I skipped last week's roundup. Holiday weekend, family stuff, the usual. So this is a two-week-ish view of what we've published in the Threat Intelligence series since Edition 03 dropped on April 13.
Discover the 9 most dangerous identity-based threats in 2026, from AI phishing attacks and deepfake authentication bypass to MFA fatigue and harvest-now-decrypt-later quantum threats. Learn why legacy ...
Supplier assurance for UK SMEs: a practical guide to checking third parties without overcomplicating it Most UK SMEs rely on suppliers in some way. That might be payroll software, a managed IT ...
A deep dive into OpenAI’s Privacy Filter, benchmarking its PII detection performance against Tonic Textual on real-world ...
Cybersecurity is one of the hardest industries to market. Buyers are CISOs who can spot a generalist agency in seconds. Here ...
Overview On April 15, NSFOCUS CERT detected that Microsoft released the April Security Update patch, fixing 165 security issues involving Windows, Microsoft Office, Microsoft SQL Server, Microsoft ...
For decades, the "gray area" of undercover research was governed by internal policies. The SPLC indictment suggests that internal oversight is no longer a shield.
Can your SOC triage thousands of Mythos findings in 24 hours? NIS2, CRA, and DORA are all waiting. Miss one clock and the ...
The Mythos-ready briefing names secrets rotation, NHI governance, and honeytokens as critical controls. Zero-days don't ...
If your security team is drowning in vulnerabilities, that’s math done wrong. Prioritize your risk with the right vulnerability assessment tool. Here’s why? The volume of vulnerabilities has exploded ...
In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. These ...
The compromise of a version of Bitwarden's CLI is connected to the ongoing Checkmarx supply chain campaign, but differences in the operational methods of both incidents are making it difficult to ...