The 2026 Digital Omnibus

For the better part of a decade, doing business under EU digital law has been challenging, with DDPR, ePrivacy updates, the NUS2 Directive, the AI and Data Acts, and others coming in rapid succession. For organizations already investing heavily in…

Cracks in the Bedrock: Agent God Mode

Unit 42 reveals “Agent God Mode” in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration risks. The post Cracks in the Bedrock: Agent God Mode appeared first on Unit 42. This article has been indexed…

How do Agentic AIs deliver value to enterprises

How Do Non-Human Identities Enhance Enterprise AI Strategies? Have you ever considered the invisible force quietly securing your enterprise’s digital assets? These are Non-Human Identities (NHIs), playing a pivotal role in protection and management of sensitive information. But what exactly…

What security innovations do NHIs herald

How Secure Are Your Non-Human Identities? Where machine identities outnumber human ones, how efficiently are you managing your Non-Human Identities (NHIs)? When organizations rapidly adopt cloud environments to enhance operational efficiency, the need for robust NHI management has never been…

How certain can we be of NHI reliability

How Does NHI Reliability Impact Your Security Strategy? Have you ever wondered how reliable Non-Human Identities (NHIs) truly are? NHIs, the machine identities that play a crucial role in cybersecurity, are integral for ensuring secure and seamless operations within your…

Russia-linked APT28 uses PRISMEX to infiltrate Ukraine and allied infrastructure with advanced tactics

APT28 targets Ukraine and allies with PRISMEX malware, using stealthy techniques for espionage and command-and-control. Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) is running a spear-phishing campaign against Ukraine and its allies, deploying a new malware suite…