Cybersecurity Predictions for 2026: The Future of Digital Threats
Cybersecurity experts discuss 2026 predictions, highlighting the rise of AI-driven threats and the need for advanced security measures to combat risks.
Dark Reading reports that for 2026, security must shift from prevention to resilience. AI attacks are too fast for old methods. If you aren't spending 30% of your budget on recovery, you are behind. Focus on MTTR to protect shareholders.
www.darkreading.com/threat-intel...
04.01.2026 02:17 β π 0 π 0 π¬ 1 π 0
Me: βPolly, you canβt say that! Bad parrot! Say youβre sorry.β
π¦ Polly: *Awwkk* βBad parrotβ *Awwkk* βSorryβ *whistle* π¦
Me: βOkay, Polly, donβt do it again.β
π¦ Polly: *Awwkk* βDo it againβ¦do it again!β *Awwkk* *whistle* π¦
03.01.2026 05:35 β π 4 π 3 π¬ 0 π 2
We need to stop waiting for infinite context windows and start building better harnesses.
Give your digital interns a notebook that survives the reboot. 4/
#AI #AgenticWorkflows #Severance #Security #SDD
10.12.2025 04:00 β π 0 π 0 π¬ 1 π 0
This is huge for Security.
Imagine a Red Team agent finding a bug. If it doesn't leave a perfect map (External Memory) for the next agent, you waste tokens and miss fixes.
The "Spec" isn't just instructionsβit's the Agent's long-term memory. 3/
10.12.2025 04:00 β π 0 π 0 π¬ 1 π 0
I read Anthropic's new paper on "Long-Running Agents" and the solution is clear:
It's not just about smarter models (better interns).
It's about better Context (external memory).
You need a "Manager" agent to leave a detailed "To-Do" list for the "Worker" agent. 2/
10.12.2025 04:00 β π 0 π 0 π¬ 1 π 0
If you've seen Severance, you know the horror of the "Innie"βwaking up at work with no memory of the past.
That's exactly how we treat AI Agents.
We spin them up, they work, we kill them.
The next agent starts with zero memory of what the previous one did.
It's the Amnesiac Intern problem. π§΅ 1/
10.12.2025 04:00 β π 0 π 0 π¬ 1 π 0
Now security departments are going to have to figure out how to control AI agents in the hands of every knowledge worker?
Tell me what you think...
(3/3)
04.12.2025 22:26 β π 0 π 0 π¬ 0 π 0
I mean, do we want our knowledge workers using AI to create and deploy AI agents? Companies expend a lot of effort to keep these knowledge workers from clicking on phishing emails or sharing sensitive information when they set up their out of office notifications. (2/3)
04.12.2025 22:26 β π 0 π 0 π¬ 1 π 0
Google Workspace Updates: Now available: Create AI agents to automate work with Google Workspace Studio
Google has announced Google Workspace Studio to allow enterprise Google users to create and share AI agents.
Google is continuing to pull ahead in AI, but is this really a good thing? (1/3)
workspaceupdates.googleblog.com/2025/12/work...
04.12.2025 22:26 β π 0 π 0 π¬ 1 π 0
Watching a really interesting presentation by Dr Chase Cunningham at the Cloud Security Alliance Zero Trust Summit. Heβs making a strong case for Cybersecurity Tax Credits as a means to incentivize better practices, increased investment, and risk reduction. #cybersecurity
03.12.2025 16:34 β π 0 π 0 π¬ 0 π 0
Big news in the Identity & Access Management (IAM) market:
ServiceNow (NYSE: NOW) is acquiring Veza, giving them a solid entry into the Identity Governance & Administration space, and validating the importance of this capability in today's security and tech stack.
#cybersecurity #servicenow #IAM
02.12.2025 20:47 β π 0 π 0 π¬ 0 π 0
The AI Paradox: Why Hyper-Efficiency Could Mean More Human Work
How a 19th-century economic theory can inform our thinking about AI and the future of work.
My latest on Substack:
open.substack.com/pub/northwoo...
#AI #FutureOfWork #JevonsParadox #ArtificialIntelligence #Leadership #TechTrends #Innovation #Economics #CloudComputing
02.12.2025 20:15 β π 2 π 0 π¬ 0 π 0
Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites
Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites
02.12.2025 19:44 β π 3 π 1 π¬ 0 π 0
Over the past week, I've been posting on LinkedIn about the AI Agent-based cyberattack reported by Anthropic. I've looked at a number of aspects of the attack. The links to all of the posts are summarized here: www.linkedin.com/posts/michae...
#cybersecurity #ai-attack #anthropic #cyberattack
21.11.2025 18:08 β π 3 π 0 π¬ 1 π 0
Letβs run the government like a business, drive the car like a bicycle, and play the guitar like a piano
25.11.2024 11:41 β π 32632 π 3788 π¬ 829 π 218
Fancy Bear 'Nearest Neighbor' Attack Uses Nearby Wi-Fi Network
Fancy Bear 'Nearest Neighbor' Attack Uses Nearby Wi-Fi Network
25.11.2024 18:38 β π 3 π 2 π¬ 0 π 0
π
24.11.2024 05:03 β π 0 π 0 π¬ 0 π 0
After being on Twitter since 2008, it seems like time to set up a new shop.
23.11.2024 21:22 β π 0 π 0 π¬ 0 π 0
is there a link to this?
23.11.2024 21:05 β π 0 π 0 π¬ 1 π 0
Innovative and frightening at the same time.
We have assumed too long that WiFi attacks would really only be practical through physical proximity.
23.11.2024 21:04 β π 0 π 0 π¬ 1 π 0
Professor a NYU; Chief AI Scientist at Meta.
Researcher in AI, Machine Learning, Robotics, etc.
ACM Turing Award Laureate.
http://yann.lecun.com
Security Analyst. Panther Modern.
Engineer at Security Onion Solutions.
Professor at Canisius University.
Organizer at Infosec 716 and BSides Buffalo.
Head of Outreach at Cisco Talos. These are my views not my employers. @infosec_nick on the other site.
infosec β’ I kept my blackberry as long as possible and now Iβm on bluesky
Flux d'info sur la cybersecuritΓ©, infosec
πΊπΈ @infosec.skyfleet.blue
π @skyfleet.blue
Public interest 501(c)(3) law firm for natsec & info/privacy law. Website https://www.nationalsecuritylaw.org. Charitable tax-exempt donations always welcome; details on website front page. Media email Media@ NationalSecurityLaw.org, others email Kel there
Nat-sec professional, dog and cat lover, martial artist, external processor, Balloon Juice's emergency back up food goddess (I have a tiara and everything!). You can find me here: https://balloon-juice.com/category/silverman-on-security/
Securing Everyone's Digital Journey through cooperative red teaming and security consulting.
OSINT pro. CFE. Data & digital privacy pro. Google dorker. Librarian. Instructor. Amateur historian. Former USG & private due diligence analyst/leader/instructor.
Connecting.The.Dots.
Finds it!
Posts about #OSINT, #GeoInt, #HumInt; some #OpSec, #InfoSec & a bit of #Python
ποΈ: linktr.ee/osint_research
π: beacons.ai/osint_research
π: start.me/p/rxekAP/osint-research
π: start.me/p/p1qj2E/osint-extensions
PAI enjoyer, OSINT guy βͺ@truth.bsky.socialβ¬ , my views/freezing cold takes are my own. Standard spiel about not endorsing retweets, likes, and comments.
Erlerne Ermitteln. HerstellerunabhΓ€ngige Schulungen zu Open Source Intelligence und digitalen Ermittlungen.
Experimental OSINT Aggregator bridge from X to Bluesky
ALL content belongs to their respective owners.
Focus Ukaine
https://www.inoreader.com/stream/user/1005072895/tag/OSINTbridge/view/html?t=OSINTbridge&sb=y
OSINT Editor at Sky News. Verifying and investigating. Part of the Data+Forensics unit.
Often found in the mountains.
Association OSINT-FR | https://OSINTFR.COM/ | CommunautΓ© dΓ©diΓ©e Γ l'Open Source Intelligence. ΓvΓ©nements, apprentissage et collaborations autour des pratiques liΓ©es Γ l'OSINT.
Hacker. Friend. Cybersecurity Researcher at Huntress.