The F5 Breach Effect: Vendor Trust Repriced

The F5 Breach Effect: Vendor Trust Repriced

Incident Summary In mid-October, F5 confirmed that a nation-state actor gained long-term access to its internal systems and stole portions of BIG-IP source code along with internal vulnerability research....

Sovereign by Default

Sovereign by Default

Key Takeaways Macro Outlook The regulatory tide has turned into a current.What began as privacy (and political) rhetoric is now shaping business models and revenue forecasts. In one week,...

When Politics Weakens Cyber Defense

When Politics Weakens Cyber Defense

Not every cyber crisis begins with a breach. Sometimes, it starts with a political decision. Or the lack of one. Last week, the CISA 2015 Information-Sharing Act expired. At...

Capital Flows to Counter AI Agents Risks

Capital Flows to Counter AI Agents Risks

On September 16, researchers disclosed ShadowLeak, a zero-click flaw in ChatGPT’s Deep Research that exfiltrated Gmail through a connector. No click, no phishing page, just a crafted input. At...

AI Identity Attacks. From Novel to Normal

AI Identity Attacks. From Novel to Normal

AI-powered identity abuse moved from novel to normal this week. On September 12, Okta detailed VoidProxy, a phishing-as-a-service kit that bypasses MFA (Multi-Factor Authentication) by stealing sessions in real...

Kids’ privacy enforcement steps up.

Kids Privacy Enforcement Steps Up

Cybersecurity as a Business. Sep 1-7, 2025 Edition Children’s data moved back to the center of policy and enforcement. In the United States, the FTC announced actions that included...