Category: EN

The EU CRA – Treating Cybersecurity as Product Liability

The EU’s Cyber Resilience Act (Regulation 2024/2847) shifts cybersecurity responsibility upstream. Explore the March 2026 guidance on secure-by-design requirements, software bills of materials (SBOM), and the impact on U.S. manufacturers. The post The EU CRA – Treating Cybersecurity as Product…

FBI email theft, Lloyds Bank glitch, API keys running loose

FBI confirms theft of director’s personal emails Lloyds customer data exposed in IT glitch Hundreds of valid API keys discovered on the Web  Get the show notes here: https://cisoseries.com/cybersecurity-news-fbi-email-theft-lloyds-bank-glitch-api-keys-running-loose/ Huge thanks to our sponsor, ThreatLocker Most breaches don’t start with…

Co-Op Chief Steps Down As Hack Leads To £125m Loss

Retail group Co-op sees £125m annual loss after damaging cyber-attack shuts down systems, leads to empty shelves, loss of customer data This article has been indexed from Silicon UK Read the original article: Co-Op Chief Steps Down As Hack Leads…

CanisterWorm Targets Docker, Kubernetes, and Redis to Steal Secrets

A financially motivated cybercrime group known as TeamPCP is actively exploiting poorly secured cloud environments using a self-propagating malware called “CanisterWorm.” The campaign targets exposed Docker APIs, Kubernetes clusters, Redis servers, and known vulnerabilities like React2Shell to gain unauthorized access,…

10 Best Log Monitoring Tools in 2026

As enterprises adopt more cloud-native technologies, containers, and microservices-based architectures, log monitoring and management are now critical. According to many market research assessments, the global log management industry is anticipated to increase from $1.9 billion in 2020 to $4.1 billion…

10 Best Spam Filter Tools 2026

Spam filter tools use advanced algorithms and machine learning techniques to detect and block unwanted email messages. They analyze email content, sender reputation, and patterns to effectively identify and filter out spam, ensuring inboxes remain clutter-free. These tools offer customizable…

Why risk alone doesn’t get you to yes

I have been in security rooms for years, from military operations centers to corporate boardrooms. In all those years I can tell you that the hardest mission that most security leaders will face is not identifying a threat, but getting…

Breaking out: Can AI agents escape their sandboxes?

Container sandboxes are part of routine AI agent testing and deployment. Agents use them to run code, edit files, and interact with system resources without direct access to the host. The SandboxEscapeBench benchmark, developed by researchers at the University of…