Cyber agencies from three countries including the US have issued a list of security best practices for protecting Microsoft Exchange Server, a…
Date Archives October 2025
Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw
Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability that’s been popular with threat groups as far…
Identity Management and Information Security News for the Week of October 31st: KeyData Cyber, Corsha, Ping Identity, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Claude AI vulnerability exposes enterprise data through code interpreter exploit
A newly disclosed vulnerability in Anthropic’s Claude AI assistant has revealed how attackers can weaponize the platform’s code interpreter feature to silently…
OpenAI launches Aardvark to detect and patch hidden bugs in code
OpenAI has unveiled Aardvark, a GPT-5-powered autonomous agent designed to act like a human security researcher capable of scanning, understanding, and patching…
The unified linkage model: A new lens for understanding cyber risk
When Okta’s support credentials were stolen in 2023, the breach didn’t stop at the identity provider. It rippled outward — through SaaS…
Agentic AI: What now, what next?
Download the November 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of…
Aembit Introduces Identity and Access Management for Agentic AI
Aembit today announced the launch of Aembit Identity and Access Management (IAM) for Agentic AI, a set of capabilities that help organizations…
AI-powered bug hunting shakes up bounty industry — for better or worse
AI-powered bug hunting has changed the calculus of what makes for an effective bounty program by accelerating vulnerability discovery — and subjecting…
Malicious packages in npm evade dependency detection through invisible URL links: Report
Threat actors are finding new ways to insert invisible code or links into open source code to evade detection of software supply…