Many software and SaaS companies are building AI agents into their products, but these features can expand the attack surface of those…
News
Southeast Asia CISOs Top 13 Predictions for 2026: Securing AI, Centering Identity, and Making Resilience Strategic
In my recent conversation with CISOs across Southeast Asia, they shared with me a pragmatic view of 2026. Attackers are shifting tactics,…
AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform
A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even…
Cisco finally patches seven-week-old zero-day flaw in Secure Email Gateway products
Better late than never. Cisco this week patched a ‘critical’ zero-day flaw in the company’s email security and management gateways that has…
Identity Management and Information Security News for the Week of January 16th: One Identity, JumpCloud, Pathlock, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Google Vertex AI security permissions could amplify insider threats
The finding of fresh privilege-escalation vulnerabilities in Google’s Vertex AI is a stark reminder to CISOs that managing AI service agents is…
Modular DS bug hands hackers instant WordPress admin access
Security researchers have confirmed active exploitation of a maximum-severity privilege escalation flaw in the widely used Modular DS plugin, a tool used…
WEF 2026: KI weiterhin Top-Thema in der Cybersicherheit
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?quality=50&strip=all 7913w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2672968311.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Insider risk in an age of workforce volatility
Economic pressures, AI-driven job displacement, and relentless organizational churn are driving insider risk to its highest level in years. Workforce instability erodes…
One click is all it takes: How ‘Reprompt’ turned Microsoft Copilot into data exfiltration tools
AI copilots are incredibly intelligent and useful — but they can also be naive, gullible, and even dumb at times. A new…