Blog

  • Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

    Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

    Microsoft has unveiled a new multi-model artificial intelligence (AI)-driven system called MDASH to facilitate vulnerability discovery and remediation at scale, adding that it’s being tested by some customers as part of a limited private preview.
    MDASH, short for multi-model agentic scanning harness, is designed as a model-agnostic system that uses bespoke AI agents for different vulnerability

  • Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

    Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

    A threat actor with affiliations to China has been linked to a “multi-wave intrusion” targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its targeting.
    The activity has been attributed by Bitdefender with moderate-to-high confidence to a hacking group known as FamousSparrow (aka UAT-9244), which shares some level of

  • [Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud

    [Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud

    TL;DR: Stop chasing thousands of “toast” alerts. Join experts from Wiz to learn how hackers connect tiny flaws to build a “Lethal Chain” to your data—and how to break it. Register for the Strategic Briefing Here.
    Most security tools work like a smoke alarm that goes off every time you burn a piece of toast. You get so many alerts that you eventually start to ignore them.
    The real danger? While

  • Most Remediation Programs Never Confirm the Fix Actually Worked

    Most Remediation Programs Never Confirm the Fix Actually Worked

    Security teams have never had better visibility into their environments and never been worse at confirming what they fix stays fixed.
    Mandiant’s M-Trends 2026 report puts the mean time to exploit at an estimated negative seven days. The Verizon 2025 DBIR puts median time to remediate edge device vulnerabilities at 32 days. These numbers have understandably driven the industry toward a clear

  • Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

    Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

    Microsoft on Tuesday released patches for 138 security vulnerabilities spanning its product portfolio, although none of them have been listed as publicly known or under active attack.
    Of the 138 flaws, 30 are rated Critical, 104 are rated Important, three are rated Moderate, and one is rated Low in severity. As many as 61 vulnerabilities are classified as privilege escalation bugs, followed by

  • New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

    New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

    Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2).
    The new variant, observed by ThreatFabric between January and February 2026, has been observed actively targeting banking and cryptocurrency wallet users in France, Italy, and Austria.
    “TrickMo relies on a runtime-loaded APK  (dex.module),

  • Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help

    Webinar: What the Riskiest SOC Alerts Go Unanswered – and How Radiant Security Can Help

    Why do the Riskiest SOC Alerts Go Unanswered?
    Security operations teams are drowning in alerts. But the real problem isn’t always alert volume; it’s the blind spots. The most dangerous alerts are the ones no one is investigating.
    A recent report from The Hacker News examined why certain high-risk alert categories – WAF, DLP, OT/IoT, dark web intelligence, and supply chain signals- consistently

  • Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

    Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

    TeamPCP, the threat actor behind the recent supply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI as part of a fresh Mini Shai-Hulud campaign.
    The affected npm packages have been modified to include an obfuscated JavaScript file (“router_init.js”) that’s designed to profile the execution

  • Why Agentic AI Is Security’s Next Blind Spot

    Why Agentic AI Is Security’s Next Blind Spot

    Agentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking actions — most likely without meaningful involvement from the security team. The industry conversation has largely framed this as a question of policy: allow it, restrict it, or monitor it? However, that framing misses the point. 
    The more urgent

  • Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

    Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

    American educational technology company Instructure, the parent company of Canvas, said it reached an “agreement” with a decentralized cybercrime extortion group after it breached its network and threatened to leak stolen information from thousands of schools and universities.
    In an update shared on Monday, the Utah-based firm said it “reached an agreement with the unauthorized actor involved in