News
The First Autonomous AI Cyber Attack Exposed
The GTG-1002 is widely assessed as the first large-scale cyber attack executed with near complete AI autonomy. It simultaneously m...
How Cartesi's New Fraud-Proof System Could Change Rollup Security Forever
Cartesi launches Honeypot v2 with Permissionless Refereed Tournaments, introducing bond mechanisms that protect validators from de...
ThreatBook Peer-Recognized as a Strong Performer In the 2025 Gartner Peer Insigh...
ThreatBook has been recognized as a Strong Performer in the 2025 Gartner Peer Insights of the Customer for Network Detection and R...
AI Is in Production. Security Isn’t. That Gap Is Costly.
78% of organizations run AI in production. Half have no AI-specific security. The damage is measurable: a $25M deepfake wire trans...
2025 Insider Risk Report Finds Most Organizations Struggle To Detect And Predict...
93% of security leaders say insider threats are as difficult or harder to detect than external cyberattacks. Only 23% express stro...
Beyond Data: The Rising Need for AI Security
Data Security has long been the cornerstone of enterprise cybersecurity strategies. But as artificial intelligence becomes deeply...
npm's New Token Limits Won't Stop the Attacks That Actually Happen
npm's new token lifetime limits (90-day max, 7-day default) and mandatory WebAuthn are good security hygiene, but they don't addre...
IoMT Vulnerabilities Putting Patient Health Data at Risk
Healthcare is experiencing an unprecedented explosion in connected medical devices. From smartwatches monitoring heart rhythms to...
From Chaos to Quality: A Framework for AI-Assisted Development
AI coding tools promise velocity but deliver chaos: security holes, context loss, infinite debugging loops. I spent 8 months solvi...
To Infinity… and Delete
A single mistyped command erased Toy Story 2 from existence in 1998. Pixar's backup system had quietly failed weeks earlier. Backu...
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phish...
Arsen’s new Smishing Simulation gives security teams a practical way to test how employees react to SMS-based phishing attempts. T...
