Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Should You Pay Ransomware Demands? (The Honest Answer)

Should organisations pay ransomware demands? Canvas recently paid after a breach exposed student data. Now US Congress is questioning whether payments should be illegal. In this episode of Razorwire Raw, James Rees tackles the ransomware payment dilemma. Ransomware groups operate like commercial organisations - if they don't honour agreements to delete data after payment, nobody would pay them. Some negotiators have been caught telling attackers what insurance payouts will cover.

Autonomous AI vs Zero-Day Attacks: The New Cybersecurity Shift

For decades, finding a zero-day flaw followed a predictable script: a highly skilled human researcher spent weeks staring at source code, digging for edge cases, and manually stitching together an exploit. In April 2026, Anthropic flipped that script by announcing Claude Mythos. This frontier model didn’t just mark an incremental upgrade; it introduced autonomous, machine-speed vulnerability hunting.

Drupal Core SQL Injection Vulnerability (CVE-2026-9082)

In May 2026, the Drupal Security Team disclosed a critical SQL injection vulnerability affecting Drupal core. The issue, tracked as CVE-2026-9082, affects Drupal installations using PostgreSQL and has been assigned a Drupal security risk rating of 23/25. The vulnerability can be exploited by anonymous users, and Drupal has confirmed that exploit attempts are being detected in the wild.

Solving Common DSPM Challenges for Enterprises

Most data security posture management (DSPM) programs don't fail because the technology is wrong. They fail because of execution gaps, from incomplete data inventory to misclassified data at scale to fragmented cloud environments and teams stretched too thin to act on findings. However, each of these problems is predictable, and each has a known fix.

Postman Workspace Exposure: When Your API Test Suite Becomes a Security Risk

Let’s start with a scenario. This is illustrative, not a single reported incident. A developer shares a Postman collection in Slack to move faster. “Here’s the Postman collection for the payment API. It has live auth headers so you can test prod endpoints.” The team uses it, work gets done, and the link stays. What no one realizes is that the collection lives inside a public Postman workspace. Weeks later, it is indexed by search engines. The URL requires no login.

How to Prevent Credential Stuffing Attacks: Beyond MFA and Rate Limiting

Most organizations think MFA and rate limiting are enough to stop credential stuffing. They aren’t. Attackers have adapted, and the controls that worked five years ago are now routinely bypassed using residential proxy networks, low-and-slow automation, and real-time session token interception.

How Agentic AI and Automation Are Changing Cybersecurity

There is no question that AI is changing cybersecurity in a massive way. In many respects, its impact is comparable to the rise of the internet. AI tools are helping organizations improve efficiency, automate repetitive tasks, and process data at a speed humans simply cannot match. Unfortunately, the same technology helping defenders is also being adopted by cybercriminals just as quickly. For cybersecurity professionals, keeping up with AI and agentic developments is no longer optional.

AI Alone Won't Stop the Breach: Why Email Security Needs Humans-on-the-Loop

2026 has officially become the year of speed, scale and support. The delta between a phishing email landing and a full organizational compromise has shrunk to mere seconds. The reality by the numbers: To close this window, your defense strategy must evolve into a two-step strategy of accuracy and automation.

How to Detect AI-Driven Insider Threats | #Cybersecurity Webinar #AI #InsiderThreat #AIsecurity

AI adoption inside organizations is accelerating and so are the insider risks that come with it. Employees use ChatGPT, Claude, Gemini, local LLMs, and daily to improve productivity. But without visibility, sensitive data can leave organizations unnoticed through browser uploads, desktop AI tools, and autonomous AI workflows. In this webinar, Syteca experts discuss.