CVE-2026-0300 - Critical Buffer Overflow in PAN-OS User-ID Authentication Portal

On May 6, 2026, Palo Alto Networks disclosed a critical buffer overflow vulnerability (CVE-2026-0300) in the User-ID Authentication Portal (Captive Portal) component of PAN-OS. This vulnerability allows an unauthenticated, remote attacker to execute arbitrary code with root privileges on affected PA-Series and VM-Series firewalls by sending specially crafted packets. No user interaction or credentials are required.

CYJAX Launches Compromised Device Alerting to Detect Threats Earlier

Detect compromised devices before attackers act. CYJAX’s new alerting identifies stealer malware infections and exposed credentials in near real time. CYJAX today announced the launch of Compromised Device Alerting, a new capability designed to help organisations identify compromised devices within their environment before attackers can act on stolen credentials.

How AI-accelerated threat discovery is reshaping network security

How AI-accelerated threat discovery is reshaping network security As vulnerabilities are discovered faster than ever, organizations must rethink how they reduce exposure and contain risk at the network edge. Claude Mythos Preview has reignited debate about AI-driven cyber attacks, but the real shift isn’t what AI finds, it’s how quickly issues at the network edge can turn into impact. This post explores what’s changed and how network security must adapt to keep up.

Agentic AI in security operations: Friend, risk, or both

Agentic AI is forcing a hard question on every security leader: when your SOC is full of autonomous “doers” instead of just dashboards and scripts, is that your new best friend or a brand‑new risk surface you barely understand? The honest answer is both, and the way you design, govern, and deploy these systems will decide which side wins.

The 5 best GRC software solutions for CMMC compliance in 2026

Accelerating security solutions for small businesses‍ Tagore offers strategic services to small businesses. A partnership that can scale‍ Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. Standing out from competitors‍ Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market.

The Partnerships Taking on AI Security: Daniel Bernard, CrowdStrike Chief Business Officer

The previous episode of the Adversary Universe podcast explored the “vuln-pocalypse” and the implications of advanced AI models accelerating vulnerability discovery and exploitation. Now, we’re diving into how companies are working together to face these evolving security risks. CrowdStrike Chief Business Officer Daniel Bernard spends much of his time talking with partners and customers about how to address their growing concerns: Is their business protected? Do they know which vulnerabilities are in their environment? What do they do about them?

The JSONFormatter Wake-Up Call: How Developer Tools Are the New Identity Breach Vector

Everyone uses developer tools to get through the day. A JSONFormatter to inspect an API response, or a JWT decoder when you need to inspect a token quickly. In most engineering teams, these tools are treated as harmless productivity aids. In November 2025, researchers discovered that JSONFormatter and CodeBeautify had been storing everything users pasted into them via a save feature that generated shareable links with fully predictable URL structures. A simple crawler could retrieve all of them.

AI Security and Trust: Why SOC Teams Don't Trust AI

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo 92% of security leaders say something is actively reducing their trust in AI within the SOC. These aren’t skeptics, they’re people who have already adopted AI and believe in its ability to enhance security operations. We know from the 2026 AI SOC Leadership Report that AI is already widely adopted in the SOC, with 94% of organizations using it in some capacity.

AI SOC vs. white box AI: Why black boxes fail in the real world

There’s a growing wave of “AI SOC” startups promising autonomous everything. They’ll triage your alerts, investigate threats, and even run your playbooks. Push a button, let the machine handle the mess, and enjoy the magic. It sounds great until the moment something breaks. Then everyone, not just security, asks the same question: “What exactly did it do?” And that’s when these systems turn into a liability.

The $10 Million Question: Why Are 81% of Organizations Still Getting Breached?

We are living in a security paradox. Cybersecurity budgets are increasing, security stacks are growing more complex, and yet, the needle barely seems to move. According to the newly drafted 2026 Cyberthreat Defense Report (CDR), 81% of organizations experienced at least one successful cyberattack this past year. Even more concerning, the number of organizations suffering from six or more successful attacks is actually creeping up.