Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Axios CVE-2026-40175: a critical bug that's... not exploitable

It’s been a chaotic few weeks for Axios. First, a major supply chain attack put the package under scrutiny. Then, just days later, headlines started appearing about a “critical 10/10 vulnerability” that could lead to full cloud compromise. If you’ve read the coverage, you’ve probably seen claims like: That sounds bad. But when you look closely at how this vulnerability actually behaves in real environments, the story changes.

Mythos, MOAK, CTEM and the End of CVE Chasing

A few weeks ago the world was exposed to Mythos, Anthropic's new frontier model and the Project Glasswing announcement that came with it. The reaction across the industry was immediate. Cybersecurity stocks fell sharply. The Treasury Secretary convened an emergency meeting with major bank CEOs. 250 CISOs produced a response playbook over a single weekend. That is not a typical announcement or a PR "leak". That is a reckoning. Then, about a week later, I came across MOAK.

How We're Securing Our Own Supply Chain

Building a supply chain security company comes with an uncomfortable truth: our remediated packages run inside our customers' production environments. A compromise on our end is a compromise on theirs. We take that responsibility seriously. I want to pull back the curtain on how we actually secure our own supply chain - from the code we write, to the artifacts we deliver, to the infrastructure that holds it all together. ‍

Are You Ready for the CVE Avalanche?

What the Anthropic Mythos findings mean for every security team, and the 90-day window you cannot afford to miss. Last week, Anthropic published something that should stop every CISO in their tracks. Its Mythos Preview model, running autonomously, without expert guidance, identified thousands of high- and critical-severity vulnerabilities across major operating systems, browsers, and open-source projects.

Lightboard Lab: Closing the Valley of Visibility in Network Vulnerability Assessment

Network Vulnerability Assessment is often treated as a point-in-time exercise—but real environments don’t stand still. Between long scan cycles, two things are constantly changing: network devices drift as configurations and versions evolve, and the world around them shifts as new vulnerabilities are disclosed.

I Tried 5 Prompt Injection Attacks (Here's What Happened)

In this video, we explore the growing security risk of prompt injection in large language model (LLM) applications. As AI becomes embedded in more products, new vulnerabilities emerge, especially through natural language manipulation. We break down how LLMs work, the importance of system prompts, and demonstrate five real-world prompt injection techniques used to extract sensitive information or bypass safeguards. You’ll see live examples using different models and learn why newer models are more resilient, but still not immune.

Governing Security in the Age of Infinite Signal - From Discovery to Control

Anthropic just open-sourced vulnerability discovery at scale. Now what? A few weeks ago, Anthropic launched Glasswing, a $100 million initiative to use AI to identify vulnerabilities at scale. Around the same time, they introduced Claude Mythos, a system that can autonomously discover and exploit software flaws. I wrote about this trajectory in my previous analysis: AI accelerates discovery, but enterprise trust still depends on deterministic validation, remediation automation, and governance at scale.

What is the OWASP Top 10 for LLM Application Security

Initially published by the Open Worldwide Application Security Project (OWASP) in 2023, the Top 10 for LLM Application Security list seeks to bridge the gap between traditional application security and the unique threats related to large language models (LLMs). Even where the vulnerabilities listed have the same names, the Top 10 for LLM Application Security focuses on how threat actors can exploit LLMs in new ways and potential remediation strategies that developers can implement.

CVE-2026-0968: The libssh Heap Read That Isn't as Scary as Scanners Say

A missing null check in libssh’s SFTP directory listing code lets a malicious server crash clients, but real-world exploitability is extremely constrained. CVE-2026-0968 is an out-of-bounds heap read in sftp_parse_longname(), triggered when an SFTP client processes a crafted SSH_FXP_NAME response with a malformed longname field. Red Hat, which serves as the CNA (CVE Numbering Authority) for this vulnerability, scored it 3.1 (Low), while Amazon Linux independently scored it 4.2 (Medium).

What Is a PCI ASV Scan? A Guide to PCI DSS Compliance Scanning

“We do not store any credit card data, we outsource it. PCI DSS is not relevant for us.” If you think this way, you are not alone, but it is a misconception. The Payment Card Industry Data Security Standard (PCI DSS), is designed to enhance the security of credit card data. It applies to all organizations that store, process, or transmit cardholder data and sensitive authentication data, or that could affect the security of the environment used for such data.