Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The GitGuardian Secret Detection Engine Just Got 43X Faster Thanks To Rust

While not a new feature, the GitGuardian team has been hard at work making updates to our TokenScanner, the underlying engine that powers GitGuardian's secret scanning ability. This is great news for folks dealing with very large repos and legacy platforms that thousands of developers have touched over the years. Scanning millions of files, attachments, commits, and anywhere else secrets might be hiding takes minutes. Historical scans across petabytes of information, which used to take days, now take less than an hour. What used to take hours takes a few short minutes.

Does the rise of AI mean human-led SOCs are obsolete? With Dr. Adeel Shaikh Muhammad [322]

Dr. Adeel Shaikh Muhammad, a cybersecurity strategist and global speaker with over 16 years of experience across information security, networks, and systems. Adeel brings a practical perspective on how organizations can adapt to evolving cyber threats and the growing role of AI in cybersecurity.

Workshop: Analyzing Real Malware with Claude Code and LimaCharlie

In this hands-on workshop we will analyze an unknown binary, quickly extract indicators, and determine the binary’s core functionality. We'll give Claude the LCRE (LimaCharlie Reverse Engineering) tool to accelerate analysis and interpretation by identifying configuration details, key behaviors, and any additional indicators useful for rule building. We'll use this information to craft detection rules for this sample.

Your AI Agents Are Already Acting. The Question Is Whether You Can See What They're Doing.

In conversations with CISOs about their agentic environments, the question I ask first is not whether they have agents deployed. Most do. It is not whether those agents are creating value. Most are. The question I ask is whether they have mapped their Agentic Security Graph. Almost none of them have. And that gap, between the agentic infrastructure that exists inside their organizations and the visibility they have into it, is where the most serious AI security risk in the enterprise lives right now.

INETCO's Bijan Sanii on the threat every South African bank should be worried about

Article by Luis Monzon originally published on MyBroadband, May 9, 2026. Anthropic’s AI model Mythos, part of its Claude software, represented a clear threat to banks and financial institutions in South Africa. This is according to Bijan Sanii, CEO of Canadian fraud detection provider INETCO. Anthropic, one of the world’s most important generative AI makers, positioned Mythos as an extremely capable AI model designed to identify vulnerabilities in critical software beyond human capabilities.

TEFCA compliance for digital health companies: a guide to identity proofing

In 1996, the US signed the Health Insurance Portability and Accountability Act (HIPAA) into law. One of the government’s chief goals was to safeguard sensitive patient data and protected health information (PHI) from unauthorized disclosure. While these protections were critical, HIPAA compliance requirements (alongside an already-fragmented electronic health record systems) have led to ongoing data silos across healthcare.

What You Need to Know about the BWH Hotels Data Breach

BWH Hotel Group is one of the world's largest hotel networks, operating more than 4,000 hotels in over 100 countries. The company evolved from Best Western and today manages a multi-brand portfolio spanning budget to luxury hospitality. BWH Hotels' portfolio includes prominent brands such as Best Western Hotels & Resorts, WorldHotels, and Sure Hotels, serving millions of guests annually across approximately 4,300 hotels that generate more than $8.5 billion in annual revenue.