Exploring common centralized and decentralized approaches to secrets management

One of the most common questions about secrets management strategies on Amazon Web Services (AWS) is whether an organization should centralize its...

US punts renewal of threat data sharing law to September

US lawmakers have extended the Cybersecurity Information Sharing Act of 2015 for another nine months, buying time to enact a replacement for the legislation....

NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers

Open letter by NHS technology leaders outlines plans to identify risks to software supply chain security across health and social care system -...

Product Categories for Technologies That Use Post-Quantum Cryptography Standards

Executive Summary In response to the June 6, 2025, Executive Order (EO) 14306, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order...

Chromium: CVE-2026-1220 Race in V8

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2024 ) for more information. -...

Introducing the F5 Labs Weekly Threat Bulletin

F5 Labs’ Weekly Threat Bulletin delivers fast, AI‑driven insights on emerging cyber threats with IoCs, mitigation tips, and expert‑validated guidance. - Read more

New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools...

A newly discovered ransomware family called Osiris launched attacks against a major food service company in Southeast Asia during November 2025. Security researchers...

I scan, you scan, we all scan for… knowledge?

Welcome to this week’s edition of the Threat Source newsletter. “Upon us all a little rain must fall” — Led Zeppelin, via Henry Wadsworth Longfellow  I recently bumped into...

Critical Appsmith Flaw Enables Account Takeovers

Critical vulnerability in Appsmith allows account takeover via flawed password reset process - Read more

From Signals to Strategy: What Security Teams Must Prepare for in 2026

The 2026 Security Predictions webinar reinforced a simple but uncomfortable truth. The forces shaping cyber risk are not new, but they are converging faster...

Latest article

Patch Tuesday – March 2026

Microsoft is publishing 77 vulnerabilities this March 2026 Patch Tuesday. Microsoft is aware of public disclosure of two of today’s vulnerabilities, but without evidence...

AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus...

In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe entirely located...

Google’s $32B Wiz Acquisition Set to Become Israel’s Largest Tech Deal Ever

Google’s $32 billion Wiz acquisition is nearing completion, marking a record Israeli tech exit and a major bet on cloud security. The post Google’s $32B...

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity - Read more