News
ThreatBook Peer-Recognized as a Strong Performer In the 2025 Gartner Peer Insigh...
ThreatBook has been recognized as a Strong Performer in the 2025 Gartner Peer Insights of the Customer for Network Detection and R...
AI Is in Production. Security Isn’t. That Gap Is Costly.
78% of organizations run AI in production. Half have no AI-specific security. The damage is measurable: a $25M deepfake wire trans...
2025 Insider Risk Report Finds Most Organizations Struggle To Detect And Predict...
93% of security leaders say insider threats are as difficult or harder to detect than external cyberattacks. Only 23% express stro...
Beyond Data: The Rising Need for AI Security
Data Security has long been the cornerstone of enterprise cybersecurity strategies. But as artificial intelligence becomes deeply...
npm's New Token Limits Won't Stop the Attacks That Actually Happen
npm's new token lifetime limits (90-day max, 7-day default) and mandatory WebAuthn are good security hygiene, but they don't addre...
IoMT Vulnerabilities Putting Patient Health Data at Risk
Healthcare is experiencing an unprecedented explosion in connected medical devices. From smartwatches monitoring heart rhythms to...
From Chaos to Quality: A Framework for AI-Assisted Development
AI coding tools promise velocity but deliver chaos: security holes, context loss, infinite debugging loops. I spent 8 months solvi...
To Infinity… and Delete
A single mistyped command erased Toy Story 2 from existence in 1998. Pixar's backup system had quietly failed weeks earlier. Backu...
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phish...
Arsen’s new Smishing Simulation gives security teams a practical way to test how employees react to SMS-based phishing attempts. T...
AI Sidebar Spoofing Attack:SquareX Uncovers Malicious Extensions That Impersonat...
The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar interfaces. The attack can...
Smart Attacks, Smarter Defenses: How AI is Transforming DDoS Attacks
DDoS attacks have been around for decades, but they've evolved far beyond the normal “flood the server until it breaks" approach m...
