Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mythos, MOAK, CTEM and the End of CVE Chasing

A few weeks ago the world was exposed to Mythos, Anthropic's new frontier model and the Project Glasswing announcement that came with it. The reaction across the industry was immediate. Cybersecurity stocks fell sharply. The Treasury Secretary convened an emergency meeting with major bank CEOs. 250 CISOs produced a response playbook over a single weekend. That is not a typical announcement or a PR "leak". That is a reckoning. Then, about a week later, I came across MOAK.

How to Build a Security Compliance Audit Process that Works All Year Round

Security compliance audits can feel intimidating, especially if your team has never been through one before. For many organizations, an audit feels like a high-pressure project with a hard deadline, a long list of evidence requests, and a lot of manual work spread across security, IT, legal, and compliance teams. For vendors and companies in highly regulated industries, audits and risk assessments may already be a routine part of doing business.

GitProtect 2.2.0: GitHub Enterprise Cloud with Data Residency Backups, AES-GCM Encryption, and More

The huge news is coming: GitProtect is the first solution on the market to support the backup of the GitHub Enterprise Cloud with Data Residency environments. The launch of version 2.2.0 also brings more secure and efficient AES-GCM encryption, a refreshed dashboard, a new onboarding experience, support for Azure DevOps related work links, and much more. Let’s dive into all the new features.

How to Make AI Security Foundational to Your Data Security Stack

Most organizations treat AI security as a finishing touch: A policy written after an incident or a product category evaluated after the core stack is already in place. That sequencing is the problem. AI has fundamentally changed how sensitive data moves inside an organization, through prompts, agents, summarization tools, and third-party models that operate entirely outside traditional security perimeters.

Trilio Becomes a Red Hat Premier Partner: A Milestone in Cloud-Native Data Protection

In the rapidly evolving landscape of cloud-native infrastructure, collaboration is the engine of innovation. Today, we are thrilled to share a major milestone in our journey: Trilio has officially achieved Premier Partner status within the Red Hat partner ecosystem. This elevation isn’t just a badge of honor; it is a testament to years of deep technical integration and a shared vision for the future of the open hybrid cloud.

How Financial Services Teams Should Secure AI Agents in 2026

Your fraud detection agent scores 30,000 transactions per hour. Your KYC agent processes identity verifications against government watchlists. Your customer service chatbot resolves disputes and initiates balance transfers. Each agent runs on Kubernetes with inherited service account permissions that span payment APIs, customer databases, and compliance systems. Now imagine one of those agents is compromised through a prompt injection embedded in a customer support ticket.

Deepfake Fraud in Business - Can You Trust What You See?

Razorthorn has worked with wide range of technically savvy clients who are confident they would spot a fake, but confidence is exactly what makes deepfake fraud so effective. In 2024, a finance manager at engineering firm Arup transferred $25 million to fraudsters after taking part in a video call with what appeared to be his CFO and several colleagues. Every person on that call was fabricated. None of it was real.

Axios CVE-2026-40175: a critical bug that's... not exploitable

It’s been a chaotic few weeks for Axios. First, a major supply chain attack put the package under scrutiny. Then, just days later, headlines started appearing about a “critical 10/10 vulnerability” that could lead to full cloud compromise. If you’ve read the coverage, you’ve probably seen claims like: That sounds bad. But when you look closely at how this vulnerability actually behaves in real environments, the story changes.

Diving Into Quasar RAT: TTPs, IoCs and more

Quasar, crafted in the C# programming language, is a publicly accessible and open-source Remote Access Trojan (RAT) designed for Microsoft Windows operating systems (OSs). This creation comes courtesy of the GitHub user MaxXor and resides as a publicly hosted repository on GitHub. While its utility extends to legitimate applications like enabling remote assistance from an organization’s helpdesk technician, Quasar is being exploited by APT actors for cybercrime and cyber espionage endeavors.