Skip to content

IoT security

Weekly Report: New Hacking Techniques and Critical CVEs 2 Dec – 10 Dec 2025

Between 2-10 December 2025, three developments stand out for enterprise defenders: Shai-Hulud 2.0 npm worm: A rapidly evolving supply chain threat abusing npm and GitHub Actions to build a self-propagating CI/CD worm, with active reporting and defensive guidance released during this week. The underlying campaign began in September but continued and evolved into December, especially… Read More »Weekly Report: New Hacking Techniques and Critical CVEs 2 Dec – 10 Dec 2025

GenAi Risks Firecompass and CISO

Generative AI Risks & Impact On CISOs and Their Teams

Generative AI can be used in a variety of applications, including image and speech recognition, natural language processing, and cybersecurity. In the context of cybersecurity, generative AI can be used to learn from existing data or simulation agents and then generate new artifacts. For example, generative cybersecurity AI can be used to develop secure application… Read More »Generative AI Risks & Impact On CISOs and Their Teams