Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Is Building Your Attack Surface. Are You Testing It?

The market is flooded with claims. One vendor tops a leaderboard. Another raises nine figures on a pitch deck. Meanwhile, your developers shipped three AI-generated services before lunch. Here's the conversation the industry isn't having, and the one we've been building toward for years. There's a version of this conversation happening inside every Security team right now. Someone demos an AI coding assistant. The speed is undeniable and the team is in awe. Still cautious, sometimes skeptical.

CVE-2025-32975: Arctic Wolf Observes Exploitation of Quest KACE Systems Management Appliance

Starting the week of March 9, 2026, Arctic Wolf observed malicious activity in customer environments potentially linked to the exploitation of CVE-2025-32975 on unpatched Quest KACE Systems Management Appliance (SMA) instances that were publicly exposed to the internet. This vulnerability was patched in May 2025. Quest KACE SMA is an on-premises appliance for centralized endpoint management, providing inventory, software deployment, patching, and endpoint monitoring capabilities.

Our KnowBe4 Community Is One of Our Greatest Strengths

I am very proud of our customer community here at KnowBe4. It is a place where customers can discuss our products amongst each other and interface with KnowBe4’s developers and product managers. Allowing customers to interface with other customers allows them to hear suggestions and solutions that people using our product have discovered and used, and if they have a problem that a fellow customer can’t answer, our team is there.

CVE202547813: Wing FTP Server vulnerability flagged by CISA

CVE-2025-47813 is an information disclosure vulnerability in Wing FTP Server that reveals the application's full installation path when attackers send an oversized UID cookie value. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog in March 2026, indicating active exploitation in the wild.

Best sensitive data discovery tools for hybrid environments in 2026

Sensitive data discovery tools vary widely in hybrid coverage, identity context, and time-to-value. Most platforms handle cloud or on-premises infrastructure well, but rarely both. The strongest options connect discovery to identity and permissions, turning a file inventory into actionable risk intelligence. For Microsoft-heavy hybrid teams, that integration determines whether discovery produces reports or drives remediation.

Making cash management smarter with AI-powered insights from Balance - S2E11

In this episode, we're excited to introduce Batu Inal, Co-Founder and CTO of Balance, an intelligent treasury platform revolutionizing how enterprises optimize their cash management. Balance provides real-time visibility into cash across all accounts, AI-powered forecasting, and automated insights to help businesses work their money harder. With $50B+ in transactions processed and $2B+ in accounts monitored, the platform serves established organizations including large enterprise businesses.

Thinking in pipelines for AI agents with David Burkett

Join us for this session of Defender Fridays as we explore thinking in agent pipelines with David Burkett, Cloud Security Researcher at Corelight and Founder of Magonia Research. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Thinking long-term growth in an AI-dominated industry with Stel Valavanis of onShore Networks [302]

Today we're speaking with Stel Valavanis, Founder and Chairman at onShore Networks and Co-Founder at The Gallery Building, about sustaining a security company over three decades of industry changes. We also dive into investing in start ups and how founders can think long term about governance and growth.

Camille Stewart Gloster on how AI systems can help you wade through log data and get more done

AI and machine learning are already being used in cybersecurity to help reduce the "noise of all the indicators" that security teams receive. These systems can serve as a "first line of defense" by setting up potential response actions. However, organizations need to ensure they keep human analysts in the loop because contextual knowledge and human judgment remain critical. Data Security Decoded is available on our YouTube channel!