The endless CISO reporting line debate — and what it says about cybersecurity leadership

The article discusses the persistent debate around the CISO's reporting line, arguing that this issue reflects a deeper organizational struggle with defining the CISO's role and authority. It emphasizes that the reporting line is less important than the CISO's organizational standing to influence decisions across various departments and that the ongoing debate highlights a tendency to view cybersecurity as a technical rather than a leadership issue.

Microsoft pays $2.3M for cloud and AI flaws at Zero Day Quest

Microsoft's Zero Day Quest hacking contest concluded with $2.3 million awarded to researchers for identifying nearly 700 vulnerabilities. The program incentivized the discovery of flaws in Microsoft's cloud and AI products.

Capsule Security Emerges From Stealth With $7 Million in Funding

Capsule Security, an Israeli startup, has secured $7 million in funding to develop solutions for securing AI agents at runtime. The company's approach focuses on continuous monitoring of AI agent behavior to prevent unsafe actions.

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

Microsoft's April Patch Tuesday addressed several critical vulnerabilities affecting major software vendors including Adobe, Fortinet, and SAP. A particularly severe SQL injection flaw in SAP Business Planning and Consolidation and SAP Business Warehouse is highlighted, carrying a CVSS score of 9.9. The patches aim to mitigate risks of unauthorized data access and code execution.

Raspberry Pi OS ends open-door policy for sudo

Raspberry Pi OS has updated its default configuration to require a password for the `sudo` command. This change aims to enhance security by preventing unauthorized privilege escalation on devices.

Defense in Depth, Medieval Style

The article describes the multi-layered defensive system of Constantinople's Theodosian Land Walls, which comprised four lines of defense including a moat, breastwork, outer wall, and main wall with numerous towers. This intricate system created a nearly unscalable barrier up to 30 meters high.

Microsoft fixes bug behind Windows Server 2025 automatic upgrades

Microsoft has released a fix for a bug that caused unintended automatic upgrades from Windows Server 2019 and 2022 to Windows Server 2025. This issue could have disrupted operations and caused compatibility problems for organizations.

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action

Mallory has launched an AI-native threat intelligence platform designed to provide actionable insights for enterprise security teams. The platform analyzes global threat data, contextualizes it against an organization's specific attack surface, and prioritizes threats for proactive defense. It aims to move beyond traditional alert systems by offering answers to critical security questions.

OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

OpenAI has announced GPT-5.4-Cyber, a specialized version of its GPT-5.4 model designed to assist cybersecurity professionals. This new model aims to enhance defenders' capabilities in identifying and resolving security issues, following a trend of AI companies developing tailored solutions for the cybersecurity sector.

Microsoft Bets $10 Billion to Boost Japan's AI, Cybersecurity

Microsoft has announced a $10 billion investment in Japan over the next two years, focusing on AI adoption and cybersecurity development. This strategic move is intended to bolster Japan's digital infrastructure, train its workforce in AI technologies, and foster new cybersecurity partnerships, aligning with global trends in sovereign AI and data center development.

Secure by Design: Building cybersecurity into the foundation

The article advocates for a 'Secure by Design' philosophy, emphasizing the importance of integrating cybersecurity measures into the foundational stages of product and system development. This approach aims to proactively reduce the attack surface by building security in from the start, rather than as an afterthought.

Microsoft adds Windows protections for malicious Remote Desktop files

Microsoft has implemented new security measures in Windows to combat phishing attacks that leverage malicious Remote Desktop connection (.rdp) files. These protections include displaying warnings to users and disabling risky shared resources by default, aiming to prevent unauthorized access through compromised RDP files.

Commvault has a Ctrl+Z for rogue AI agents

Commvault has introduced AI Protect, a new software designed to discover and monitor AI agents operating within AWS, Azure, and GCP. The software also offers the capability to revert actions taken by these AI agents if issues arise, effectively providing a 'Ctrl+Z' function for AI operations.

4 questions to ask before outsourcing MDR

Managed Detection and Response (MDR) is presented as a practical solution for security teams struggling with alert fatigue and limited resources. The article outlines four key questions organizations should consider when evaluating MDR services to ensure they effectively enhance cyber resilience through 24/7 threat detection and the ability to distinguish real threats from noise.

UK gov's Mythos AI tests help separate cybersecurity threat from hype

The UK government's Mythos AI system has successfully completed a challenging multi-step infiltration challenge, demonstrating its capabilities in cybersecurity threat assessment. This marks the first AI system to achieve such a feat, suggesting a growing potential for AI in analyzing and understanding complex cyber threats. The tests aim to distinguish genuine cybersecurity risks from exaggerated claims.

Microsoft releases Windows 10 KB5082200 extended security update

Microsoft has released the Windows 10 KB5082200 extended security update, addressing vulnerabilities that would have expired in April 2026. This update includes fixes for two zero-day vulnerabilities, along with other security improvements to protect users.

Upcoming Speaking Engagements

Bruce Schneier has announced his upcoming speaking engagements for early 2026. These include appearances at DemocracyXChange 2026, the SANS AI Cybersecurity Summit 2026, Nemertes [Next] Virtual Conference Spring 2026, and RightsCon 2026.

Microsoft rolls out fast-track to reinstate Windows hardware dev accounts

Microsoft has introduced a expedited process for developers to restore access to their Windows hardware developer accounts. This follows numerous complaints from developers who found their accounts suspended without prior notice, hindering their ability to develop and test Windows hardware. The fast-track option aims to address these disruptions and streamline the reinstatement process.

Virginia Governor Signs Bill Banning Sale of Precise Location Data

Virginia Governor Abigail Spanberger has signed S.B. 338 into law, which prohibits the sale of precise geolocation data belonging to Virginians. This legislation aims to protect citizens' privacy by restricting the commercialization of their location information.

5 Ways Zero Trust Maximizes Identity Security

Stolen credentials are a primary cause of data breaches and privilege escalation. The article explains how a Zero Trust security model, by focusing on identity, can mitigate these risks. It highlights Zero Trust's ability to restrict access, verify device trust, and prevent attackers from moving laterally within a network.

Google Adds Rust DNS Parser to Pixel Phones for Better Security

Google has incorporated a DNS parser written in Rust into Pixel phones, aiming to enhance security by addressing memory safety bugs common in lower-level programming environments. This move is intended to mitigate an entire class of vulnerabilities.

How AI is transforming threat detection

Artificial intelligence is significantly enhancing threat detection by enabling security teams to analyze vast amounts of data, identify subtle malicious activities, and detect potential attacks faster than traditional methods. Gartner predicts that by 2028, 50% of threat detection, investigation, and response (TDIR) platforms will incorporate agentic AI capabilities, up from less than 10% in 2024.

EFF 🤝 HOPE: Join Us This August!

The Electronic Frontier Foundation (EFF) is participating in the HOPE 26 conference from August 14-16 in Manhattan. The event provides a platform for community learning and connection around digital civil liberties, with EFF technologists, attorneys, and activists presenting on topics such as location data privacy, digital rights, and surveillance.

On Anthropic’s Mythos Preview and Project Glasswing

Anthropic has previewed its new AI model, Claude Mythos Preview, which possesses significant cyberattack capabilities. To proactively address these risks, Anthropic has launched Project Glasswing, an initiative to use the model to discover and patch software vulnerabilities before they can be exploited by malicious actors.

Speaking Freely: Dr. Jean Linis-Dinco

This article introduces Dr. Jean Linis-Dinco, an activist-researcher focused on human rights and technology, particularly in relation to cybersecurity. She has a PhD in Cybersecurity and works with the Manushya Foundation, advocating for digital rights and challenging policies that restrict online freedom of expression.

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

An international law enforcement operation involving the US, UK, and Canada has successfully disrupted multimillion-dollar cryptocurrency theft schemes. The operation resulted in the identification of over $45 million in stolen cryptocurrency and the freezing of $12 million.

NHS pays £46K to prep next Microsoft licensing round

NHS England is allocating £46,000 for benchmarking services to prepare for upcoming negotiations on its substantial Microsoft licensing agreement, which is reportedly worth £774 million. This move aims to ensure the best terms for the next phase of their software deal.

Was ist Federated Identity Management?

Federated Identity Management (FIM) is an Identity & Access Management (IAM) approach that allows users to authenticate once and access multiple services using a single digital identity. This optimizes user experience and can enhance security and resilience by reducing the need for multiple credentials, though it introduces architectural complexity.

Risky Bulletin: France takes first steps to ditch Windows for Linux

France is initiating a move away from Windows in favor of Linux for its public administration. This shift aims to enhance security and reduce reliance on foreign software. Meanwhile, OpenAI was affected by an Axios attack, Rockstar Games experienced another hack, and the UK is proposing jail time for tech executives who fail to prevent data breaches.

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises

Google has expanded end-to-end encryption for Gmail to Android and iOS devices for enterprise users, a move praised for offering verifiable customer-managed keys. This feature, available for specific Google Workspace editions, aims to enhance data security and regulatory compliance for organizations, particularly in regulated industries.

FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats

FINRA, the Financial Industry Regulatory Authority, has launched its Financial Intelligence Fusion Center (FIFC). This new center aims to bolster efforts against cybersecurity threats and financial fraud within the securities industry. By integrating data and intelligence, FINRA seeks to enhance its ability to detect, prevent, and respond to emerging risks.

Orange Business Reimagines Enterprise Voice Communications With Trust and AI

Orange Business is enhancing its enterprise voice communication services by integrating AI for improved user experience and operational efficiency. The company is focusing on building trust in these AI-powered solutions, addressing potential security and privacy concerns inherent in deploying AI in sensitive communication environments.

Project Glasswing and open source software: The good, the bad, and the ugly

Anthropic's Project Glasswing, backed by tech giants, aims to find and fix vulnerabilities in open source software using its AI program, Mythos. This initiative is designed to proactively identify security flaws in critical infrastructure, though the potential for AI to generate zero-day exploits is also acknowledged.

Britain seeks views before it drops the hammer on signal jammers

The UK government is launching a four-week call for evidence to gather public opinion on radiofrequency jammers. This initiative is a precursor to enacting legislation to ban these devices, which are often linked to criminal activities.

Google rolls out Gmail end-to-end encryption on mobile devices

Google has expanded end-to-end encryption (E2EE) for Gmail to all Android and iOS mobile devices. This feature allows enterprise users to send and receive encrypted emails directly within the Gmail app without requiring separate browser extensions or tools.

Sen. Sanders Talks to Claude About AI and Privacy

Senator Bernie Sanders recently discussed AI and privacy with Claude, an AI assistant. The conversation reportedly covered these topics effectively, with Claude demonstrating a good understanding of the issues.

MITRE Releases Fight Fraud Framework

MITRE has released a new framework designed to combat fraud. This framework utilizes a behavior-based model to identify the tactics and techniques commonly employed by fraudsters.

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google has made Device Bound Session Credentials (DBSC) generally available in Chrome 146 for Windows users. This feature aims to prevent session theft by tying web session credentials to the device, making it harder for attackers to steal and reuse them. Expansion to macOS is planned for a future release.

Google Rolls Out Cookie Theft Protections in Chrome

Google has introduced Device Bound Session Credentials in Chrome to combat cookie theft. This new feature cryptographically binds authentication to the device, rendering stolen session cookies unusable.