Get a 5-minute weekly threat intelligence focused on real-world exploitation and clear defensive action steps
Mar 25, 2026
Plus: AI workflows exploited in 20 hours, the Pentagon's kill chain warning, and why Google changed its bug bounty rules.
Mar 16, 2026
Plus: your AI coding assistant was being used to rob you, OpenAI enters the vulnerability scanner market, and cloud-native malware your EDR cannot see.
Mar 15, 2026
$220k Windows 0-day, unauthenticated SQL injection in AVideo, and the new "CrashFix" social engineering tactic. Plus: why your AI coding assistant might be your biggest supply chain risk this week.
Mar 5, 2026
5-minute weekly threat intelligence focused on real-world exploitation and clear defensive action steps
Mar 3, 2026
Attackers succeed by exploiting choke points — critical weaknesses in systems.The newsletter highlights those choke points and explains how to close them.