Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exposure Prioritization Agent: Demo Drill Down

Vulnerability volume continues to rise, making it difficult for security teams to determine which exposures actually matter. Without clear prioritization, teams are forced to react to volume, often focusing on severity scores instead of real risk. In this demo drill down, we showcase the Exposure Prioritization Agent within Falcon Exposure Management. You’ll see how AI-driven prioritization uses ExPRT.AI, adversary intelligence, and business context to reduce millions of vulnerabilities into a focused set of high-risk exposures.

Measuring Real Risk Reduction Across Your Security Stack

Garrett Hamilton recently presented at the North Texas ISSA Lunch & Learn in Plano, TX to talk about what risk reduction actually looks like in practice. Reach shows customers exactly which controls they've deployed, the user impact of those changes, and how much risk has been reduced across IAM, EDR, email, firewall, and SASE. Not feature checklists. Targeted, measurable outcomes tied to the business.

Qinglong task scheduler RCE vulnerabilities exploited in the wild for cryptomining

In early February 2026, users of Qinglong (青龙), a popular open source timed task management platform with over 19,000 GitHub stars, began reporting that their servers were maxing out CPU usage. The cause was a cryptominer binary called.fullgc, deployed through two authentication bypass vulnerabilities that allowed unauthenticated remote code execution. The attacks went largely unnoticed in the English-speaking security community.

The Configuration Drift Behind the Teams Helpdesk Breach

On April 22, 2026, Google's Threat Intelligence Group and Mandiant disclosed a campaign by a threat actor they're tracking as UNC6692. The group breached enterprise networks by impersonating IT helpdesk staff over Microsoft Teams, ultimately exfiltrating Active Directory databases and achieving full domain compromise. What's notable about UNC6692 is what they didn't do. They didn't use a zero-day. They didn't exploit a software vulnerability.

Introducing Atlas: a global age regulation tracker

Over 300 age-related bills were introduced across several US states in 2025 alone. We’ve heard firsthand from numerous legal and compliance teams that keeping up with these regulations is incredibly overwhelming. That’s why we developed Atlas, a global database tracking evolving age assurance regulations. Atlas tracks recent legislation impacting social media platforms, adult content, age-restricted services, and other related legislation.

Agentic SecOps: Build a security AI agent that automatically investigates detections

A credential access event fired. An AI agent investigated it, correlated it against running processes, assessed the risk, and closed the ticket. No analyst touched it. The entire loop ran in minutes. This is what security operations look like when AI can actually operate in the environment rather than advise from outside it. Security operations have always required a special kind of person.

NSW Treasury Breach, ABAC, and Principles of Least Privilege

Recent headlines heralded another unfortunate security breach: an employee of the NSW Treasury in Sydney, Australia, illegally downloaded more than 5,600 sensitive government documents, which were later recovered at his home. This was labeled a “significant cyber incident” by the NSW government and had been detected by an internal security monitoring tool that detected “movement of a large cache of documents”.

Is Your Official Vendor List a Lie?

How many new vendors did your team engage with today? If you’re looking at your official procurement list, the answer might be zero. But if you’re looking at employee behavior, the reality is likely much higher. Find out more about the shadow supply chain in our most recent research report: Interested in finding out more about UpGuard?

What Is Red Team Penetration Testing?

Red Team Penetration Testing is a simulated cyberattack that mimics real-world threat behavior to identify vulnerabilities, test defenses, and evaluate how effectively an organization can detect and respond to an attack. It goes beyond traditional testing by focusing on how an attacker would actually move through an environment.