Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Attacks, CaaS & the New Reality of Banking Security

This week, in the episode – Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, speaks with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), on how large financial institutions are navigating a rapidly evolving cyber threat landscape. The conversation covers the rise of AI-driven attacks, Cybercrime-as-a-Service (CaaS), and the growing complexity that comes with expanding digital footprints across cloud, applications, and APIs.

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse. Over the past few years, organizations have scaled microservices, cloud-native apps, and partner integrations faster than corporate governance models could keep up, resulting in undocumented or shadow APIs. We’re now seeing this pattern all over again with AI systems. And, even worse, AI introduces non-deterministic behavior, autonomous actions, and machine-to-machine decision-making. Put simply, shadow AI is much, much riskier than shadow APIs.

What is OpenClaw andAgentic AI? The Security Issues You Need to Be Aware of Now

Over the past several weeks, OpenClaw and MaltBook have exploded across the headlines. Outlets have published stories about AI agents organizing themselves or even acting independently on Moldtbook. SecurityScorecard’s Jeremy Turner, VP of Threat Intelligence & Research and Anne Griffin, Head of AI Product Strategy discuss what OpenClaw is, how agentic AI works, and where the real security issues are based on new research from SecurityScorecard's STRIKE Threat Intelligence team.

Why Your MSP Could Disqualify Your CMMC Assessment

Now that CMMC is a mandatory part of participating in the defense supply chain, a lot of businesses are starting to grapple with the requirements and what they mean for operations. One of the biggest roadblocks is the use of an MSP, or Managed Services Provider. MSPs are the backbone of many businesses that don’t have the resources to spin up entire architectures on their own. It’s a huge benefit and allows companies to exist when otherwise the investment to get started would be way too high.

How KeeperPAM Integrates With IGA Platforms

Privileged Access Management (PAM) and Identity Governance and Administration (IGA) play important roles in securing modern organizations, but what happens when they work together? In this short video, learn how integrating KeeperPAM with IGA platforms extends identity governance into privileged access and delivers full visibility into privileged activity.

Real-Time Cloud Detection & Response (CDR)

As adversaries accelerate with GenAI and blend into legitimate cloud activity, real-time correlation between telemetry and control plane events is critical. Without it, investigations stall and visibility gaps grow. CrowdStrike delivers real-time detections and automated cloud-native response to stop adversaries in seconds. Subscribe and Stay Updated.

CVE-2026-1281 & CVE-2026-1340: Actively Exploited Pre-Authentication RCE in Ivanti EPMM

Approximately 1,600 Ivanti Endpoint Manager Mobile (EPMM) instances are currently exposed globally, creating a significant attack surface for enterprise mobile infrastructure. Ivanti has disclosed two critical vulnerabilities, CVE-2026-1281 and CVE-2026-1340, that allow unauthenticated remote code execution on affected on-premises deployments. CVE-2026-1281 has been confirmed exploited prior to disclosure and is now listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog.

Top Dark Web Forums to Watch in 2026

If you listen to the news, the “Dark Web” sounds like a digital version of a back-alley movie set. But if you’re a threat researcher, it looks a lot more like a marketplace one that is surprisingly organized, highly volatile, and increasingly sophisticated. As we move through 2026, the underground isn’t just one big scary place; it’s a fragmented collection of forums, each with its own “culture” and specialty.