Mandiant | Transform Your Cybersecurity20 · 2026-03-17 18:00
How Intelligence Led Security Drives Both Financial Savings and Proactive Protection
Many security leaders struggle to recognize and prove the tangible value of their existing threat intelligence investments. In a landscape drowning in telemetry, the challenge isn't just collecting data, but validating that it actually makes the organization prepared to respond to threats and ultimately more proactive. Recognizing this value is critical for justifying budgets and ensuring that security tools are delivering the protection and resilience promised. Join Shanyn Ronis, Lead Staff ...
Deeplinks15 · 2026-03-17 08:03
Bonus Podcast Episode: Privacy’s Defender - Cindy Cohn with Cory Doctorow
While How to Fix the Internet is on hiatus, we wanted to share a great conversation with you from last week. EFF Executive Director Cindy Cohn spoke with bestselling novelist, journalist, and EFF Special Advisor Cory Doctorow about Cindy’s new book, “Privacy’s Defender: My Thirty-Year Fight Against Digital Surveillance” ( MIT Press ). %3Ciframe%20height%3D%2252px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simpl...
Proofpoint Threat Insight12 · 2026-03-17 21:00
CursorJack: weaponizing Deeplinks to exploit Cursor IDE
Author’s Note: This post reflects Proofpoint Threat Research observations in a controlled test environment as of January 19, 2026. Proofpoint has no commercial, customer, partner, or vendor relationship with Cursor (published by Anysphere, Inc.). Cursor did not review or endorse this report. We notified Cursor through its vulnerability‑reporting channel; the report was closed as out‑of‑scope / Not Applicable under their policy. Findings are presented as a risk pattern involving deeplink‑drive...
Linux Foundation Blogs12 · 2026-03-17 01:26
Zephyr at 10: A Decade of Open Source Embedded Innovation
Ten years ago, the Zephyr Project was launched with a bold vision: to build a neutral, secure, and vendor-independent real-time operating system (RTOS) that could thrive in the most resource-constrained environments. Today, I am thrilled to share our latest research report, Zephyr Turns 10: A Decade of Adoption, Maturity, and Ecosystem Evolution , which empirically captures the incredible maturity of this community from its earliest formation stage to foundational digital infrastructure.