#security
14 articles exploring security. Expert insights and analysis from our editorial team.
Articles
Google Closes the $32B Wiz Deal: Cloud Security Has a New Power Player
Google completed its landmark $32 billion all-cash acquisition of cloud security firm Wiz on March 11, 2026—the largest deal in Google's history—reshaping the cloud security landscape.
Google Closes the $32B Wiz Deal: Cloud Security Has a New Power
Google completed its $32 billion acquisition of Wiz on March 11, 2026 — the largest cybersecurity deal in history. Here's what it means for cloud security teams, competitors, and the future of multicloud defense.
Securing AI Workloads: Why Containers Are AI's Biggest Attack Surface
AI workloads deployed in containers inherit every existing container vulnerability—plus a new class of AI-specific threats including model theft, prompt injection via sidecars, and supply chain attacks on model weights. Here's what practitioners need to know.
Document Poisoning: How Attackers Are Corrupting Your AI's Knowledge Base
RAG systems trust their document stores—and attackers know it. Document poisoning injects false or malicious content into knowledge bases, causing AI systems to generate attacker-controlled output for every user who asks the right question. Here's what the research shows.
How Researchers Hacked McKinsey's AI Platform—and What It Reveals
Security researchers at CodeWall used an autonomous AI agent to breach McKinsey's Lilli platform in approximately two hours, exposing 46.5 million messages through SQL injection—a decades-old technique that enterprise AI teams consistently fail to prevent.
Wrongfully Jailed by an Algorithm: AI Facial Recognition's Misidentification Crisis
At least eight innocent people—nearly all Black—have been wrongfully arrested because police trusted AI facial recognition systems that government studies show misidentify darker-skinned faces at rates 10 to 100 times higher than white faces. The crisis isn't the technology alone; it's the institutional trust placed in documented bias.
I Found a Vulnerability, They Found a Lawyer
Legal threats against security researchers remain a pervasive problem that chills the disclosure of critical software flaws. When companies weaponize laws like the CFAA and DMCA against the people protecting the public, everyone loses.
AI Voice Cloning Is Making Phone Scams Undetectable
Real-time AI voice cloning technology has enabled a new wave of sophisticated phone scams that can impersonate loved ones with just seconds of audio, costing victims millions and challenging traditional fraud detection methods.
The Mysterious Case of Chinese Bot Traffic in 2026: How AI-Powered Bots Are Rewriting the Rules of Detection
Chinese bot traffic patterns have shifted dramatically in 2026, with AI-driven bots now accounting for 80% of AI bot activity and record-breaking 31.4 Tbps DDoS attacks. These new behaviors evade traditional detection through residential proxy networks, behavioral mimicry, and sophisticated infrastructure.
DNS-Persist-01: Let's Encrypt's New Model for Permanent Certificate Validation
DNS-Persist-01 is a proposed ACME challenge type that allows persistent DNS TXT records for certificate validation, eliminating the need for real-time DNS updates with each renewal as certificate lifetimes shrink to 47 days by March 2029 under CA/Browser Forum SC-081v3.
Zero-Day CSS: When Your Stylesheet Becomes a Security Vulnerability
CVE-2026-2441 is a critical zero-day CSS vulnerability in Chromium-based browsers allowing remote code execution through crafted HTML pages. Here's how attackers weaponize CSS parsing flaws and what developers must do to protect users.
Amazon and Google Unwittingly Reveal the Severity of the U.S. Surveillance State
Amazon Ring and Google Nest have inadvertently exposed the vast surveillance capabilities available to U.S. law enforcement through IoT devices, revealing warrantless data sharing and mass monitoring infrastructure that threatens constitutional privacy protections.
WiFi Is Becoming a Mass Surveillance System (And You Can't Opt Out)
Emerging WiFi sensing technology can detect your movements, breathing, and identity through walls without cameras—but you have no way to know when you're being watched, and no way to opt out.
OpenClaw: Anatomy of a Viral AI Sensation
How a personal AI assistant became a viral phenomenon—and what the security incident teaches us about the future of AI agents.