulnerabilities in tested software in the past month.
Armadin uses AI-powered red teaming to find and exploit weaknesses in the same way that attackers attack them.
Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims' databases and exfiltrate sensitive data within organizations' Google Cloud environments. The shortcomings have been colle...
Salesforce has confirmed that customers are being targeted via poorly secured instances.
View CSAF
The company will deepen its platform's AI agent capabilities and scale engineering and go-to-market teams.
CISA has added the high-severity authentication bypass vulnerability to its KEV list, along with SolarWinds and Workspace One bugs.