Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mastering cloud app control, Part 3: Governing file transfers

In Part 1 and Part 2 of the cloud app control blog series, we saw how SinaraTech, a mid-sized ecommerce company, used access control to block risky apps and login control to weed out unauthorized access to legit applications. But the danger wasn't over yet. The Security SOC team had one final piece that was missing from the cloud app control puzzle. Let's continue down the road to find that piece.

Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers

SquareX released critical research exposing a hidden API in Comet that allows extensions in the AI Browser to execute local commands and gain full control over users' devices. The research reveals that Comet has implemented a MCP API (chrome.perplexity.mcp.addStdioServer) that allows its embedded extensions to execute arbitrary local commands on users' devices, capabilities that traditional browsers explicitly prohibit. Concerningly, there is limited official documentation on the MCP API.

Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Seraphic, the leader in enterprise browser security (SEB) and AI enablement, today announced native protection for Electron-based applications such as ChatGPT desktop, Teams, Slack, and more, becoming the first and only browser security platform to introduce this capability.

What Is a Large Language Model (LLM)?

The history of computing is marked by sea change moments; those times when the world seems to shift into a new possibility space almost overnight. ENIAC. The personal computer. The World Wide Web. The smartphone. And now, AI. While the term “AI” has been applied to many new (or re-branded) services and products, the underlying technology that makes most of them feel like magic is the large language model (LLM).

Network Security Policy Management (NSPM): Keeping Policy and Reality Aligned

Network Security Policy Management (NSPM) is the discipline of defining, enforcing, and maintaining the network policies that govern how systems communicate, what data moves where, and who can access what. It sits at the intersection of security and operations, helping organizations maintain consistent, enforceable rules across increasingly complex infrastructures.

When your AI Assistant Becomes the Attacker's Command-and-Control

Earlier this month, Microsoft uncovered SesameOp, a new backdoor malware that abuses the OpenAI Assistants API as a covert command-and-control (C2) channel. The discovery has drawn significant attention within the cybersecurity community. Security teams can no longer focus solely on endpoint malware. Attackers are weaponizing public and legitimate AI assistant APIs and defenders must adjust.

Why cyber resilience - not just compliance - is critical for manufacturing OT environments

Your manufacturing environment might be compliant, but that doesn't mean it's protected against a cyberattack. Even compliant systems can fall victim to cybercrime. And the consequences can be devastating. The SANS Institute sends a clear message in its 2025 State of ICS/OT Cybersecurity Survey: Regulatory compliance alone is no longer enough in operational technology (OT) environments.