Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Governance Suite Enhanced for Operational Oversight and Action

Kovrr's AI Governance Suite, released in November 2025, was designed to help organizations bring structure to how they assess and manage AI risk. Since then, it has been adopted by dozens of CISOs and AI GRC professionals operating in environments where GenAI tools and other AI systems were already embedded into daily business operations. Through their usage and feedback, however, a clear pattern emerged.

BeyondTrust Remote Support and Privileged Remote Access (CVE-2026-1731)

A recently disclosed vulnerability, tracked as CVE-2026-1731, affects BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA). The flaw is rated critical, with a CVSS v4 score of 9.9 according to the National Vulnerability Database. BeyondTrust published advisory BT26-02 confirming that an unauthenticated remote attacker may be able to execute operating system commands by sending specially crafted client requests.

Ep. 45 - Teen Hackers, SIM Swaps & Russian Ransomware

In Part 2 of our Russia cyber threat series, we unpack the Western cybercrime ecosystem powering Russian ransomware operations. We examine *Scattered Spider, LAPSUS$, and Shiny Hunters*, and how social engineering, SIM swapping, MFA bypass, and AI-driven voice spoofing are breaching Fortune 100 companies — without zero-days. Learn how access brokers commoditize breaches, why help desks are prime targets, and what this shift means for CISOs and security teams.

Sensitive Enterprise Data Is Flowing Into AI Tools at Scale

AI has no-so-quietly shifted from a single interface used by a small group of specialists into a mainstream capability embedded across enterprise infrastructure. Employees are now operationalizing AI for core business functions across departments. This shift fundamentally changes how organizations must think about data security.

FortiOS VPN Auth Bypass Flaw (CVE-2026-22153) Exposes Remote Access

LDAP is commonly used as a centralized authentication backend for VPN gateways. In a typical setup, users submit credentials to the VPN service, which forwards them to the LDAP server for validation. The VPN gateway then grants or denies access based on the response it receives. CVE-2026-22153 does not rely on malformed packets or memory corruption. Instead, it stems from flawed authentication logic, where certain LDAP response states can be misinterpreted under specific configurations.

What is Credential Stuffing? A Complete Prevention Guide for Enterprises

Credential stuffing attacks have become one of the most common, yet underestimated, cybersecurity threats facing businesses today. Even with strong firewalls and the latest endpoint protection, organizations still lose millions every year to stolen login credentials reused across accounts. What’s worse, these attacks often stay undetected until real damage occurs, which includes data breaches, customer account takeovers, and regulatory penalties.

6 Steps for Effective Data Exfiltration Incident Response

Data exfiltration incidents are some of the hardest cases to handle in DFIR. There’s no malware signature, no ransom demand, and usually, no clear intrusion point. You just get a vague alert (or worse, a tip from legal), and suddenly, you’re under pressure to figure out what data was taken, how it happened, and whether any evidence still exists. Miss one key detail, and you risk losing the trail. Or in some cases, corrupting evidence that legal teams or regulators will need later.

Lookout Expands Protection Following Google's Disruption of the IPIDEA Proxy Network

Last week, Google’s Threat Intelligence Group announced the disruption of IPIDEA, one of the largest and most abused residential proxy networks observed in the wild. IPIDEA quietly turned millions of consumer devices into proxy exit nodes, enabling cybercrime, espionage, and botnet activity—while putting users and enterprises at risk. At Lookout, we acted immediately.

Introducing the Keeper Security Slack App

The Keeper Security Slack App brings zero standing privilege and streamlined credential workflows directly into Slack – the platform your team already uses every day. This powerful integration connects your Keeper Vault with Slack, enabling secure credential access requests and approvals without ever leaving your workspace.