Category: Security Boulevard

Malicious PyTorch Lightning Packages Found on PyPI

TL;DR Two malicious versions of the popular PyTorch Lightning package have been uploaded to PyPI following the publisher account’s compromise. Lightning versions 2.6.2 and 2.6.3 (tracked as sonatype-2026-002817) were published on April 30, 2026, containing embedded malicious code that gathers developer…

The Slop Problem Isn’t What You Think

There’s a bloke on Twitter who spent three hours writing a passionate thread about AI ruining the internet. There was quite the debate, and someone asked if he’d ever used Grammarly. That’s the whole story, really. People call AI content…

Escape AI Pentesting Agents 2.0 – A Deep Dive

What each agent actually does (BOLA, Regression testing agent, Business logic testing agent, and others..), how they coordinate, and what you can expect from Escape’s AI pentesting product in the upcoming weeks. The post Escape AI Pentesting Agents 2.0 –…

Top Threats We’re Tracking in April

KasadaIQ analyst commentary on the threat environment The post Top Threats We’re Tracking in April appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Top Threats We’re Tracking in April

[un]prompted 2026 – Traditional ML vs. LLMs: Who Can Classifv Better?

Author, Creator & Presenter: Xenia Mountrouidou, Principal Cyber Data Scientist At Expel Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026…

CVE-2026-31431 (Copy Fail): Linux Kernel LPE

New Linux ‘copy_fail’ LPE gives root on all major distros. Mitigate before patching. The post CVE-2026-31431 (Copy Fail): Linux Kernel LPE appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: CVE-2026-31431 (Copy…

[un]prompted 2026 – Capability-Based Authorization For Al Agents

Author, Creator & Presenter: Niki Aimable Niyikiza, Senior Security Engineer & Al Security Researcher At Snap Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink…

Benchmarking AI Pentesting Tools: A Practical Comparison

We benchmarked 4 AI pentesting tools: Escape, Shannon, Strix, PentAGI, and Claude against a modern vulnerable application. Learn more about their detection rates, false positive rates, and scanning speed. The post Benchmarking AI Pentesting Tools: A Practical Comparison appeared first…

Wasn’t Visibility Supposed to Fix This?

Exposure management needs more than visibility. Learn how context, workflows and execution drive real vulnerability remediation. The post Wasn’t Visibility Supposed to Fix This? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Identity Continuity for Epic EHR

TL;DR  Strata Maverics sits between Epic and your identity providers, so Epic never has to change when they do. Microsoft Entra ID runs as primary. Keycloak runs as a warm secondary. Failover takes seconds. Clinical sessions and backend JWT integrations…