Topic

#security

14 articles exploring security. Expert insights and analysis from our editorial team.

Showing 1–14 of 14 articles

Articles

Newest first
Security

Google Closes the $32B Wiz Deal: Cloud Security Has a New Power Player

Google completed its landmark $32 billion all-cash acquisition of cloud security firm Wiz on March 11, 2026—the largest deal in Google's history—reshaping the cloud security landscape.

· 7 min read
Security

Google Closes the $32B Wiz Deal: Cloud Security Has a New Power

Google completed its $32 billion acquisition of Wiz on March 11, 2026 — the largest cybersecurity deal in history. Here's what it means for cloud security teams, competitors, and the future of multicloud defense.

· 7 min read
Security

Securing AI Workloads: Why Containers Are AI's Biggest Attack Surface

AI workloads deployed in containers inherit every existing container vulnerability—plus a new class of AI-specific threats including model theft, prompt injection via sidecars, and supply chain attacks on model weights. Here's what practitioners need to know.

· 9 min read
Security

Document Poisoning: How Attackers Are Corrupting Your AI's Knowledge Base

RAG systems trust their document stores—and attackers know it. Document poisoning injects false or malicious content into knowledge bases, causing AI systems to generate attacker-controlled output for every user who asks the right question. Here's what the research shows.

· 9 min read
Security

How Researchers Hacked McKinsey's AI Platform—and What It Reveals

Security researchers at CodeWall used an autonomous AI agent to breach McKinsey's Lilli platform in approximately two hours, exposing 46.5 million messages through SQL injection—a decades-old technique that enterprise AI teams consistently fail to prevent.

· 8 min read
AI Ethics

Wrongfully Jailed by an Algorithm: AI Facial Recognition's Misidentification Crisis

At least eight innocent people—nearly all Black—have been wrongfully arrested because police trusted AI facial recognition systems that government studies show misidentify darker-skinned faces at rates 10 to 100 times higher than white faces. The crisis isn't the technology alone; it's the institutional trust placed in documented bias.

· 9 min read
Security

I Found a Vulnerability, They Found a Lawyer

Legal threats against security researchers remain a pervasive problem that chills the disclosure of critical software flaws. When companies weaponize laws like the CFAA and DMCA against the people protecting the public, everyone loses.

· 7 min read
Security

AI Voice Cloning Is Making Phone Scams Undetectable

Real-time AI voice cloning technology has enabled a new wave of sophisticated phone scams that can impersonate loved ones with just seconds of audio, costing victims millions and challenging traditional fraud detection methods.

· 6 min read
Security

The Mysterious Case of Chinese Bot Traffic in 2026: How AI-Powered Bots Are Rewriting the Rules of Detection

Chinese bot traffic patterns have shifted dramatically in 2026, with AI-driven bots now accounting for 80% of AI bot activity and record-breaking 31.4 Tbps DDoS attacks. These new behaviors evade traditional detection through residential proxy networks, behavioral mimicry, and sophisticated infrastructure.

· 8 min read
Web Platform

DNS-Persist-01: Let's Encrypt's New Model for Permanent Certificate Validation

DNS-Persist-01 is a proposed ACME challenge type that allows persistent DNS TXT records for certificate validation, eliminating the need for real-time DNS updates with each renewal as certificate lifetimes shrink to 47 days by March 2029 under CA/Browser Forum SC-081v3.

· 8 min read
Security

Zero-Day CSS: When Your Stylesheet Becomes a Security Vulnerability

CVE-2026-2441 is a critical zero-day CSS vulnerability in Chromium-based browsers allowing remote code execution through crafted HTML pages. Here's how attackers weaponize CSS parsing flaws and what developers must do to protect users.

· 6 min read
Security

Amazon and Google Unwittingly Reveal the Severity of the U.S. Surveillance State

Amazon Ring and Google Nest have inadvertently exposed the vast surveillance capabilities available to U.S. law enforcement through IoT devices, revealing warrantless data sharing and mass monitoring infrastructure that threatens constitutional privacy protections.

· 8 min read
Security

WiFi Is Becoming a Mass Surveillance System (And You Can't Opt Out)

Emerging WiFi sensing technology can detect your movements, breathing, and identity through walls without cameras—but you have no way to know when you're being watched, and no way to opt out.

· 8 min read
AI Tools

OpenClaw: Anatomy of a Viral AI Sensation

How a personal AI assistant became a viral phenomenon—and what the security incident teaches us about the future of AI agents.