AWS successfully completed its first surveillance audit for ISO 42001:2023 with no findings
In November 2024, Amazon Web Services (AWS) was the first major cloud service provider to announce the ISO/IEC 42001 accredited certification for...
Inside AWS Security Agent: A multi-agent architecture for automated penetration testing
AI agents have traditionally faced three core limitations: they can’t retain learned information or operate autonomously beyond short periods, and they require...
Henry IV, Hotspur, Hal, and hallucinations
Welcome to this week’s edition of the Threat Source newsletter. "'Tis dangerous to take a cold, to sleep, to drink; but I tell you, my...
Aeternum Botnet Shifts Command Control to Polygon Blockchain
New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts - Read more
Before the Breach: When digital footprints become a strategic cyber risk
OverviewFor years, organizations have prioritized strengthening technical defenses, including hardening networks, accelerating patch management, and expanding endpoint detection and response capabilities. Defensive systems have...
AI Capabilities Are Advancing Faster Than AI Security
AI Security Insights – February 2026 - Read more
The Global Fight Over Who Controls Your Data Just Escalated — Here’s What the...
A new diplomatic offensive against foreign privacy laws collides with fresh research showing that weakening data sovereignty protections is the last thing organizations need...
Qilin crew continues to dominate ransomware ecosystem
The Qilin ransomware gang remained ‘top dog’ in January 2026, with over 100 observed cyber attacks to its name, amid a rapidly evolving and...
Chargemap chargemap.com
View CSAF
Summary
Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service...
Pelco, Inc. Sarix Pro 3 Series IP Cameras
View CSAF
Summary
Successful exploitation of this vulnerability could allow attackers to gain unauthorized access to sensitive device data, bypass surveillance controls, and expose facilities to...





