Threat Intelligence

2026-04-29 00:00

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren't just talking...

Read Article

2026-04-29 00:00

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: "So,...

Read Article

2026-04-29 00:00

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

cPanel hasreleasedsecurity updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software. The problem affects...

Read Article

2026-04-29 00:00

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

Two critical vulnerabilities in ConnectWise ScreenConnect and Microsoft Windows actively exploited, posing significant security risks.

Read Article

2026-04-29 00:00

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

Inyet another instanceof threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI'sLiteLLMPython package has come under active exploitation in...

Read Article

2026-04-29 00:00

Learning from the Vercel breach: Shadow AI & OAuth sprawl

Learning from the Vercel breach: Shadow AI & OAuth sprawl

Most organizations are rightly nervous about employees adopting unapproved AI tools. Shadow AI use in the form of LLMs, where users upload sensitive data to ChatGPT, Claude, or a dozen other...

Read Article