Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rolling out developer security in a 5,000+ engineer organization

Large engineering organizations like to believe their biggest problems are technical. If only someone would approve the budget for the latest tool, everything would be solved. Lately, the prevailing bet is that the silver bullet is vibe coding powered by your favorite flavor of LLM. But the pathologies of large organizations are rarely technical in nature.

Designing AI workflows: principles for safety and control

Most teams adopting AI in their workflows understand that LLMs do not behave like traditional software. The same input does not always produce the same output, and even when it does, the model can be wrong, manipulated, or misled. Hallucinations happen even without adversarial input. Air Canada learned this in 2024 when a tribunal ordered the airline to honor a bereavement-fare refund policy its support chatbot had invented out of thin air.

What You Need to Know about the Illinois and Texas Healthcare Data Breaches

Three prominent healthcare organizations in the United States have officially disclosed major data breaches that have compromised the personal and medical information of about 600,000 people. The affected organizations were Southern Illinois Dermatology and Saint Anthony Hospital in Illinois and the North Texas Behavioral Health Authority (NTBHA) in Texas.

What You Need to Know about the Amtrak Data Breach

Amtrak was created by Congress in 1970 as the National Railroad Passenger Corporation. It operates a nationwide rail network with over 300 trains serving more than 500 destinations in 46 states, three Canadian provinces, and the District of Columbia on more than 21,400 miles of route. Booking tickets online when taking a trip with Amtrak comes with so much convenience, ranging from saved passenger details to easy payment processing and quick reservations.

When DNSSEC goes wrong: how we responded to the .de TLD outage

On May 5, 2026, at roughly 19:30 UTC, DENIC, the registry operator for the.de country-code top-level domain (TLD), started publishing incorrect DNSSEC signatures for the.de zone. Any validating DNS resolver receiving these signatures was required by the DNSSEC specification to reject them and return SERVFAIL to clients, including 1.1.1.1, the public DNS resolver operated by Cloudflare. The country-code top-level domain for Germany, .de, is one of the largest on the Internet.

AI in security feels harder than it is

Anyone who's stood up a SIEM from scratch knows the feeling: weeks of infrastructure work, integration headaches, and a services team alongside for the whole process. That experience shaped how people think about adopting anything new in security ops. The instinct is to treat AI the same way: budget for it, plan for it, bring in specialists. This instinct is costing teams real time. Traditional infrastructure takes great effort to stand up. Infrastructure-as-code happens in seconds.

Attackers Continue to Pose as Help Desks in Social Engineering Attacks

Researchers at Google’s Threat Intelligence Group (GTIG) are tracking a new threat actor that’s impersonating help desks to trick users into installing malware. The threat actor, which GTIG tracks as “UNC6692,” begins by sending a large volume of spam emails to the victim, then initiates contact via Microsoft Teams to ostensibly help the user block the spam.

Claude Mythos Is Not the Problem. Your Security Basics Are

There is a lot of panic around Claude Mythos. Some people are saying it will hack every system, that the sky is falling, and that there is no stopping it. That fear is dangerous because it makes teams freeze. Claude Mythos is genuinely powerful. AI systems like this can find security issues in minutes that even experienced penetration testers might take weeks to identify and exploit. That part is real. But here is the important point: AI is still exploiting what is already there.

Why WatchGuard Acquired Perimeters.io: Making Cloud Security Work for MSPs

If you ask any MSP what they use to protect their clients’ cloud environments, you will get one of two answers. Either they’ll point to the native security tools built into platforms like Microsoft 365 or Google Workspace. Or they’ll describe a patchwork of different products stitched together to cover identity, configuration, and SaaS visibility. Neither approach is ideal. But both reflect the reality MSPs are working with today.