Latest editions
The First AI-Orchestrated Espionage Campaign
The Line That Was Crossed Until now, AI “in attacks” mostly …
AI Agents Become the New Shadow IT
Shadow IT 2.0 Across many organizations, AI adoption has mov…
ESG Gets a New Letter: C for Cybersecurity
What Changed At the end of October, the European Securities …
Agentic AI: From AI Tools to AI Actors
What the Signal Is About Most organizations are already fami…
The F5 Breach Effect: Vendor Trust Repriced
Incident Summary In mid-October, F5 confirmed that a nation-…
Sovereign by Default
Key Takeaways Macro Outlook The regulatory tide has turned i…
When Politics Weakens Cyber Defense
Not every cyber crisis begins with a breach. Sometimes, it s…
From Pilots to Mandates – Digital ID Becomes Infrastructure
On September 25, the UK government confirmed that by 2029, e…
Capital Flows to Counter AI Agents Risks
On September 16, researchers disclosed ShadowLeak, a zero-cl…








