Where AI in the SOC is actually delivering - and where it isn't

Where AI in the SOC is actually delivering — and where it isn’t“We’ll have a generation of security professionals who can supervise AI but can’t function without it." For all the noise surrounding “agentic AI” in cybersecurity, security operations centers are still wrestling with the same fundamental questions: What does AI genuinely improve today? Where does it fall short? How can organizations tell the difference?

INETCO wins 2026 fraud detection and cybersecurity software award

INETCO has been named Best Online Fraud Detection & Cyber Security Software 2026 by Corporate Vision in the Canadian Business Awards. This recognition highlights the real world impact our customers are making to prevent payment fraud and strengthen cyber resiliency across global payment ecosystems.

Incident responders, s'il vous plait: Invites lead to odd malware events

A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway? Sophos’ Managed Detection and Response (MDR) teams reported on a phishing campaign late last year that attempted to trick users into installing LogMeIn Resolve (formerly GoToResolve), a remote monitoring and management (RMM) tool, to acquire remote unattended access.

Claude Code Auto Mode: What It Means for AI Agent Privilege Management

Anthropic’s new Claude Code Auto Mode Auto Mode is generating well-deserved attention. It introduces a classifier that sits between the developer and every tool call, reviewing each action for potentially destructive behavior before it executes. It’s a real improvement over the only previous alternative to manual approval: the –dangerously-skip-permissions flag. But the announcement is also useful for a broader reason.

Browser Agents: What are their security risks?

AI-powered browser agent security risks are structurally different from traditional software risks: agents inherit authenticated sessions, operate across multiple applications simultaneously, and generate actions from natural language instructions that no existing control layer can interpret. Governing them is now part of building cyber resilience, because you need visibility into both identity and data before deployment, not after an incident.

Criminals Are Selling Stolen Tax Forms for Cheap on the Dark Web

Researchers at Malwarebytes warn that cybercriminals are peddling stolen tax documents for as low as $4 per identity, with freshly stolen forms selling for $20 each. These documents allow threat actors to conduct refund fraud, using stolen personal information to claim victims’ tax refunds.

Report: There Are Nearly 66 Billion Stolen Identity Records on Criminal Forums

Researchers at SpyCloud warn that the number of stolen identity records on criminal forums rose to 65.7 billion in 2025, a 23% increase from the previous year. “Phishing, malware, third-party breaches, and combo lists feed vast volumes of identity data into the industrialized criminal ecosystem,” the researchers write. “The risk extends beyond compromise – it fuels costly attacks at scale.

Connect, monitor, and manage industrial machines securely online

Connecting, monitoring, and managing industrial machines securely online is a central theme in modern manufacturing and process industries. An edge gateway allows production lines, factories, and installations to be digitally connected, enabling machines, sensors, and control systems to exchange data with cloud platforms, business applications, and maintenance teams. This connection enables remote process monitoring, performance analysis, and automated interventions, as long as this is done in a controlled and secure manner.