CSec Weekly
Archive
Subscribe
Search
Log In
Eyal Estrin

✍ Author of Cloud Security Handbook & Security for Cloud Native Applications ☁ AWS · Azure · GCP 💭 All opinions are my own 🌐


Feb 4, 2026

byEyal Estrin

SolarWinds Critical RCE Flaws Demand Immediate Patching

New data shows soaring GDPR reports, rampant unsanctioned AI tools in use and access gaps for former staff as agencies warn about AI risk

SolarWinds Critical RCE Flaws Demand Immediate Patching

Jan 27, 2026

byEyal Estrin

AI Adoption Creates Huge Cyber Risk Gaps

Supply chain risk rules move forward in Europe while security teams digest ransomware backdoor lessons and phishing threats in energy

AI Adoption Creates Huge Cyber Risk Gaps

Jan 20, 2026

byEyal Estrin

CISOs Shift Focus to Keeping Business Running

Breaking cybercrime nodes and growing AI platform risk show how fraud and source code theft are reshaping security priorities for teams and boards

CISOs Shift Focus to Keeping Business Running

Jan 13, 2026

byEyal Estrin

Security Leaders Must Own AI Agent Identity Risk

Data theft attempts on cloud sharing sites and rising AI risks show why identity verification and compliance focus are top priorities for security teams

Security Leaders Must Own AI Agent Identity Risk

Jan 6, 2026

byEyal Estrin

AI Misuse and Emerging Attack Techniques in 2025

High impact breaches and evolving AI threat landscape underscore need for leadership strategy and hybrid risk frameworks

AI Misuse and Emerging Attack Techniques in 2025

Dec 30, 2025

byEyal Estrin

OWASP Top 10 Brings Clarity to AI Agent Risks

Security leaders face AI agent risk's identity threats and hard lessons from real scenes into ransomware and maritime malware

OWASP Top 10 Brings Clarity to AI Agent Risks

Dec 23, 2025

byEyal Estrin

Enterprise VPNs Targeted with Massive Password Probing

What security leaders are watching as credential attacks and OT risk rise

Enterprise VPNs Targeted with Massive Password Probing

Dec 16, 2025

byEyal Estrin

AI Now Tops the List of Cybersecurity Threats

Learnings from AI danger, fake access and a major airline hack

AI Now Tops the List of Cybersecurity Threats

Dec 9, 2025

byEyal Estrin

npm Supply Chain Breach Exposes Cloud Secrets

Why every CISO should audit dependencies, review third‐party apps and vet AI tools

npm Supply Chain Breach Exposes Cloud Secrets

Dec 2, 2025

byEyal Estrin

OpenAI breach exposes analytics‐partner phishing risk

Email phishing and insider leaks show third‐party risks remain high

OpenAI breach exposes analytics‐partner phishing risk

Nov 25, 2025

byEyal Estrin

Fortinet’s critical bug quietly exploited in the wild

Cloud outages and exploited flaws highlight the need for stronger security

Fortinet’s critical bug quietly exploited in the wild

Nov 18, 2025

byEyal Estrin

Why Your Enterprise Credentials Are Still the Weakest Link

Still vulnerable: credentials, legacy tech and regulatory change

Why Your Enterprise Credentials Are Still the Weakest Link

Nov 11, 2025

byEyal Estrin

Key Findings from The CrowdStrike 2025 Threat Report

AI, Ransomware, and Emerging Enterprise Cyber Risks

Key Findings from The CrowdStrike 2025 Threat Report

Nov 4, 2025

byEyal Estrin

Why Paying Ransoms Still Costs You Your Data

Ransomware risks, AI guardrails, and data control challenges every CISO must tackle today

Why Paying Ransoms Still Costs You Your Data

Oct 28, 2025

byEyal Estrin

Top Priority: National Security Breach

From Nuclear Breaches to AI Threats: What CISOs Must Watch This Month

Top Priority: National Security Breach

Oct 21, 2025

byEyal Estrin

Emerging Threats, Critical Infrastructure Risks, and the Architecture Decisions That Matter

Critical infrastructure threats, operational disruption, and architectural gaps shaping the CISO agenda

Emerging Threats, Critical Infrastructure Risks, and the Architecture Decisions That Matter

Oct 7, 2025

byEyal Estrin

Managing AI Threats, Data Breaches, and Talent Shortages

Key lessons on emerging AI threats, real-world breaches, training pitfalls, talent shortages, and board communication strategies to strengthen organizational defenses.

Managing AI Threats, Data Breaches, and Talent Shortages

Sep 29, 2025

byEyal Estrin

Strengthening Security in an AI-Driven World

Key strategies for CISOs to manage AI risks, adopt preemptive defenses, and protect critical infrastructure from evolving cyber threats.

Strengthening Security in an AI-Driven World

Sep 22, 2025

byEyal Estrin

Adapting Cybersecurity Strategies in a Rapidly Evolving Landscape

Organizations must balance rapid threat response, AI-driven security, privacy considerations, and workforce adaptation to stay ahead in an evolving cyber landscape.

Adapting Cybersecurity Strategies in a Rapidly Evolving Landscape

CSec Weekly

The Cyber Security News That Matter to Leaders


Quick Links

Subscription

Search

© 2026 CSec Weekly by SmartClouds.ai.
Report abusePrivacy policyTerms of use
beehiivPowered by beehiiv