News
I Built an AI That Autonomously Penetration Tests a Target, Then Writes Its Own...
Current Breach and Attack Simulation (BAS) tools just replay static scripts and generate PDFs. VANGUARD uses an LLM ReAct loop to...
AI Malware That Rewrites Its Own Code Is Emerging as a Major Cybersecurity Threa...
New generation of malware can rewrite parts of its own code automatically. It can evolve during an attack and evade many conventio...
Why Adaptive Risk Management Needs a Human Touch
The time to exploit a new vulnerability has dropped from 63 days to 5. Here is why fully automated risk management isn't the solut...
A Breach in Uzbekistan’s Digital Infrastructure Exposes the Risks of Rapid E-Gov...
In January 2026, cyberattacks targeting three Uzbek government systems led to the exposure of roughly 60,000 data records — far fe...
Ransomware Doesn't Need to Lock Your Files Anymore — Here's Why That's Terrifyin...
Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." About 50% of attac...
I Saw a Phishing Site That Traps Security Bots
A phishing kit had a hidden form field with no visible counterpart. It wasn't part of the UI. The victim would never see it. So wh...
AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier
The age of human hacking is over. Microsoft's 2025 report confirms LLMs are automating attacks faster than defenders can react. We...
No-Code EPSS-Powered Vulnerability Management in Budibase
In this article, I will demonstrate how I implemented EPSS support and integrated this metric into my filtering and analysis proce...
