


Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
Read More AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks — like data leaks, identity theft, and malicious misuse. If your company is exploring or...
Beyond Vulnerability Management – Can You CVE What I CVE?
Read More The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center (VOC)...
Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
Read More Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor. “Disguised as developer tools offering ‘the...