83 Microsoft CVEs, Chrome zero-days, Veeam critical flaws, and actively exploited n8n bugs — all in one week. How to think about patch prioritization when everything is urgent.
Thompson InfoSec
Blog
Insights on cybersecurity risk, compliance, and security leadership.
39 million records exfiltrated from AWS infrastructure. Combined with Google Cloud's latest threat report, the message is clear: cloud misconfigurations remain the top risk.
A devastating wiper attack on a medical device giant and Canada's 259-day breach reporting lag reveal what happens when incident response isn't ready.
Three major supply chain compromises in one week highlight why vendor risk management can't be a once-a-year questionnaire.
AI is finding vulnerabilities faster than ever — and attackers are embedding it in malware. What organizations need to understand about this shift.
New techniques like Zombie ZIP and BlackSanta are bypassing endpoint detection tools entirely. What this means for your security program.