How Elite SOCs Cut Escalation Rates by Arming Tier 1 With Better Threat Intelligence

In a mature Security Operations Center, escalation is supposed to work like a scalpel, precise, intentional, and reserved for alerts that genuinely demand deeper...

Identity and AI: Questions of data security, trust and control

The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how AI-driven IAM projects must account for...

EvilTokens abuses Microsoft device code flow for account takeovers

A new phishing-as-a-service (PhaaS) campaign is abusing Microsoft’s device code authentication flow to gain unauthorized access to user accounts. Sekoia...

Siemens SICAM 8 Products

View CSAF Summary Multiple SICAM 8 products are affected by multiple vulnerabilities that could lead to denial of service, namely: - SICAM A8000 Device firmware -...

The AI Security Compliance Gap: Fighting Polymorphic Phishing While Staying Regulatory Ready

 As cyber threats evolve, organisations face a growing dilemma: how to defend against increasingly sophisticated phishing attacks while staying compliant with expanding data protection...

Iran Threatens to Attack Apple, Google, and Other US Tech Firms in Middle East

Iran has threatened multiple US tech giants in the Middle East, escalating tensions and raising fears of AI-driven warfare turning physical. The post Iran Threatens...

New Venom Stealer MaaS Platform Automates Continuous Data Theft

Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration - Read more

What CISOs Should Expect from AI Powered MDR in 2026, According to Rapid7 CEO...

In the latest episode of Rapid7’s Experts on Experts, I’m joined by Rapid7 CEO Corey Thomas for a candid conversation about where AI is...

SUCCESS – 253,510 breached accounts

In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach. The incident exposed 250k unique email addresses along with...

Latest article

Four security principles for agentic AI systems

Agentic AI represents a qualitative shift in how software operates. Traditional software executes deterministic instructions. Generative AI responds to human prompts with...

The democratisation of business email compromise fraud

Welcome to this week’s edition of the Threat Source newsletter.Last weekend, I witnessed a crime. Not a notable crime that you might read about...

How Elite SOCs Cut Escalation Rates by Arming Tier 1 With Better Threat Intelligence

In a mature Security Operations Center, escalation is supposed to work like a scalpel, precise, intentional, and reserved for alerts that genuinely demand deeper...

Identity and AI: Questions of data security, trust and control

The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, learn how AI-driven IAM projects must account for...