Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Threat Awareness to Proof: Closing the Exposure Validation Gap in the Modern SOC

For most organizations, answering these questions is slow, manual, and difficult to defend. Analysts must interpret threat reports, build SIEM queries, run retroactive searches, and validate findings under pressure. The result is delayed answers, inconsistent processes, and limited confidence at the executive level. This is the gap between threat awareness and proof of exposure. It is where operational risk and board-level scrutiny converge.

Rethinking Threat Intelligence with the Threat Research Agent

Modern security teams are not lacking data. They are drowning in it. Threat intelligence feeds, indicators, campaigns, internal detections, and investigation artifacts are constantly growing in volume and complexity. Yet when analysts need answers, they are often forced to manually search, pivot, correlate, and interpret across multiple data points. This creates a familiar problem: too much data, not enough clarity.

Credential management for AI agents

The proliferation of credentials outside centralized visibility and control is known as “credential sprawl,” and attackers are eager to take advantage of it. Unfortunately, credential management is a broad problem that only grows in complexity as organizations add new tools, employees, and partners.

New MSP capabilities for simpler client onboarding and stronger control

Setting up and managing client environments often involves repetitive, manual work. Each new managed company requires policy setup, access configuration, and ongoing oversight. Repeating this across environments slows onboarding, introduces inconsistencies, and makes it harder to maintain control.

AI Security and Trust: Why SOC Teams Don't Trust AI

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo 92% of security leaders say something is actively reducing their trust in AI within the SOC. These aren’t skeptics, they’re people who have already adopted AI and believe in its ability to enhance security operations. We know from the 2026 AI SOC Leadership Report that AI is already widely adopted in the SOC, with 94% of organizations using it in some capacity.

Agentic AI in security operations: Friend, risk, or both

Agentic AI is forcing a hard question on every security leader: when your SOC is full of autonomous “doers” instead of just dashboards and scripts, is that your new best friend or a brand‑new risk surface you barely understand? The honest answer is both, and the way you design, govern, and deploy these systems will decide which side wins.

CVE-2026-0300 - Critical Buffer Overflow in PAN-OS User-ID Authentication Portal

On May 6, 2026, Palo Alto Networks disclosed a critical buffer overflow vulnerability (CVE-2026-0300) in the User-ID Authentication Portal (Captive Portal) component of PAN-OS. This vulnerability allows an unauthenticated, remote attacker to execute arbitrary code with root privileges on affected PA-Series and VM-Series firewalls by sending specially crafted packets. No user interaction or credentials are required.

The Hackers Who Left Their Entire Playbook Online

A ransomware group called Warlock tore through more than 60 organisations in six months, targeting the nuclear energy, aerospace, and government sectors. They chain zero-days and neutralise antivirus software using signed Chinese drivers. This is how they operate and how the Sophos CTU tracked them across eleven incidents to expose their full playbook​

Snyk Embeds Anthropic's Claude to Advance AI-Powered Security for Software Development

BOSTON, May 7, 2026 — Snyk, the AI security company, today announced it is leveraging Anthropic's Claude models to advance software security in an era of AI-powered development. Starting today, Snyk has integrated Claude into the Snyk AI Security Platform — powering automated vulnerability discovery, prioritization, and developer-ready fixes across code, dependencies, containers, and AI-generated artifacts. The threat driving that integration is real and accelerating.