News

UK’s online safety act continues rollout.Welcome to the CAVEAT Weekly Newsletter, where we break down some of the major developments and happenings occurring worldwide when discussing cybersecurity, ...
Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling ...
You can’t copy Maya Doron. Not just because she’ll notice (and yes, she has receipts), but because everything she does on social at Wiz is built on something AI can’t touch: chaos, specificity, and a ...
Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop ...
In this week's episode: NVIDIA’s Diffusion Renderer: We explore NVIDIA's new research into real-time diffusion rendering, a potential game-changer in photorealistic generation; Robotics Powered by ...
While Ben is on vacation this week, Dave welcomes back Ethan Cook to the show. On today’s episode, Ethan breaks down former President Trump’s recently released AI action plan, highlighting key ...
Matt Calligan, Director of Revenue Operations at ArmorText, joins us from Iceland to talk about what it takes to build a sales motion from scratch in cybersecurity when your product is built for ...
The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks.
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious ...
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between ...
Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider ...
Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A ...