Meet digital sovereignty needs with AWS Dedicated Local Zones expanded services

At Amazon Web Services (AWS), we continue to invest in and deliver digital sovereignty solutions to help customers meet their most sensitive...

Adversarial Poetry and the Efficacy of AI Guardrails

We investigate the rise of adversarial poetry in AI security. Understand how metaphor-based exploits circumvent guardrails and the defenses we need for LLMs moving...

Chain Reaction: Attack Campaign Activity in the Aftermath of React Server Components Vulnerability

Introduction and Vulnerability Overview  Earlier this month, Imperva published an initial advisory outlining how our customers were protected against the newly disclosed React2Shell vulnerability impacting React Server Components (RSC). That post focused on the...

Palestine Action: Operations and Global Network

Executive Summary Palestine Action has almost certainly responded to its July 2025 designation as a terrorist organization in the United Kingdom (UK) by...

The Privacy Gap in API Security: Why Protecting APIs Shouldn’t Put Your Data at...

The more critical APIs become, the more sensitive data they carry identities, payment details, health records, customer preferences, tokens, keys, and more. And this is...

Implications of Russia-India-China Trilateral Cooperation

Executive Summary Insikt Group assesses that the August 2025 meeting of Chinese Communist Party (CCP) General Secretary Xi Jinping, Indian Prime Minister Narendra...

Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users

In this post, we investigate a recent phishing campaign that targets Microsoft 365 users. - Read more

Path traversal vulnerability in administrative interface

CVSSv3 Score: 7.7 Multiple Improper Limitations of a Pathname to a Restricted Directory ('Path Traversal') vulnerabilities in FortiVoice may allow...

Multiple authenticated OS Command Injections via API

CVSSv3 Score: 6.7 An OS command injection vulnerabtility in FortiExtender API may allow an authenticated attacker to execute unauthorized code...

Reflected XSS in HA cluster

CVSSv3 Score: 5.3 An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FortiSandbox may allow an...

Latest article

Patch Tuesday – March 2026

Microsoft is publishing 77 vulnerabilities this March 2026 Patch Tuesday. Microsoft is aware of public disclosure of two of today’s vulnerabilities, but without evidence...

AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus...

In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe entirely located...

Google’s $32B Wiz Acquisition Set to Become Israel’s Largest Tech Deal Ever

Google’s $32 billion Wiz acquisition is nearing completion, marking a record Israeli tech exit and a major bet on cloud security. The post Google’s $32B...

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity - Read more