News
Cutting the cost of SIEM rule conversion
4+ hour, 50+ min ago (284+ words) You inherit two thousand detection rules from an acquisition. They are written for a platform your company does not use. Your senior detection engineer estimates six months to port them. That estimate assumes nothing else breaks in the meantime. Overview…...
Google expands Android Binary Transparency to counter supply chain attacks
4+ hour, 20+ min ago (264+ words) Two software layers fall under the program at launch. The first is Google Applications, a set of production apps that includes Google Play Services and standalone Google apps shipped to support functionality across devices. The second is Mainline Modules, the…...
AWS open sources Trusted Remote Execution to control what AI agents touch
5+ hour, 20+ min ago (347+ words) Production scripts that read a log file generally hold the same permissions as scripts that delete one. The execution context decides what gets touched, and that gap widens once an AI agent is the one writing the script at runtime....
One in four MCP servers opens AI agent security to code execution risk
1+ day, 5+ hour ago (354+ words) Enterprise deployments of AI agents lean on two extension mechanisms that introduce risk at different layers of the stack. Reasoning phase vs. execution phase (Source: Noma Security) Researchers analyzed hundreds of popular MCP servers and Skills against eight risky capability…...
Can your coding style predict whether your code is vulnerable?
1+ day, 4+ hour ago (539+ words) Help Net Security Can your coding style predict whether your code is vulnerable? Developers leave fingerprints in the code they write. Naming choices, indentation patterns, preferred APIs, and the way someone structures a loop or handles a pointer all carry…...
Claude Security enters public beta with Opus 4. 7 vulnerability scanning and patching
2+ day, 20+ min ago (379+ words) Claude Security, previously called Claude Code Security, is in public beta for Claude Enterprise customers. Available in Claude. ai, the capability scans codebases for security vulnerabilities and suggests targeted patches for review, helping teams identify and fix issues that might…...
Lens Agents brings policy control to AI across cloud and desktop
2+ day, 2+ hour ago (112+ words) Lens by Mirantis has announced Lens Agents, a governed platform for running AI agents across enterprise systems, giving organizations a unified, policy-driven way to run, secure, and scale AI agents across desktop and cloud environments. AI agents are being deployed…...
Brush shell 0. 4. 0 tightens script safety, widens platform support
2+ day, 3+ hour ago (258+ words) Rust-based alternatives to traditional Unix shells continue to attract users who want bash compatibility alongside built-in features like syntax highlighting and history-based suggestions. Brush, a bash- and POSIX-compatible shell written in Rust, sits in that group, and version 0. 4. 0 brings more…...
Pipelock: Open-source AI agent firewall
2+ day, 4+ hour ago (220+ words) AI coding agents run with shell access, environment variables containing API keys, and unrestricted internet connectivity, creating a single point of failure where one compromised tool call can leak credentials to an attacker-controlled domain. Pipelock, an open-source security harness developed…...
Cisco releases open-source toolkit for verifying AI model lineage
5+ day, 20+ hour ago (327+ words) Cisco has published the Model Provenance Kit, an open-source Python toolkit and command-line interface that determines whether two transformer models share a common origin by examining architecture metadata, tokenizer structure, and the learned weights themselves. Some open weight models carry…...