Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Setting the Number of VMware CPU Cores Per Socket: Best Practices

When configuring processor settings for a new virtual machine, there are several key concepts to understand: how to calculate the number of processor cores per CPU and CPU cores per socket and how these settings affect the speed of virtual machines. In addition, it is important to understand what ensures better VM performance: limiting the number of processors and having more CPU cores or having more processors with fewer cores?

VMware vSphere HA and DRS Compared and Explained

A VMware hypervisor allows you to run virtual machines on a single server. You can run multiple virtual machines on a standalone ESXi host and deploy multiple hosts to run more virtual machines. If you have multiple ESXi hosts connected via the network, you can migrate virtual machines from one host to another.

WebPromptTrap - New Indirect Prompt Injection Vulnerability in BrowserOS

Cato researchers have discovered a new indirect prompt injection exploit pattern workflow in BrowserOS (an open-source agentic AI browser). We named it “WebPromptTrap” because the prompt originates from untrusted web content and it traps users into approving an authorization step through a trusted-looking AI summary.

Securing the AI That Runs the Enterprise: Zenity + ServiceNow SecOps

As agents take on more responsibility, they also introduce a new class of security challenges, ones that traditional tools weren’t built to handle. This is why Zenity and ServiceNow have partnered to bring end-to-end agent security directly into ServiceNow SecOps, where security teams already operate.

LevelBlue and SentinelOne: Advancing Integrated, IntelligenceDriven Security Operations

Today, I’m excited to share news that represents a major step forward in how LevelBlue helps organizations strengthen their resilience and modernize their security operations. LevelBlue and SentinelOne have entered into a strategic global partnership to deliver integrated, intelligence‑driven security operations and incident response for organizations worldwide.

Your Security Vision Has a Network Blind Spot

Every organization has invested in endpoint detection, identity, and cloud security, yet breaches continue to occur. You’ve secured the individual points but lack the context of how those points connect; you haven't secured the paths attackers navigate. Security teams are running more tools than ever: EDR on every endpoint, MFA for every identity, CSPM on every cloud tenant, and SIEMs ingesting terabytes of logs.

Agentic Context Security Platform Protecto is Now Available on Google Cloud Marketplace

Enterprise Agentic AI adoption faces a critical barrier: sensitive data exposure. AI agents perform tasks only as well as the context provided to them. However, context is precisely where enterprise data enters the workflow, introducing significant risk. Organizations need to deploy AI applications while maintaining strict data security, regulatory compliance, and privacy. This challenge stalls production deployments across enterprises, especially in healthcare and financial services.

Introducing IP Range Scanning: continuous Surface Monitoring for your entire network

Most organizations share a common, uncomfortable secret: they can’t answer basic questions about what is actually exposed on their IP ranges. As companies grow, whether through decades of history, global data centers, or regional allocations, they lose visibility of their IP footprint. Traditional manual reconnaissance is a point-in-time sync, often leaving security teams blind to what’s actually running on their infrastructure.

The AI Malware Surge: Behavior, Attribution, and Defensive Readiness

Over the last year, AI-assisted malware development has evolved from an experimental practice into a common part of the attacker toolkit. In a rolling window from February 2025 to February 2026, Arctic Wolf Labs observed over 22,000 distinct files triggering AI-focused YARA rules across multiple malware repositories. These files included AI-generated code, large language model (LLM)-style scaffolding, runtime AI API integration, and DeepSeek-derived artifacts.

The Future of Superintelligent Security Operations Starts with Data Built for AI

Every major shift in security operations starts with a shift in the underlying platform. The AI era is no different. As artificial intelligence moves from novelty to necessity, the real dividing line in cybersecurity will not be which vendor can add AI features the fastest. It will be which platforms are built on the right foundation to make AI useful in real operations and trustworthy when the stakes are high. That foundation is data, but not in the simplistic sense the market often uses the term.