radar

ONE Sentinel

article

All Articles

THIS MONTH

Browse all curated articles across categories

738 articles
security

Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys

HIGH

Microsoft Enhances Windows Security with Phishing-Resistant Entra Passkeys

Bleeping ComputerTHREATS22d
security

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

HIGH

LeakyLooker Flaws in Google Looker Studio Pose Cross-Tenant SQL Threat

The Hacker NewsTHREATS22d
security

The New Turing Test: How Threats Use Geometry to Prove 'Humanness'

HIGH

Malware Adopts Geometry to Outsmart Sandboxes

Bleeping ComputerTHREATS22d
security

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

HIGH

Mitigating Zero-Day Vulnerabilities Through Attack Surface Reduction

The Hacker NewsTHREATS22d
security

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

HIGH

AI Agents: The New 'Invisible Employee' and Their Security Risks

The Hacker NewsTHREATS22d
security

CISA: Recently patched Ivanti EPM flaw now actively exploited

HIGH

Ivanti EPM Vulnerability Under Active Exploitation, CISA Urges Immediate Patching

Bleeping ComputerTHREATS22d
security

APT28 hackers deploy customized variant of Covenant open-source tool

HIGH

APT28 Utilizes Customized Covenant Framework for Espionage

Bleeping ComputerTHREATS22d
security

Microsoft to enable Windows hotpatch security updates by default

Microsoft to Default Hotpatch Security Updates for Windows in 2026

Bleeping ComputerTHREATS22d
smart_toy

Keep the Tokens Flowing: Lessons from 16 Open-Source RL Libraries

Unlocking the Potential of Open-Source Reinforcement Learning Libraries

Hugging FaceAI TOOLS22d
security

CRITICAL: CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CRIT

CISA Identifies Active Exploitation in SolarWinds, Ivanti, and Workspace One Vulnerabilities

The Hacker NewsTHREATS22d
security

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

HIGH

Salesforce Experience Cloud Targeted by Threat Actors Using Modified AuraInspector

The Hacker NewsTHREATS22d
dns

Beyond the Ticket: Why Observability is the Engine of the ITIL 5 Revolution | by Arvind Mehrotra | Feb, 2026 - DataDrivenInvestor

Unlocking ITIL 5: The Transformative Power of Observability

Google News ITIL 5ITIL51 month