Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How 1Password secures agent architectures

Since 1Password began, we have built security into the places where work actually happens. Security is not treated as an overlay or a separate workflow, we build directly into the browser, command lines, developer tools, and IDEs, where decisions are made and actions take place. We believe that if you want to improve security outcomes, you build where the work happens, making the secure path the simplest one.

Inside the Threat Landscape: Biannual Cybersecurity Briefing

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s H2 2025 Internet Security Report, the first of our biannual release version of the report. During Inside the Threat Landscape: Biannual Cybersecurity Briefing, they’ll cover the latest malware and network attack trends targeting small and midsize enterprises, along with defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

What Is a Deauth Attack? How Thieves Disable Security Cameras

Wi-Fi doorbells such as Ring and Nest have become a staple in home security. They promise peace of mind, showing you live footage of your doorway to deter thieves. Up until now this has been an effective security method, but doorbell footage has started going missing, and deauth devices are responsible.

Meet Seema: A Simpler Way to Understand Risk

Getting clear answers about your security risk shouldn’t require hours of manual work or deep platform expertise. Meet Seema – Seemplicity’s new AI assistant designed to translate complex remediation data into plain-spoken, actionable insights. Whether you’re a practitioner investigating a specific vulnerability, an engineer needing context on a finding, or a leader briefing on overall risk, Seema provides the clarity you need to move from data to action.

The Coming Regulatory Wave for AI Agents & Their APIs

For the past two years, the adoption of Generative AI has felt like a gold rush. Organizations raced to integrate Large Language Models and build autonomous agents to assist employees. They often bypassed standard governance processes in the name of speed and innovation. That era of unrestricted experimentation is rapidly drawing to a close. A massive regulatory wave is forming worldwide. Frameworks like the EU AI Act and the new ISO/IEC 42001 standard are forcing a corporate reckoning.

Beyond Indicators: Gaining Context with Adversary Intelligence

Actions have consequences. In cybersecurity, we often only see actions at the surface level: a suspicious IP, a new domain, or a single mention on a dark web forum. For threat hunters, the consequences of treating these actions as isolated incidents are significant. These signals are rarely "one-offs." They are the visible tips of coordinated campaigns built on months of planning, spanning multiple tactics, techniques, and procedures (TTPs). Today’s adversaries are organized.

Introducing Protocol Discovery to stop guessing what's behind your open ports

Most tools will just tell you that a port is open. We’ve decided that’s not enough. TLDR: We’ve launched Protocol Discovery, a custom-built engine designed to move beyond simple port scanning by identifying the specific services communicating behind your open ports. Our engine is optimized for the speed of modern cloud environments-scanning assets in under 10 seconds.

What CVE 2026 23550 Is & Why It's Critical

CVE-2026-23550 is a critical unauthenticated privilege escalation vulnerability affecting the Modular DS WordPress plugin (versions ≤ 2.5.1). With a CVSS score of 10.0, this flaw allows attackers to gain full administrator access without authentication. In this video, we break down: What CVE-2026-23550 is How the vulnerability works (technical root cause) What attackers can do after exploitation.