Closing the Visibility Gap: A Framework for Governing Employee AI Use

A structured framework helps organizations gain visibility into unapproved AI tools employees are using while providing a clear path for safe adoption.

The Latest

Breaking News and Alerts

Linux Project Cracks Down on AI Generated Bug Reports Overwhelming Security Systems

Linux kernel maintainers are implementing new quality standards and triage rules to filter AI generated bug reports that have been overwhelming the project's security mailing list.

Spotlight

Cybersecurity Profiles and Stories

Attackers Link Tiny Flaws Into Lethal Chains Spanning Code and Cloud

A new webinar from Wiz explains how attackers chain together small coding bugs and cloud misconfigurations to access sensitive data, and how teams can break that path.

Exim Patches Critical BDAT Use After Free Flaw in GnuTLS Builds

The Dead.Letter vulnerability affects Exim mail server versions 4.97 through 4.99.2 compiled with GnuTLS, enabling heap corruption via a crafted BDAT SMTP sequence.

AI Model Used to Craft First Mass Exploit Tool for Two Factor Auth Bypass

Google uncovered a criminal campaign in which an AI system was used to discover a zero day vulnerability and generate exploit code for mass exploitation of a popular administration tool.

Self-Propagating Malware Devours Developer Credentials Across Cloud Services

The open-source release of a credential-stealing worm has triggered a wave of copycat attacks targeting developer environments and cloud infrastructure.

Features

Research and Thought Leadership