All Articles
THIS MONTHBrowse all curated articles across categories
How Ceros Gives Security Teams Visibility and Control in Claude Code
Claude Code: The New Actor in Enterprise Security Landscape
CRITICAL: CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
CRITCISA Alerts on Microsoft Intune Vulnerability Following Stryker Breach
CRITICAL: DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover
CRITDarkSword Exploit Kit Targets iOS Devices with Zero-Day Flaws
CRITICAL: Critical Microsoft SharePoint flaw now exploited in attacks
CRITExploited SharePoint Flaw Sparks Urgent Security Concerns
New ‘Perseus’ Android malware checks user notes for secrets
HIGHPerseus Malware Targets Android Users' Notes for Sensitive Data
Open SWE Captures the Architecture That Stripe, Coinbase and Ramp Built Independently for Internal Coding Agents
Revolutionizing Internal Coding with Open SWE: A New Framework from LangChain
The Genealogy of AI Slop: Generative AI Didn’t Invent It – It Learned It
Understanding the Roots of AI Slop in IT Service Management
CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks
HIGHCISA Alerts on Active Exploitation of Zimbra and SharePoint Vulnerabilities
Musk’s tactic of blaming users for Grok sex images may be foiled by EU law
EU Law Threatens to Cool Down Grok's Controversial Content Strategy
Kagi Translate's AI answers the question "What would horny Margaret Thatcher say?"
Exploring the Quirky Side of AI with Kagi Translate
OpenAI Japan announces Japan Teen Safety Blueprint to put teen safety first
OpenAI Japan Unveils Teen Safety Blueprint to Enhance Generative AI Protections
Polly is generally available everywhere you work in LangSmith
Introducing Polly: Your AI Assistant for Debugging Agents