Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Hackers Who Left Their Entire Playbook Online

A ransomware group called Warlock tore through more than 60 organisations in six months, targeting the nuclear energy, aerospace, and government sectors. They chain zero-days and neutralise antivirus software using signed Chinese drivers. This is how they operate and how the Sophos CTU tracked them across eleven incidents to expose their full playbook​

Snyk Embeds Anthropic's Claude to Advance AI-Powered Security for Software Development

BOSTON, May 7, 2026 — Snyk, the AI security company, today announced it is leveraging Anthropic's Claude models to advance software security in an era of AI-powered development. Starting today, Snyk has integrated Claude into the Snyk AI Security Platform — powering automated vulnerability discovery, prioritization, and developer-ready fixes across code, dependencies, containers, and AI-generated artifacts. The threat driving that integration is real and accelerating.

Are banks ready for AI-powered cyber threats?

A recent American Banker article, “Knock on wood: Are banks doing enough to cope with Mythos?” raises a timely and uncomfortable question about advanced AI models like Anthropic’s Claude Mythos. As highlighted in the article, INETCO CEO Bijan Sanii points out a critical truth: The conversation is being fueled by the emergence of AI technology capable of identifying software vulnerabilities at a speed and scale that was previously unimaginable.

The DEA telehealth extension: how to prepare for new patient identity verification requirements

On December 31, 2025, the DEA issued its fourth temporary extension of the COVID-era telemedicine flexibilities, keeping the current rules in place through December 31, 2026. For telehealth companies prescribing controlled substances, the extension was welcome news.

Stop Blaming AI for Bad System Design | Fix MCP Security

Every few weeks, a new story surfaces: an AI agent deletes a production database, an autonomous coding tool racks up a five-figure cloud bill, or a chatbot exfiltrates internal documents through a prompt injection attack. The reaction is predictable. “AI is dangerous.” “LLMs can’t be trusted.” “We need better guardrails on the model.” But if you look at the root cause of these incidents, the model is rarely the problem. The system around it is.

Mac patch management: The realities of macOS patching

Mac patch management is the process of identifying, testing, and deploying software updates across macOS endpoints and third-party applications to reduce the window of exposure before attackers can exploit known vulnerabilities. It's a foundational practice within any enterprise cybersecurity program, particularly as Mac adoption in corporate environments continues to grow.

Stablecoin Payments in APAC: What Institutions Need to Know

Stablecoin transaction volumes have hit $33 trillion. Hong Kong just issued its first stablecoin licenses. In this panel from Fintech Fireside Asia, leaders from Fireblocks, Coinbase, FOMO Pay, and AWS break down what's actually happening on the ground across APAC: real use cases, shifting risk models, and where institutional adoption goes next. Panelists: Dan Sleep, Head of Business Solutions, APAC, Fireblocks Hassan Ahmed, Country Director Singapore, Coinbase Zack Yang, Co-founder, FOMO Pay Naveen Gupta, Head of Business Development, Payments, APJ Leader, AWS.

Key PCI DSS Controls You Must Build For 2026

PCI DSS controls are no longer just a compliance checkbox — they’re a mandatory security baseline that stands between your customers’ card data and sophisticated cybercriminals who are faster, smarter, and better-funded than ever before. According to the Nilson Report, global card fraud losses exceeded $33 billion in 2022 and are projected to surpass $38 billion by 2027.